mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/08/21 12:11:50
This commit is contained in:
parent
58c39df740
commit
b7d6415294
60 changed files with 2195 additions and 26 deletions
|
@ -408,8 +408,8 @@
|
|||
"pushed_at": "2017-04-04T19:57:38Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 120640426,
|
||||
"name": "CVE-2018-0101-DOS-POC",
|
||||
"full_name": "1337g\/CVE-2018-0101-DOS-POC",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2018-0101-DOS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T16:25:59Z",
|
||||
"updated_at": "2020-04-06T12:17:46Z",
|
||||
"pushed_at": "2018-02-07T16:43:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120782386,
|
||||
"name": "ciscoasa_honeypot",
|
||||
|
|
|
@ -68,6 +68,52 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 326501568,
|
||||
"name": "CVE-2018-0114",
|
||||
"full_name": "Eremiel\/CVE-2018-0114",
|
||||
"owner": {
|
||||
"login": "Eremiel",
|
||||
"id": 32537197,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32537197?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eremiel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eremiel\/CVE-2018-0114",
|
||||
"description": "python2.7 script for JWT generation",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-03T21:12:10Z",
|
||||
"updated_at": "2021-01-03T21:14:37Z",
|
||||
"pushed_at": "2021-01-03T21:14:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 329385640,
|
||||
"name": "CVE-2018-0114",
|
||||
"full_name": "Starry-lord\/CVE-2018-0114",
|
||||
"owner": {
|
||||
"login": "Starry-lord",
|
||||
"id": 66038734,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66038734?v=4",
|
||||
"html_url": "https:\/\/github.com\/Starry-lord"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Starry-lord\/CVE-2018-0114",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T17:40:08Z",
|
||||
"updated_at": "2021-01-13T20:05:46Z",
|
||||
"pushed_at": "2021-01-13T17:46:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 366358015,
|
||||
"name": "CVE-2018-0114",
|
||||
|
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 117077311,
|
||||
"name": "CVE-2018-0802_POC",
|
||||
"full_name": "zldww2011\/CVE-2018-0802_POC",
|
||||
"owner": {
|
||||
"login": "zldww2011",
|
||||
"id": 17902585,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17902585?v=4",
|
||||
"html_url": "https:\/\/github.com\/zldww2011"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zldww2011\/CVE-2018-0802_POC",
|
||||
"description": "Exploit the vulnerability to execute the calculator",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:16:32Z",
|
||||
"updated_at": "2021-03-11T00:53:56Z",
|
||||
"pushed_at": "2018-01-11T09:23:05Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117080574,
|
||||
"name": "CVE-2018-0802",
|
||||
"full_name": "rxwx\/CVE-2018-0802",
|
||||
"owner": {
|
||||
"login": "rxwx",
|
||||
"id": 2202542,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2202542?v=4",
|
||||
"html_url": "https:\/\/github.com\/rxwx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rxwx\/CVE-2018-0802",
|
||||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2021-08-03T12:01:33Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 136,
|
||||
"forks": 136,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117234193,
|
||||
"name": "RTF_11882_0802",
|
||||
"full_name": "Ridter\/RTF_11882_0802",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
|
||||
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-12T11:38:33Z",
|
||||
"updated_at": "2021-06-28T10:46:26Z",
|
||||
"pushed_at": "2018-01-12T11:42:29Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 117637270,
|
||||
"name": "CVE-2018-0802_CVE-2017-11882",
|
||||
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T05:49:01Z",
|
||||
"updated_at": "2021-03-11T01:10:37Z",
|
||||
"pushed_at": "2018-01-16T05:49:10Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 313441734,
|
||||
"name": "rtfkit",
|
||||
|
|
25
2018/CVE-2018-1000001.json
Normal file
25
2018/CVE-2018-1000001.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 120648393,
|
||||
"name": "CVE-2018-1000001",
|
||||
"full_name": "0x00-0x00\/CVE-2018-1000001",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-1000001",
|
||||
"description": "glibc getcwd() local privilege escalation compiled binaries",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T17:34:24Z",
|
||||
"updated_at": "2020-12-02T07:21:01Z",
|
||||
"pushed_at": "2018-02-09T22:35:06Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1000006.json
Normal file
25
2018/CVE-2018-1000006.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 118851943,
|
||||
"name": "CVE-2018-1000006-DEMO",
|
||||
"full_name": "CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"owner": {
|
||||
"login": "CHYbeta",
|
||||
"id": 18642224,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18642224?v=4",
|
||||
"html_url": "https:\/\/github.com\/CHYbeta"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2018-1000006-DEMO",
|
||||
"description": "The Demo for CVE-2018-1000006",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T02:38:44Z",
|
||||
"updated_at": "2020-07-13T15:22:09Z",
|
||||
"pushed_at": "2018-01-25T03:29:30Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-12533.json
Normal file
25
2018/CVE-2018-12533.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 161888465,
|
||||
"name": "CVE-2018-12533",
|
||||
"full_name": "TheKalin\/CVE-2018-12533",
|
||||
"owner": {
|
||||
"login": "TheKalin",
|
||||
"id": 8446513,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8446513?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheKalin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheKalin\/CVE-2018-12533",
|
||||
"description": "RF-14310 \/ CVE-2018-12533 - Payload generator ",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-15T09:08:53Z",
|
||||
"updated_at": "2021-06-21T00:20:20Z",
|
||||
"pushed_at": "2021-02-03T12:07:33Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2018/CVE-2018-1304.json
Normal file
48
2018/CVE-2018-1304.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 122712148,
|
||||
"name": "CVE-2018-1304",
|
||||
"full_name": "knqyf263\/CVE-2018-1304",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1304",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-24T06:45:21Z",
|
||||
"updated_at": "2018-05-07T09:36:43Z",
|
||||
"pushed_at": "2018-02-25T12:29:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 124373835,
|
||||
"name": "tomcat_CVE-2018-1304_testing",
|
||||
"full_name": "thariyarox\/tomcat_CVE-2018-1304_testing",
|
||||
"owner": {
|
||||
"login": "thariyarox",
|
||||
"id": 8102507,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8102507?v=4",
|
||||
"html_url": "https:\/\/github.com\/thariyarox"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thariyarox\/tomcat_CVE-2018-1304_testing",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-03-08T10:12:22Z",
|
||||
"updated_at": "2018-03-08T10:24:11Z",
|
||||
"pushed_at": "2018-03-08T10:30:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-1305.json
Normal file
25
2018/CVE-2018-1305.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 129016985,
|
||||
"name": "CVE-2018-1305",
|
||||
"full_name": "Pa55w0rd\/CVE-2018-1305",
|
||||
"owner": {
|
||||
"login": "Pa55w0rd",
|
||||
"id": 16274549,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16274549?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pa55w0rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Pa55w0rd\/CVE-2018-1305",
|
||||
"description": "Apache Tomcat 安全绕过漏洞 Poc",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-11T01:37:58Z",
|
||||
"updated_at": "2021-08-18T06:04:44Z",
|
||||
"pushed_at": "2018-03-12T18:05:03Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -45,6 +45,29 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 330760916,
|
||||
"name": "cve-2018-1335",
|
||||
"full_name": "canumay\/cve-2018-1335",
|
||||
"owner": {
|
||||
"login": "canumay",
|
||||
"id": 30483006,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30483006?v=4",
|
||||
"html_url": "https:\/\/github.com\/canumay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/canumay\/cve-2018-1335",
|
||||
"description": "CENG 325 - Principles of Information Security And Privacy",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-18T19:01:50Z",
|
||||
"updated_at": "2021-01-18T19:42:41Z",
|
||||
"pushed_at": "2021-01-18T19:30:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 351765059,
|
||||
"name": "CVE-2018-1335",
|
||||
|
|
|
@ -182,5 +182,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 321338247,
|
||||
"name": "CVE-2018-13379",
|
||||
"full_name": "B1anda0\/CVE-2018-13379",
|
||||
"owner": {
|
||||
"login": "B1anda0",
|
||||
"id": 74232513,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
|
||||
"html_url": "https:\/\/github.com\/B1anda0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2018-13379",
|
||||
"description": "Fortinet FortiOS路径遍历漏洞 (CVE-2018-13379)批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-14T12:17:03Z",
|
||||
"updated_at": "2021-04-14T19:44:41Z",
|
||||
"pushed_at": "2020-12-14T12:20:00Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-13797.json
Normal file
25
2018/CVE-2018-13797.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 327091489,
|
||||
"name": "CVE-2018-13797",
|
||||
"full_name": "dsp-testing\/CVE-2018-13797",
|
||||
"owner": {
|
||||
"login": "dsp-testing",
|
||||
"id": 30846345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30846345?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsp-testing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-13797",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T18:56:56Z",
|
||||
"updated_at": "2021-01-05T19:33:04Z",
|
||||
"pushed_at": "2021-01-05T19:33:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -113,5 +113,74 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 312628962,
|
||||
"name": "exploit_laravel_cve-2018-15133",
|
||||
"full_name": "aljavier\/exploit_laravel_cve-2018-15133",
|
||||
"owner": {
|
||||
"login": "aljavier",
|
||||
"id": 1992392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1992392?v=4",
|
||||
"html_url": "https:\/\/github.com\/aljavier"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aljavier\/exploit_laravel_cve-2018-15133",
|
||||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2021-07-26T03:20:11Z",
|
||||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323457742,
|
||||
"name": "Larascript",
|
||||
"full_name": "PwnedShell\/Larascript",
|
||||
"owner": {
|
||||
"login": "PwnedShell",
|
||||
"id": 55540142,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55540142?v=4",
|
||||
"html_url": "https:\/\/github.com\/PwnedShell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PwnedShell\/Larascript",
|
||||
"description": "Laravel RCE exploit. CVE-2018-15133",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T22:02:08Z",
|
||||
"updated_at": "2021-08-08T14:50:43Z",
|
||||
"pushed_at": "2020-12-23T11:27:12Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 326357836,
|
||||
"name": "CVE-2018-15133",
|
||||
"full_name": "AzhariKun\/CVE-2018-15133",
|
||||
"owner": {
|
||||
"login": "AzhariKun",
|
||||
"id": 76898637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76898637?v=4",
|
||||
"html_url": "https:\/\/github.com\/AzhariKun"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AzhariKun\/CVE-2018-15133",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-03T08:06:46Z",
|
||||
"updated_at": "2021-06-20T01:13:12Z",
|
||||
"pushed_at": "2021-01-08T08:38:16Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -435,5 +435,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 319993422,
|
||||
"name": "CVE-2018-15473_OpenSSH_7.7",
|
||||
"full_name": "WildfootW\/CVE-2018-15473_OpenSSH_7.7",
|
||||
"owner": {
|
||||
"login": "WildfootW",
|
||||
"id": 11520473,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4",
|
||||
"html_url": "https:\/\/github.com\/WildfootW"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WildfootW\/CVE-2018-15473_OpenSSH_7.7",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T15:09:31Z",
|
||||
"updated_at": "2020-12-09T15:10:05Z",
|
||||
"pushed_at": "2020-12-09T15:10:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-16492.json
Normal file
25
2018/CVE-2018-16492.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 327027929,
|
||||
"name": "CVE-2018-16492",
|
||||
"full_name": "dsp-testing\/CVE-2018-16492",
|
||||
"owner": {
|
||||
"login": "dsp-testing",
|
||||
"id": 30846345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30846345?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsp-testing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-16492",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T14:44:09Z",
|
||||
"updated_at": "2021-01-05T14:47:11Z",
|
||||
"pushed_at": "2021-01-05T14:47:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 153072697,
|
||||
"name": "PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"full_name": "farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"owner": {
|
||||
"login": "farisv",
|
||||
"id": 44131180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44131180?v=4",
|
||||
"html_url": "https:\/\/github.com\/farisv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-15T07:44:43Z",
|
||||
"updated_at": "2021-08-04T23:17:56Z",
|
||||
"pushed_at": "2021-01-06T01:11:32Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 157982249,
|
||||
"name": "CVE-2018-16509",
|
||||
|
|
|
@ -91,6 +91,29 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 330011576,
|
||||
"name": "Fu3l-F1lt3r",
|
||||
"full_name": "uwueviee\/Fu3l-F1lt3r",
|
||||
"owner": {
|
||||
"login": "uwueviee",
|
||||
"id": 15057172,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15057172?v=4",
|
||||
"html_url": "https:\/\/github.com\/uwueviee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uwueviee\/Fu3l-F1lt3r",
|
||||
"description": "Rust implementation of CVE-2018-16763 with some extra features.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T20:09:09Z",
|
||||
"updated_at": "2021-01-15T20:09:51Z",
|
||||
"pushed_at": "2021-01-15T20:09:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345374363,
|
||||
"name": "Fuel-CMS-Remote-Code-Execution-1.4--RCE--",
|
||||
|
|
25
2018/CVE-2018-16843.json
Normal file
25
2018/CVE-2018-16843.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 323590787,
|
||||
"name": "ingress-nginx-0.21-1.19.5",
|
||||
"full_name": "flyniu666\/ingress-nginx-0.21-1.19.5",
|
||||
"owner": {
|
||||
"login": "flyniu666",
|
||||
"id": 52430647,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52430647?v=4",
|
||||
"html_url": "https:\/\/github.com\/flyniu666"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/flyniu666\/ingress-nginx-0.21-1.19.5",
|
||||
"description": "based on nginx 1.19.5 to fix for CVE-2018-16843, CVE-2018-16844, CVE-2019-9511, CVE-2019-9513, and CVE-2019-9516",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-22T10:16:11Z",
|
||||
"updated_at": "2020-12-23T11:45:29Z",
|
||||
"pushed_at": "2020-12-23T11:45:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 336995518,
|
||||
"name": "edb-49263-fixed",
|
||||
"full_name": "xenophil90\/edb-49263-fixed",
|
||||
"owner": {
|
||||
"login": "xenophil90",
|
||||
"id": 67900150,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67900150?v=4",
|
||||
"html_url": "https:\/\/github.com\/xenophil90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xenophil90\/edb-49263-fixed",
|
||||
"description": "Fixed version of the Python script to exploit CVE-2018-19571 and CVE-2018-19585 (GitLab 11.4.7 - Authenticated Remote Code Execution) that is available at https:\/\/www.exploit-db.com\/exploits\/49263 (Python 3.9).",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-08T07:38:09Z",
|
||||
"updated_at": "2021-02-08T08:51:49Z",
|
||||
"pushed_at": "2021-02-08T08:51:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 356847908,
|
||||
"name": "gitlab-RCE-11.4.7",
|
||||
|
|
25
2018/CVE-2018-20433.json
Normal file
25
2018/CVE-2018-20433.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 321055902,
|
||||
"name": "cp30_XXE_partial_fix",
|
||||
"full_name": "shanika04\/cp30_XXE_partial_fix",
|
||||
"owner": {
|
||||
"login": "shanika04",
|
||||
"id": 73774345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73774345?v=4",
|
||||
"html_url": "https:\/\/github.com\/shanika04"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shanika04\/cp30_XXE_partial_fix",
|
||||
"description": "version between CVE-2018-20433 and CVE-2019-5427",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-13T12:08:30Z",
|
||||
"updated_at": "2020-12-13T12:10:34Z",
|
||||
"pushed_at": "2020-12-13T12:10:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-2380.json
Normal file
25
2018/CVE-2018-2380.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 125186745,
|
||||
"name": "CVE-2018-2380",
|
||||
"full_name": "erpscanteam\/CVE-2018-2380",
|
||||
"owner": {
|
||||
"login": "erpscanteam",
|
||||
"id": 35491827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35491827?v=4",
|
||||
"html_url": "https:\/\/github.com\/erpscanteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erpscanteam\/CVE-2018-2380",
|
||||
"description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-14T09:20:21Z",
|
||||
"updated_at": "2021-07-06T08:17:31Z",
|
||||
"pushed_at": "2018-03-14T12:13:43Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 119399468,
|
||||
"name": "CVE-2018-2636",
|
||||
"full_name": "erpscanteam\/CVE-2018-2636",
|
||||
"owner": {
|
||||
"login": "erpscanteam",
|
||||
"id": 35491827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35491827?v=4",
|
||||
"html_url": "https:\/\/github.com\/erpscanteam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erpscanteam\/CVE-2018-2636",
|
||||
"description": "ERPScan Public POC for CVE-2018-2636",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T15:16:02Z",
|
||||
"updated_at": "2020-07-17T11:18:33Z",
|
||||
"pushed_at": "2018-02-01T15:36:19Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120569870,
|
||||
"name": "micros_honeypot",
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 222744850,
|
||||
"name": "PyLadon",
|
||||
"full_name": "k8gege\/PyLadon",
|
||||
"owner": {
|
||||
"login": "k8gege",
|
||||
"id": 42312878,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
|
||||
"html_url": "https:\/\/github.com\/k8gege"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k8gege\/PyLadon",
|
||||
"description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T16:51:39Z",
|
||||
"updated_at": "2021-07-19T01:24:48Z",
|
||||
"pushed_at": "2020-12-08T15:39:24Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-3608.json
Normal file
25
2018/CVE-2018-3608.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 120301126,
|
||||
"name": "Trend_Micro_POC",
|
||||
"full_name": "ZhiyuanWang-Chengdu-Qihoo360\/Trend_Micro_POC",
|
||||
"owner": {
|
||||
"login": "ZhiyuanWang-Chengdu-Qihoo360",
|
||||
"id": 35134599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35134599?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZhiyuanWang-Chengdu-Qihoo360"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZhiyuanWang-Chengdu-Qihoo360\/Trend_Micro_POC",
|
||||
"description": "CVE-2018-3608 Trend_Micro_CVE",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T12:22:28Z",
|
||||
"updated_at": "2019-09-27T17:09:24Z",
|
||||
"pushed_at": "2018-02-05T12:55:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 24,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 124429247,
|
||||
"name": "Exploit11.2",
|
||||
"full_name": "joedaguy\/Exploit11.2",
|
||||
"owner": {
|
||||
"login": "joedaguy",
|
||||
"id": 37167590,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37167590?v=4",
|
||||
"html_url": "https:\/\/github.com\/joedaguy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/joedaguy\/Exploit11.2",
|
||||
"description": "Exploit iOS 11.2.x by ZIMPERIUM and semi-completed by me. Sandbox escapes on CVE-2018-4087. ",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-08T18:04:31Z",
|
||||
"updated_at": "2020-04-06T19:47:42Z",
|
||||
"pushed_at": "2018-03-08T15:41:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-4110.json
Normal file
25
2018/CVE-2018-4110.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 105685717,
|
||||
"name": "ios11-cookie-set-expire-issue",
|
||||
"full_name": "bencompton\/ios11-cookie-set-expire-issue",
|
||||
"owner": {
|
||||
"login": "bencompton",
|
||||
"id": 3343482,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3343482?v=4",
|
||||
"html_url": "https:\/\/github.com\/bencompton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bencompton\/ios11-cookie-set-expire-issue",
|
||||
"description": "Reproduction of iOS 11 bug CVE-2018-4110",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-03T18:09:30Z",
|
||||
"updated_at": "2021-03-23T12:27:43Z",
|
||||
"pushed_at": "2017-10-16T15:07:13Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-4185.json
Normal file
25
2018/CVE-2018-4185.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 123051746,
|
||||
"name": "x18-leak",
|
||||
"full_name": "bazad\/x18-leak",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/x18-leak",
|
||||
"description": "CVE-2018-4185: iOS 11.2-11.2.6 kernel pointer disclosure introduced by Apple's Meltdown mitigation.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-27T00:58:39Z",
|
||||
"updated_at": "2021-08-05T02:12:54Z",
|
||||
"pushed_at": "2018-03-07T08:07:29Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-4331.json
Normal file
25
2018/CVE-2018-4331.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 114446755,
|
||||
"name": "gsscred-race",
|
||||
"full_name": "bazad\/gsscred-race",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/gsscred-race",
|
||||
"description": "CVE-2018-4331: Exploit for a race condition in the GSSCred system service on iOS 11.2.",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T08:48:08Z",
|
||||
"updated_at": "2021-08-05T02:13:00Z",
|
||||
"pushed_at": "2018-01-09T07:23:15Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-4343.json
Normal file
25
2018/CVE-2018-4343.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 113555592,
|
||||
"name": "gsscred-move-uaf",
|
||||
"full_name": "bazad\/gsscred-move-uaf",
|
||||
"owner": {
|
||||
"login": "bazad",
|
||||
"id": 3111637,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3111637?v=4",
|
||||
"html_url": "https:\/\/github.com\/bazad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bazad\/gsscred-move-uaf",
|
||||
"description": "CVE-2018-4343: Proof-of-concept for a use-after-free in the GSSCred daemon on macOS and iOS.",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-08T09:15:37Z",
|
||||
"updated_at": "2021-08-05T02:13:03Z",
|
||||
"pushed_at": "2017-12-09T23:23:47Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,98 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120909146,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "mdsecactivebreach\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "mdsecactivebreach",
|
||||
"id": 29373540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29373540?v=4",
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach\/CVE-2018-4878",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T13:30:46Z",
|
||||
"updated_at": "2020-03-26T07:15:42Z",
|
||||
"pushed_at": "2018-02-09T14:38:27Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120962228,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "hybridious\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "hybridious",
|
||||
"id": 26754785,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26754785?v=4",
|
||||
"html_url": "https:\/\/github.com\/hybridious"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hybridious\/CVE-2018-4878",
|
||||
"description": "Aggressor Script to just launch IE driveby for CVE-2018-4878",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T22:25:03Z",
|
||||
"updated_at": "2018-02-10T09:26:14Z",
|
||||
"pushed_at": "2018-02-09T22:09:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121002284,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "vysecurity\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "vysecurity",
|
||||
"id": 3596242,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
|
||||
"html_url": "https:\/\/github.com\/vysecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2018-4878",
|
||||
"description": "Aggressor Script to launch IE driveby for CVE-2018-4878",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-10T09:30:18Z",
|
||||
"updated_at": "2021-08-05T03:25:58Z",
|
||||
"pushed_at": "2018-02-10T19:39:10Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 122663508,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "KathodeN\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "KathodeN",
|
||||
"id": 29355827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29355827?v=4",
|
||||
"html_url": "https:\/\/github.com\/KathodeN"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KathodeN\/CVE-2018-4878",
|
||||
"description": "CVE-2018-4878 样本",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-23T19:24:40Z",
|
||||
"updated_at": "2021-08-05T03:25:58Z",
|
||||
"pushed_at": "2018-02-22T07:10:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 128007297,
|
||||
"name": "CVE-2018-4878",
|
||||
|
|
25
2018/CVE-2018-4879.json
Normal file
25
2018/CVE-2018-4879.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 125461828,
|
||||
"name": "CVE-2018-4879",
|
||||
"full_name": "H3llozy\/CVE-2018-4879",
|
||||
"owner": {
|
||||
"login": "H3llozy",
|
||||
"id": 15612861,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15612861?v=4",
|
||||
"html_url": "https:\/\/github.com\/H3llozy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H3llozy\/CVE-2018-4879",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-03-16T04:04:55Z",
|
||||
"updated_at": "2021-01-13T15:13:50Z",
|
||||
"pushed_at": "2018-03-15T16:02:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-4901.json
Normal file
25
2018/CVE-2018-4901.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 125818046,
|
||||
"name": "CVE-2018-4901",
|
||||
"full_name": "bigric3\/CVE-2018-4901",
|
||||
"owner": {
|
||||
"login": "bigric3",
|
||||
"id": 22165361,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22165361?v=4",
|
||||
"html_url": "https:\/\/github.com\/bigric3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bigric3\/CVE-2018-4901",
|
||||
"description": "crash poc & Leak info PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-19T07:27:53Z",
|
||||
"updated_at": "2018-11-16T12:24:04Z",
|
||||
"pushed_at": "2018-03-19T07:29:42Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2018/CVE-2018-5711.json
Normal file
48
2018/CVE-2018-5711.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 119782218,
|
||||
"name": "Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"full_name": "huzhenghui\/Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"owner": {
|
||||
"login": "huzhenghui",
|
||||
"id": 4843755,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4843755?v=4",
|
||||
"html_url": "https:\/\/github.com\/huzhenghui"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huzhenghui\/Test-7-2-0-PHP-CVE-2018-5711",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-01T04:21:13Z",
|
||||
"updated_at": "2018-02-02T07:40:36Z",
|
||||
"pushed_at": "2018-02-01T06:24:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 119790221,
|
||||
"name": "Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"full_name": "huzhenghui\/Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"owner": {
|
||||
"login": "huzhenghui",
|
||||
"id": 4843755,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4843755?v=4",
|
||||
"html_url": "https:\/\/github.com\/huzhenghui"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huzhenghui\/Test-7-2-1-PHP-CVE-2018-5711",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-01T06:00:14Z",
|
||||
"updated_at": "2018-02-02T04:30:18Z",
|
||||
"pushed_at": "2018-02-01T06:23:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-5951.json
Normal file
25
2018/CVE-2018-5951.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 118846181,
|
||||
"name": "CVE-2018-5951",
|
||||
"full_name": "Nat-Lab\/CVE-2018-5951",
|
||||
"owner": {
|
||||
"login": "Nat-Lab",
|
||||
"id": 18462539,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18462539?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nat-Lab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nat-Lab\/CVE-2018-5951",
|
||||
"description": "MikroTik RouterOS Denial of Service Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-25T01:40:02Z",
|
||||
"updated_at": "2021-03-08T16:00:44Z",
|
||||
"pushed_at": "2018-02-11T06:51:29Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -68,6 +68,29 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 293412780,
|
||||
"name": "fusee-gelee",
|
||||
"full_name": "austinhartzheim\/fusee-gelee",
|
||||
"owner": {
|
||||
"login": "austinhartzheim",
|
||||
"id": 6235007,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6235007?v=4",
|
||||
"html_url": "https:\/\/github.com\/austinhartzheim"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/austinhartzheim\/fusee-gelee",
|
||||
"description": "Rust implementation of the Fusée Gelée exploit (CVE-2018-6242) for Tegra processors.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-07T03:28:15Z",
|
||||
"updated_at": "2021-01-19T02:18:07Z",
|
||||
"pushed_at": "2021-01-19T02:18:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 353909908,
|
||||
"name": "Kinesys-Nintendo-CVE-2018-6242",
|
||||
|
|
25
2018/CVE-2018-6376.json
Normal file
25
2018/CVE-2018-6376.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 121202213,
|
||||
"name": "CVE-2018-6376",
|
||||
"full_name": "knqyf263\/CVE-2018-6376",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-6376",
|
||||
"description": "Joomla!, Second Order SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-12T05:02:52Z",
|
||||
"updated_at": "2018-10-04T17:23:42Z",
|
||||
"pushed_at": "2018-02-12T12:14:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,211 @@
|
|||
[
|
||||
{
|
||||
"id": 120386140,
|
||||
"name": "wordpress-fix-cve-2018-6389",
|
||||
"full_name": "yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "yolabingo",
|
||||
"id": 628954,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628954?v=4",
|
||||
"html_url": "https:\/\/github.com\/yolabingo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"description": "Apache RewriteRule to mitigate potential DoS attack via Wordpress wp-admin\/load-scripts.php file",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T01:43:33Z",
|
||||
"updated_at": "2018-02-08T01:19:57Z",
|
||||
"pushed_at": "2018-02-06T01:46:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120477120,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "WazeHell\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "WazeHell",
|
||||
"id": 20618414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4",
|
||||
"html_url": "https:\/\/github.com\/WazeHell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WazeHell\/CVE-2018-6389",
|
||||
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T15:16:03Z",
|
||||
"updated_at": "2021-08-16T11:15:54Z",
|
||||
"pushed_at": "2018-02-06T15:36:29Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120533146,
|
||||
"name": "modsecurity-cve-2018-6389",
|
||||
"full_name": "rastating\/modsecurity-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "rastating",
|
||||
"id": 2500434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2500434?v=4",
|
||||
"html_url": "https:\/\/github.com\/rastating"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rastating\/modsecurity-cve-2018-6389",
|
||||
"description": "A ModSecurity ruleset for detecting potential attacks using CVE-2018-6389",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T22:51:21Z",
|
||||
"updated_at": "2020-10-21T21:49:25Z",
|
||||
"pushed_at": "2018-02-07T01:05:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120540306,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "knqyf263\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-6389",
|
||||
"description": "WordPress DoS (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T00:20:57Z",
|
||||
"updated_at": "2020-01-17T20:42:25Z",
|
||||
"pushed_at": "2018-02-07T00:43:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120617956,
|
||||
"name": "cve-2018-6389-php-patcher",
|
||||
"full_name": "JulienGadanho\/cve-2018-6389-php-patcher",
|
||||
"owner": {
|
||||
"login": "JulienGadanho",
|
||||
"id": 18120161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18120161?v=4",
|
||||
"html_url": "https:\/\/github.com\/JulienGadanho"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JulienGadanho\/cve-2018-6389-php-patcher",
|
||||
"description": "Patch Wordpress DOS breach (CVE-2018-6389) in PHP",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T13:22:31Z",
|
||||
"updated_at": "2018-12-02T15:55:12Z",
|
||||
"pushed_at": "2018-02-13T08:19:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120916403,
|
||||
"name": "wordpress-CVE-2018-6389",
|
||||
"full_name": "dsfau\/wordpress-CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/wordpress-CVE-2018-6389",
|
||||
"description": "Metasploit module for WordPress DOS load-scripts.php CVE-2018-638",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T14:37:44Z",
|
||||
"updated_at": "2018-12-11T09:20:38Z",
|
||||
"pushed_at": "2018-02-09T19:40:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121636079,
|
||||
"name": "CVE-2018-6389-FIX",
|
||||
"full_name": "Jetserver\/CVE-2018-6389-FIX",
|
||||
"owner": {
|
||||
"login": "Jetserver",
|
||||
"id": 16237996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16237996?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jetserver"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jetserver\/CVE-2018-6389-FIX",
|
||||
"description": "Global Fix for Wordpress CVE-2018-6389",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-15T14:00:14Z",
|
||||
"updated_at": "2018-02-15T14:02:54Z",
|
||||
"pushed_at": "2018-02-18T11:40:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 122881954,
|
||||
"name": "PoC---CVE-2018-6389",
|
||||
"full_name": "thechrono13\/PoC---CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "thechrono13",
|
||||
"id": 23078415,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23078415?v=4",
|
||||
"html_url": "https:\/\/github.com\/thechrono13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/thechrono13\/PoC---CVE-2018-6389",
|
||||
"description": "Proof of Concept of vunerability CVE-2018-6389 on Wordpress 4.9.2",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-25T22:06:05Z",
|
||||
"updated_at": "2018-02-25T22:07:50Z",
|
||||
"pushed_at": "2018-02-26T10:13:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 122955721,
|
||||
"name": "cve-2018-6389",
|
||||
"full_name": "BlackRouter\/cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "BlackRouter",
|
||||
"id": 15177510,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15177510?v=4",
|
||||
"html_url": "https:\/\/github.com\/BlackRouter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BlackRouter\/cve-2018-6389",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-26T10:45:27Z",
|
||||
"updated_at": "2018-02-26T10:45:27Z",
|
||||
"pushed_at": "2018-02-26T10:47:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123245165,
|
||||
"name": "PoC---CVE-2018-6389",
|
||||
|
@ -22,6 +229,52 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123487751,
|
||||
"name": "wordpress-cve-2018-6389",
|
||||
"full_name": "JavierOlmedo\/wordpress-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "JavierOlmedo",
|
||||
"id": 15904748,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904748?v=4",
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo\/wordpress-cve-2018-6389",
|
||||
"description": "CVE-2018-6389 WordPress Core - 'load-scripts.php' Denial of Service <= 4.9.4",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-01T20:19:14Z",
|
||||
"updated_at": "2018-03-19T20:05:40Z",
|
||||
"pushed_at": "2018-03-07T20:11:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123791550,
|
||||
"name": "wordpress_cve-2018-6389",
|
||||
"full_name": "m3ssap0\/wordpress_cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "m3ssap0",
|
||||
"id": 705120,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/705120?v=4",
|
||||
"html_url": "https:\/\/github.com\/m3ssap0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/m3ssap0\/wordpress_cve-2018-6389",
|
||||
"description": "Tries to exploit a WordPress vulnerability (CVE-2018-6389) which can be used to cause a Denial of Service.",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-04T13:33:15Z",
|
||||
"updated_at": "2018-09-18T13:02:37Z",
|
||||
"pushed_at": "2018-03-10T11:57:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 123796262,
|
||||
"name": "Shiva",
|
||||
|
|
25
2018/CVE-2018-6396.json
Normal file
25
2018/CVE-2018-6396.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 123634317,
|
||||
"name": "joomla-cve-2018-6396",
|
||||
"full_name": "JavierOlmedo\/joomla-cve-2018-6396",
|
||||
"owner": {
|
||||
"login": "JavierOlmedo",
|
||||
"id": 15904748,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904748?v=4",
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JavierOlmedo\/joomla-cve-2018-6396",
|
||||
"description": "Joomla - Component Google Map Landkarten <= 4.2.3 - SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-02T21:46:28Z",
|
||||
"updated_at": "2019-09-20T10:02:47Z",
|
||||
"pushed_at": "2018-03-07T20:13:21Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-6407.json
Normal file
25
2018/CVE-2018-6407.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 119438300,
|
||||
"name": "ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"full_name": "dreadlocked\/ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"owner": {
|
||||
"login": "dreadlocked",
|
||||
"id": 7407033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7407033?v=4",
|
||||
"html_url": "https:\/\/github.com\/dreadlocked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dreadlocked\/ConceptronicIPCam_MultipleVulnerabilities",
|
||||
"description": "[CVE-2018-6407 & CVE-2018-6408] Conceptronic IPCam Administration panel CSRF and Denial of Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-29T20:36:54Z",
|
||||
"updated_at": "2021-07-26T04:35:53Z",
|
||||
"pushed_at": "2018-01-31T00:13:31Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-6479.json
Normal file
25
2018/CVE-2018-6479.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 119714188,
|
||||
"name": "netwave-dosvulnerability",
|
||||
"full_name": "dreadlocked\/netwave-dosvulnerability",
|
||||
"owner": {
|
||||
"login": "dreadlocked",
|
||||
"id": 7407033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7407033?v=4",
|
||||
"html_url": "https:\/\/github.com\/dreadlocked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dreadlocked\/netwave-dosvulnerability",
|
||||
"description": "[CVE-2018-6479] Netwave IP Camera server vulnerable to Denial of Service via one single huge POST request.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-31T16:38:48Z",
|
||||
"updated_at": "2021-07-26T04:36:04Z",
|
||||
"pushed_at": "2018-02-01T20:08:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -965,6 +965,167 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 322346332,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "FilipeFraqueiro\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "FilipeFraqueiro",
|
||||
"id": 59435851,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59435851?v=4",
|
||||
"html_url": "https:\/\/github.com\/FilipeFraqueiro"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FilipeFraqueiro\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-17T16:09:07Z",
|
||||
"updated_at": "2020-12-17T16:15:08Z",
|
||||
"pushed_at": "2020-12-17T16:15:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323352519,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "shadofren\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "shadofren",
|
||||
"id": 8515519,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8515519?v=4",
|
||||
"html_url": "https:\/\/github.com\/shadofren"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shadofren\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-21T14:01:41Z",
|
||||
"updated_at": "2020-12-21T14:05:31Z",
|
||||
"pushed_at": "2020-12-21T14:05:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323730181,
|
||||
"name": "cve-2018-6574",
|
||||
"full_name": "NikolaT3sla\/cve-2018-6574",
|
||||
"owner": {
|
||||
"login": "NikolaT3sla",
|
||||
"id": 63161551,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63161551?v=4",
|
||||
"html_url": "https:\/\/github.com\/NikolaT3sla"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NikolaT3sla\/cve-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-22T20:50:06Z",
|
||||
"updated_at": "2020-12-22T21:05:17Z",
|
||||
"pushed_at": "2020-12-22T21:05:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 325280690,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "vishack\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "vishack",
|
||||
"id": 57520457,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57520457?v=4",
|
||||
"html_url": "https:\/\/github.com\/vishack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vishack\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-29T12:27:06Z",
|
||||
"updated_at": "2020-12-30T07:14:07Z",
|
||||
"pushed_at": "2020-12-30T07:14:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 325780499,
|
||||
"name": "cve-2018-6574-exercise",
|
||||
"full_name": "PLP-Orange\/cve-2018-6574-exercise",
|
||||
"owner": {
|
||||
"login": "PLP-Orange",
|
||||
"id": 76811827,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76811827?v=4",
|
||||
"html_url": "https:\/\/github.com\/PLP-Orange"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PLP-Orange\/cve-2018-6574-exercise",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T10:57:21Z",
|
||||
"updated_at": "2020-12-31T11:33:12Z",
|
||||
"pushed_at": "2020-12-31T11:33:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 328521772,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "purgedemo\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "purgedemo",
|
||||
"id": 77254765,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77254765?v=4",
|
||||
"html_url": "https:\/\/github.com\/purgedemo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/purgedemo\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T01:55:54Z",
|
||||
"updated_at": "2021-01-11T02:11:46Z",
|
||||
"pushed_at": "2021-01-11T02:11:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 328525338,
|
||||
"name": "CVE-2018-6574_2",
|
||||
"full_name": "purgedemo\/CVE-2018-6574_2",
|
||||
"owner": {
|
||||
"login": "purgedemo",
|
||||
"id": 77254765,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77254765?v=4",
|
||||
"html_url": "https:\/\/github.com\/purgedemo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/purgedemo\/CVE-2018-6574_2",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T02:16:19Z",
|
||||
"updated_at": "2021-01-11T02:25:37Z",
|
||||
"pushed_at": "2021-01-11T02:25:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345243566,
|
||||
"name": "POC-CVE-2018-6574",
|
||||
|
|
25
2018/CVE-2018-6791.json
Normal file
25
2018/CVE-2018-6791.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 121303569,
|
||||
"name": "KDE_Vuln",
|
||||
"full_name": "rarar0\/KDE_Vuln",
|
||||
"owner": {
|
||||
"login": "rarar0",
|
||||
"id": 14985119,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14985119?v=4",
|
||||
"html_url": "https:\/\/github.com\/rarar0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rarar0\/KDE_Vuln",
|
||||
"description": "CVE-2018-6791 Troubleshooting",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-12T21:21:29Z",
|
||||
"updated_at": "2019-01-03T01:14:32Z",
|
||||
"pushed_at": "2018-02-13T21:14:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-7197.json
Normal file
25
2018/CVE-2018-7197.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 122677679,
|
||||
"name": "CVE-2018-7197",
|
||||
"full_name": "Alyssa-o-Herrera\/CVE-2018-7197",
|
||||
"owner": {
|
||||
"login": "Alyssa-o-Herrera",
|
||||
"id": 27867026,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27867026?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alyssa-o-Herrera"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alyssa-o-Herrera\/CVE-2018-7197",
|
||||
"description": "CVE-2018-7197 Write up",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-23T22:06:51Z",
|
||||
"updated_at": "2018-10-04T17:25:29Z",
|
||||
"pushed_at": "2018-02-23T22:07:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-7211.json
Normal file
25
2018/CVE-2018-7211.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 121942694,
|
||||
"name": "CVE-2018-7211-PoC",
|
||||
"full_name": "c3r34lk1ll3r\/CVE-2018-7211-PoC",
|
||||
"owner": {
|
||||
"login": "c3r34lk1ll3r",
|
||||
"id": 12492834,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12492834?v=4",
|
||||
"html_url": "https:\/\/github.com\/c3r34lk1ll3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c3r34lk1ll3r\/CVE-2018-7211-PoC",
|
||||
"description": "This is the original PoC of CVE-2018-7211",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-18T10:47:00Z",
|
||||
"updated_at": "2018-02-18T10:48:45Z",
|
||||
"pushed_at": "2018-02-18T10:53:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-7249.json
Normal file
25
2018/CVE-2018-7249.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 122389904,
|
||||
"name": "NotSecDrv",
|
||||
"full_name": "Elvin9\/NotSecDrv",
|
||||
"owner": {
|
||||
"login": "Elvin9",
|
||||
"id": 10520535,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10520535?v=4",
|
||||
"html_url": "https:\/\/github.com\/Elvin9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Elvin9\/NotSecDrv",
|
||||
"description": "A PoC for CVE-2018-7249",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-21T20:31:09Z",
|
||||
"updated_at": "2020-10-21T22:15:43Z",
|
||||
"pushed_at": "2018-03-01T19:06:50Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-7250.json
Normal file
25
2018/CVE-2018-7250.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 122391619,
|
||||
"name": "SecDrvPoolLeak",
|
||||
"full_name": "Elvin9\/SecDrvPoolLeak",
|
||||
"owner": {
|
||||
"login": "Elvin9",
|
||||
"id": 10520535,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10520535?v=4",
|
||||
"html_url": "https:\/\/github.com\/Elvin9"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Elvin9\/SecDrvPoolLeak",
|
||||
"description": "A PoC for CVE-2018-7250",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-21T20:47:39Z",
|
||||
"updated_at": "2020-10-21T22:15:43Z",
|
||||
"pushed_at": "2018-02-27T11:10:01Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-7669.json
Normal file
25
2018/CVE-2018-7669.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 332705983,
|
||||
"name": "CVE-2018-7669",
|
||||
"full_name": "palaziv\/CVE-2018-7669",
|
||||
"owner": {
|
||||
"login": "palaziv",
|
||||
"id": 8681088,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8681088?v=4",
|
||||
"html_url": "https:\/\/github.com\/palaziv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/palaziv\/CVE-2018-7669",
|
||||
"description": "Quick and dirty bruteforcer for CVE-2018-7669 (Directory Traversal Vulnerability in Sitecore)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T10:13:32Z",
|
||||
"updated_at": "2021-01-26T10:21:46Z",
|
||||
"pushed_at": "2021-01-26T10:21:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-8078.json
Normal file
25
2018/CVE-2018-8078.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 124507539,
|
||||
"name": "YZMCMSxss",
|
||||
"full_name": "Jx0n0\/YZMCMSxss",
|
||||
"owner": {
|
||||
"login": "Jx0n0",
|
||||
"id": 21152658,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21152658?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jx0n0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jx0n0\/YZMCMSxss",
|
||||
"description": "YZMCMS v3.7最新版xss漏洞 CVE-2018-8078",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-09T07:56:56Z",
|
||||
"updated_at": "2020-01-30T09:51:26Z",
|
||||
"pushed_at": "2018-03-13T02:44:27Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-8108.json
Normal file
25
2018/CVE-2018-8108.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 125155388,
|
||||
"name": "BUI-select-xss",
|
||||
"full_name": "zlgxzswjy\/BUI-select-xss",
|
||||
"owner": {
|
||||
"login": "zlgxzswjy",
|
||||
"id": 12388719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12388719?v=4",
|
||||
"html_url": "https:\/\/github.com\/zlgxzswjy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zlgxzswjy\/BUI-select-xss",
|
||||
"description": "cve-2018-8108",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-14T04:32:01Z",
|
||||
"updated_at": "2018-03-14T04:54:50Z",
|
||||
"pushed_at": "2018-03-14T04:54:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-8820.json
Normal file
25
2018/CVE-2018-8820.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 127013387,
|
||||
"name": "frevvomapexec",
|
||||
"full_name": "hateshape\/frevvomapexec",
|
||||
"owner": {
|
||||
"login": "hateshape",
|
||||
"id": 31131951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31131951?v=4",
|
||||
"html_url": "https:\/\/github.com\/hateshape"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hateshape\/frevvomapexec",
|
||||
"description": " PoC Exploit for CVE-2018-8820",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-27T16:09:46Z",
|
||||
"updated_at": "2019-01-29T17:35:37Z",
|
||||
"pushed_at": "2018-03-27T17:00:14Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2018/CVE-2018-8970.json
Normal file
25
2018/CVE-2018-8970.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 126690207,
|
||||
"name": "CVE-2018-8970",
|
||||
"full_name": "tiran\/CVE-2018-8970",
|
||||
"owner": {
|
||||
"login": "tiran",
|
||||
"id": 444071,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/444071?v=4",
|
||||
"html_url": "https:\/\/github.com\/tiran"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tiran\/CVE-2018-8970",
|
||||
"description": "Demo for https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-8970",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-25T11:22:47Z",
|
||||
"updated_at": "2018-04-10T15:41:19Z",
|
||||
"pushed_at": "2018-03-25T11:23:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,29 @@
|
|||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 326146315,
|
||||
"name": "CVE-2018-9276",
|
||||
"full_name": "AndyFeiLi\/CVE-2018-9276",
|
||||
"owner": {
|
||||
"login": "AndyFeiLi",
|
||||
"id": 59521017,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59521017?v=4",
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AndyFeiLi\/CVE-2018-9276",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-02T09:08:42Z",
|
||||
"updated_at": "2021-01-02T09:09:30Z",
|
||||
"pushed_at": "2021-01-02T09:09:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390558517,
|
||||
"name": "CVE-2018-9276",
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-08-02T03:02:25Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 205,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-08-20T19:27:42Z",
|
||||
"updated_at": "2021-08-21T01:19:20Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 569,
|
||||
"watchers_count": 569,
|
||||
"stargazers_count": 571,
|
||||
"watchers_count": 571,
|
||||
"forks_count": 152,
|
||||
"forks": 152,
|
||||
"watchers": 569,
|
||||
"watchers": 571,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2021-08-19T17:17:38Z",
|
||||
"updated_at": "2021-08-20T22:50:37Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 761,
|
||||
"watchers_count": 761,
|
||||
"stargazers_count": 760,
|
||||
"watchers_count": 760,
|
||||
"forks_count": 125,
|
||||
"forks": 125,
|
||||
"watchers": 761,
|
||||
"watchers": 760,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-08-17T18:26:24Z",
|
||||
"updated_at": "2021-08-21T01:53:52Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-08-20T01:34:15Z",
|
||||
"updated_at": "2021-08-20T22:43:42Z",
|
||||
"pushed_at": "2021-07-23T15:46:37Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"forks_count": 74,
|
||||
"forks": 74,
|
||||
"watchers": 355,
|
||||
"watchers": 356,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3707 , CVE-2021-3708",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T12:24:04Z",
|
||||
"updated_at": "2021-08-16T09:02:22Z",
|
||||
"updated_at": "2021-08-21T01:47:21Z",
|
||||
"pushed_at": "2021-08-16T08:58:17Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Documentation for cve-2021-39281",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-18T17:49:20Z",
|
||||
"updated_at": "2021-08-19T04:13:02Z",
|
||||
"pushed_at": "2021-08-19T04:13:00Z",
|
||||
"updated_at": "2021-08-20T22:19:28Z",
|
||||
"pushed_at": "2021-08-20T22:19:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
309
README.md
309
README.md
|
@ -10344,6 +10344,7 @@ Misskey before 10.102.4 allows hijacking a user's token.
|
|||
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618.
|
||||
</code>
|
||||
|
||||
- [1337g/CVE-2018-0101-DOS-POC](https://github.com/1337g/CVE-2018-0101-DOS-POC)
|
||||
- [Cymmetria/ciscoasa_honeypot](https://github.com/Cymmetria/ciscoasa_honeypot)
|
||||
|
||||
### CVE-2018-0114 (2018-01-04)
|
||||
|
@ -10355,6 +10356,8 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a
|
|||
- [zi0Black/POC-CVE-2018-0114](https://github.com/zi0Black/POC-CVE-2018-0114)
|
||||
- [Logeirs/CVE-2018-0114](https://github.com/Logeirs/CVE-2018-0114)
|
||||
- [adityathebe/POC-CVE-2018-0114](https://github.com/adityathebe/POC-CVE-2018-0114)
|
||||
- [Eremiel/CVE-2018-0114](https://github.com/Eremiel/CVE-2018-0114)
|
||||
- [Starry-lord/CVE-2018-0114](https://github.com/Starry-lord/CVE-2018-0114)
|
||||
- [scumdestroy/CVE-2018-0114](https://github.com/scumdestroy/CVE-2018-0114)
|
||||
|
||||
### CVE-2018-0202 (2018-03-27)
|
||||
|
@ -10398,6 +10401,10 @@ Command injection vulnerability in networking of QNAP Q'center Virtual Appliance
|
|||
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.
|
||||
</code>
|
||||
|
||||
- [zldww2011/CVE-2018-0802_POC](https://github.com/zldww2011/CVE-2018-0802_POC)
|
||||
- [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802)
|
||||
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802)
|
||||
- [likescam/CVE-2018-0802_CVE-2017-11882](https://github.com/likescam/CVE-2018-0802_CVE-2017-11882)
|
||||
- [dcsync/rtfkit](https://github.com/dcsync/rtfkit)
|
||||
- [roninAPT/CVE-2018-0802](https://github.com/roninAPT/CVE-2018-0802)
|
||||
|
||||
|
@ -10536,6 +10543,23 @@ When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an
|
|||
- [xDro1d/CVE-2018-1297](https://github.com/xDro1d/CVE-2018-1297)
|
||||
- [Al1ex/CVE-2018-1297](https://github.com/Al1ex/CVE-2018-1297)
|
||||
|
||||
### CVE-2018-1304 (2018-02-28)
|
||||
|
||||
<code>
|
||||
The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.
|
||||
</code>
|
||||
|
||||
- [knqyf263/CVE-2018-1304](https://github.com/knqyf263/CVE-2018-1304)
|
||||
- [thariyarox/tomcat_CVE-2018-1304_testing](https://github.com/thariyarox/tomcat_CVE-2018-1304_testing)
|
||||
|
||||
### CVE-2018-1305 (2018-02-23)
|
||||
|
||||
<code>
|
||||
Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
|
||||
</code>
|
||||
|
||||
- [Pa55w0rd/CVE-2018-1305](https://github.com/Pa55w0rd/CVE-2018-1305)
|
||||
|
||||
### CVE-2018-1306 (2018-06-27)
|
||||
|
||||
<code>
|
||||
|
@ -10568,6 +10592,7 @@ From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted head
|
|||
|
||||
- [SkyBlueEternal/CVE-2018-1335-EXP-GUI](https://github.com/SkyBlueEternal/CVE-2018-1335-EXP-GUI)
|
||||
- [N0b1e6/CVE-2018-1335-Python3](https://github.com/N0b1e6/CVE-2018-1335-Python3)
|
||||
- [canumay/cve-2018-1335](https://github.com/canumay/cve-2018-1335)
|
||||
- [siramk/CVE-2018-1335](https://github.com/siramk/CVE-2018-1335)
|
||||
|
||||
### CVE-2018-2019 (2019-01-18)
|
||||
|
@ -10578,6 +10603,14 @@ IBM Security Identity Manager 6.0.0 Virtual Appliance is vulnerable to a XML Ext
|
|||
|
||||
- [attakercyebr/hack4lx_CVE-2018-2019](https://github.com/attakercyebr/hack4lx_CVE-2018-2019)
|
||||
|
||||
### CVE-2018-2380 (2018-03-01)
|
||||
|
||||
<code>
|
||||
SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs.
|
||||
</code>
|
||||
|
||||
- [erpscanteam/CVE-2018-2380](https://github.com/erpscanteam/CVE-2018-2380)
|
||||
|
||||
### CVE-2018-2392 (2018-02-14)
|
||||
|
||||
<code>
|
||||
|
@ -10620,6 +10653,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). Supported versions that are affected are 2.7, 2.8 and 2.9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [erpscanteam/CVE-2018-2636](https://github.com/erpscanteam/CVE-2018-2636)
|
||||
- [Cymmetria/micros_honeypot](https://github.com/Cymmetria/micros_honeypot)
|
||||
|
||||
### CVE-2018-2844 (2018-04-18)
|
||||
|
@ -10663,6 +10697,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
|
|||
- [111ddea/cve-2018-2894](https://github.com/111ddea/cve-2018-2894)
|
||||
- [LandGrey/CVE-2018-2894](https://github.com/LandGrey/CVE-2018-2894)
|
||||
- [jas502n/CVE-2018-2894](https://github.com/jas502n/CVE-2018-2894)
|
||||
- [k8gege/PyLadon](https://github.com/k8gege/PyLadon)
|
||||
|
||||
### CVE-2018-3191 (2018-10-16)
|
||||
|
||||
|
@ -10708,6 +10743,14 @@ Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (su
|
|||
- [ndureiss/e1000_vulnerability_exploit](https://github.com/ndureiss/e1000_vulnerability_exploit)
|
||||
- [vhok74/cve-2018-3295](https://github.com/vhok74/cve-2018-3295)
|
||||
|
||||
### CVE-2018-3608 (2018-07-06)
|
||||
|
||||
<code>
|
||||
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
|
||||
</code>
|
||||
|
||||
- [ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC)
|
||||
|
||||
### CVE-2018-3639 (2018-05-22)
|
||||
|
||||
<code>
|
||||
|
@ -10779,6 +10822,15 @@ An issue was discovered in certain Apple products. iOS before 11.2.5 is affected
|
|||
|
||||
- [rani-i/bluetoothdPoC](https://github.com/rani-i/bluetoothdPoC)
|
||||
- [MTJailed/UnjailMe](https://github.com/MTJailed/UnjailMe)
|
||||
- [joedaguy/Exploit11.2](https://github.com/joedaguy/Exploit11.2)
|
||||
|
||||
### CVE-2018-4110 (2018-04-03)
|
||||
|
||||
<code>
|
||||
An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Web App" component. It allows remote attackers to bypass intended restrictions on cookie persistence.
|
||||
</code>
|
||||
|
||||
- [bencompton/ios11-cookie-set-expire-issue](https://github.com/bencompton/ios11-cookie-set-expire-issue)
|
||||
|
||||
### CVE-2018-4121 (2018-04-03)
|
||||
|
||||
|
@ -10808,6 +10860,14 @@ An issue was discovered in certain Apple products. iOS before 11.3 is affected.
|
|||
- [RPwnage/LovelySn0w](https://github.com/RPwnage/LovelySn0w)
|
||||
- [littlelailo/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-](https://github.com/littlelailo/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-)
|
||||
|
||||
### CVE-2018-4185 (2019-01-11)
|
||||
|
||||
<code>
|
||||
In iOS before 11.3, tvOS before 11.3, watchOS before 4.3, and macOS before High Sierra 10.13.4, an information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling.
|
||||
</code>
|
||||
|
||||
- [bazad/x18-leak](https://github.com/bazad/x18-leak)
|
||||
|
||||
### CVE-2018-4193 (2018-06-08)
|
||||
|
||||
<code>
|
||||
|
@ -10882,6 +10942,22 @@ In iOS before 11.4, a memory corruption issue exists and was addressed with impr
|
|||
|
||||
- [omerporze/toothfairy](https://github.com/omerporze/toothfairy)
|
||||
|
||||
### CVE-2018-4331 (2019-04-03)
|
||||
|
||||
<code>
|
||||
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
|
||||
</code>
|
||||
|
||||
- [bazad/gsscred-race](https://github.com/bazad/gsscred-race)
|
||||
|
||||
### CVE-2018-4343 (2019-04-03)
|
||||
|
||||
<code>
|
||||
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
|
||||
</code>
|
||||
|
||||
- [bazad/gsscred-move-uaf](https://github.com/bazad/gsscred-move-uaf)
|
||||
|
||||
### CVE-2018-4407 (2019-04-03)
|
||||
|
||||
<code>
|
||||
|
@ -10943,6 +11019,10 @@ A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.
|
|||
</code>
|
||||
|
||||
- [ydl555/CVE-2018-4878-](https://github.com/ydl555/CVE-2018-4878-)
|
||||
- [mdsecactivebreach/CVE-2018-4878](https://github.com/mdsecactivebreach/CVE-2018-4878)
|
||||
- [hybridious/CVE-2018-4878](https://github.com/hybridious/CVE-2018-4878)
|
||||
- [vysecurity/CVE-2018-4878](https://github.com/vysecurity/CVE-2018-4878)
|
||||
- [KathodeN/CVE-2018-4878](https://github.com/KathodeN/CVE-2018-4878)
|
||||
- [SyFi/CVE-2018-4878](https://github.com/SyFi/CVE-2018-4878)
|
||||
- [ydl555/CVE-2018-4878](https://github.com/ydl555/CVE-2018-4878)
|
||||
- [B0fH/CVE-2018-4878](https://github.com/B0fH/CVE-2018-4878)
|
||||
|
@ -10950,6 +11030,22 @@ A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.
|
|||
- [HuanWoWeiLan/SoftwareSystemSecurity-2019](https://github.com/HuanWoWeiLan/SoftwareSystemSecurity-2019)
|
||||
- [lvyoshino/CVE-2018-4878](https://github.com/lvyoshino/CVE-2018-4878)
|
||||
|
||||
### CVE-2018-4879 (2018-02-27)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the image conversion module that processes Enhanced Metafile Format Plus (EMF+) data. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
|
||||
</code>
|
||||
|
||||
- [H3llozy/CVE-2018-4879](https://github.com/H3llozy/CVE-2018-4879)
|
||||
|
||||
### CVE-2018-4901 (2018-02-27)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the document identity representation. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
|
||||
</code>
|
||||
|
||||
- [bigric3/CVE-2018-4901](https://github.com/bigric3/CVE-2018-4901)
|
||||
|
||||
### CVE-2018-5158 (2018-06-11)
|
||||
|
||||
<code>
|
||||
|
@ -10982,6 +11078,15 @@ The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 al
|
|||
|
||||
- [missing0x00/CVE-2018-5354](https://github.com/missing0x00/CVE-2018-5354)
|
||||
|
||||
### CVE-2018-5711 (2018-01-16)
|
||||
|
||||
<code>
|
||||
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
|
||||
</code>
|
||||
|
||||
- [huzhenghui/Test-7-2-0-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-0-PHP-CVE-2018-5711)
|
||||
- [huzhenghui/Test-7-2-1-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-1-PHP-CVE-2018-5711)
|
||||
|
||||
### CVE-2018-5728 (2018-01-16)
|
||||
|
||||
<code>
|
||||
|
@ -10998,6 +11103,14 @@ Cobham Sea Tel 121 build 222701 devices allow remote attackers to obtain potenti
|
|||
|
||||
- [sischkg/cve-2018-5740](https://github.com/sischkg/cve-2018-5740)
|
||||
|
||||
### CVE-2018-5951 (2020-03-02)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.
|
||||
</code>
|
||||
|
||||
- [Nat-Lab/CVE-2018-5951](https://github.com/Nat-Lab/CVE-2018-5951)
|
||||
|
||||
### CVE-2018-5955 (2018-01-21)
|
||||
|
||||
<code>
|
||||
|
@ -11024,15 +11137,35 @@ Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer over
|
|||
- [DavidBuchanan314/NXLoader](https://github.com/DavidBuchanan314/NXLoader)
|
||||
- [reswitched/rcm-modchips](https://github.com/reswitched/rcm-modchips)
|
||||
- [ChrisFigura/react-tegra-payload-launcher](https://github.com/ChrisFigura/react-tegra-payload-launcher)
|
||||
- [austinhartzheim/fusee-gelee](https://github.com/austinhartzheim/fusee-gelee)
|
||||
- [Kinesys/Kinesys-Nintendo-CVE-2018-6242](https://github.com/Kinesys/Kinesys-Nintendo-CVE-2018-6242)
|
||||
|
||||
### CVE-2018-6376 (2018-01-30)
|
||||
|
||||
<code>
|
||||
In Joomla! before 3.8.4, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message.
|
||||
</code>
|
||||
|
||||
- [knqyf263/CVE-2018-6376](https://github.com/knqyf263/CVE-2018-6376)
|
||||
|
||||
### CVE-2018-6389 (2018-02-06)
|
||||
|
||||
<code>
|
||||
In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.
|
||||
</code>
|
||||
|
||||
- [yolabingo/wordpress-fix-cve-2018-6389](https://github.com/yolabingo/wordpress-fix-cve-2018-6389)
|
||||
- [WazeHell/CVE-2018-6389](https://github.com/WazeHell/CVE-2018-6389)
|
||||
- [rastating/modsecurity-cve-2018-6389](https://github.com/rastating/modsecurity-cve-2018-6389)
|
||||
- [knqyf263/CVE-2018-6389](https://github.com/knqyf263/CVE-2018-6389)
|
||||
- [JulienGadanho/cve-2018-6389-php-patcher](https://github.com/JulienGadanho/cve-2018-6389-php-patcher)
|
||||
- [dsfau/wordpress-CVE-2018-6389](https://github.com/dsfau/wordpress-CVE-2018-6389)
|
||||
- [Jetserver/CVE-2018-6389-FIX](https://github.com/Jetserver/CVE-2018-6389-FIX)
|
||||
- [thechrono13/PoC---CVE-2018-6389](https://github.com/thechrono13/PoC---CVE-2018-6389)
|
||||
- [BlackRouter/cve-2018-6389](https://github.com/BlackRouter/cve-2018-6389)
|
||||
- [alessiogilardi/PoC---CVE-2018-6389](https://github.com/alessiogilardi/PoC---CVE-2018-6389)
|
||||
- [JavierOlmedo/wordpress-cve-2018-6389](https://github.com/JavierOlmedo/wordpress-cve-2018-6389)
|
||||
- [m3ssap0/wordpress_cve-2018-6389](https://github.com/m3ssap0/wordpress_cve-2018-6389)
|
||||
- [s0md3v/Shiva](https://github.com/s0md3v/Shiva)
|
||||
- [mudhappy/Wordpress-Hack-CVE-2018-6389](https://github.com/mudhappy/Wordpress-Hack-CVE-2018-6389)
|
||||
- [armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389](https://github.com/armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389)
|
||||
|
@ -11042,6 +11175,30 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
|
|||
- [vineetkia/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389)
|
||||
- [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389)
|
||||
|
||||
### CVE-2018-6396 (2018-02-17)
|
||||
|
||||
<code>
|
||||
SQL Injection exists in the Google Map Landkarten through 4.2.3 component for Joomla! via the cid or id parameter in a layout=form_markers action, or the map parameter in a layout=default action.
|
||||
</code>
|
||||
|
||||
- [JavierOlmedo/joomla-cve-2018-6396](https://github.com/JavierOlmedo/joomla-cve-2018-6396)
|
||||
|
||||
### CVE-2018-6407 (2018-01-30)
|
||||
|
||||
<code>
|
||||
An issue was discovered on Conceptronic CIPCAMPTIWL V3 0.61.30.21 devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to /hy-cgi/devices.cgi?cmd=searchlandevice. The crash completely freezes the device.
|
||||
</code>
|
||||
|
||||
- [dreadlocked/ConceptronicIPCam_MultipleVulnerabilities](https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities)
|
||||
|
||||
### CVE-2018-6479 (2018-01-31)
|
||||
|
||||
<code>
|
||||
An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
|
||||
</code>
|
||||
|
||||
- [dreadlocked/netwave-dosvulnerability](https://github.com/dreadlocked/netwave-dosvulnerability)
|
||||
|
||||
### CVE-2018-6518 (2018-04-26)
|
||||
|
||||
<code>
|
||||
|
@ -11106,6 +11263,13 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [jongmartinez/CVE-2018-6574-POC](https://github.com/jongmartinez/CVE-2018-6574-POC)
|
||||
- [Yashrk078/Test_CVE-2018-6574](https://github.com/Yashrk078/Test_CVE-2018-6574)
|
||||
- [azzzzzzzzzzzzzzzzz/CVE-2018-6574](https://github.com/azzzzzzzzzzzzzzzzz/CVE-2018-6574)
|
||||
- [FilipeFraqueiro/CVE-2018-6574](https://github.com/FilipeFraqueiro/CVE-2018-6574)
|
||||
- [shadofren/CVE-2018-6574](https://github.com/shadofren/CVE-2018-6574)
|
||||
- [NikolaT3sla/cve-2018-6574](https://github.com/NikolaT3sla/cve-2018-6574)
|
||||
- [vishack/CVE-2018-6574](https://github.com/vishack/CVE-2018-6574)
|
||||
- [PLP-Orange/cve-2018-6574-exercise](https://github.com/PLP-Orange/cve-2018-6574-exercise)
|
||||
- [purgedemo/CVE-2018-6574](https://github.com/purgedemo/CVE-2018-6574)
|
||||
- [purgedemo/CVE-2018-6574_2](https://github.com/purgedemo/CVE-2018-6574_2)
|
||||
- [killtr0/POC-CVE-2018-6574](https://github.com/killtr0/POC-CVE-2018-6574)
|
||||
- [theJuan1112/pentesterlab-cve-2018-6574](https://github.com/theJuan1112/pentesterlab-cve-2018-6574)
|
||||
- [MohamedTarekq/test-CVE-2018-6574-](https://github.com/MohamedTarekq/test-CVE-2018-6574-)
|
||||
|
@ -11146,6 +11310,14 @@ An issue was discovered in the base64d function in the SMTP listener in Exim bef
|
|||
- [synacktiv/Exim-CVE-2018-6789](https://github.com/synacktiv/Exim-CVE-2018-6789)
|
||||
- [martinclauss/exim-rce-cve-2018-6789](https://github.com/martinclauss/exim-rce-cve-2018-6789)
|
||||
|
||||
### CVE-2018-6791 (2018-02-06)
|
||||
|
||||
<code>
|
||||
An issue was discovered in soliduiserver/deviceserviceaction.cpp in KDE Plasma Workspace before 5.12.0. When a vfat thumbdrive that contains `` or $() in its volume label is plugged in and mounted through the device notifier, it's interpreted as a shell command, leading to a possibility of arbitrary command execution. An example of an offending volume label is "$(touch b)" -- this will create a file called b in the home folder.
|
||||
</code>
|
||||
|
||||
- [rarar0/KDE_Vuln](https://github.com/rarar0/KDE_Vuln)
|
||||
|
||||
### CVE-2018-6890 (2018-02-22)
|
||||
|
||||
<code>
|
||||
|
@ -11198,6 +11370,38 @@ Directory traversal vulnerability in Twonky Server 7.0.11 through 8.5 allows rem
|
|||
|
||||
- [mechanico/sharingIsCaring](https://github.com/mechanico/sharingIsCaring)
|
||||
|
||||
### CVE-2018-7197 (2018-02-17)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Pluck through 4.7.4. A stored cross-site scripting (XSS) vulnerability allows remote unauthenticated users to inject arbitrary web script or HTML into admin/blog Reaction Comments via a crafted URL.
|
||||
</code>
|
||||
|
||||
- [Alyssa-o-Herrera/CVE-2018-7197](https://github.com/Alyssa-o-Herrera/CVE-2018-7197)
|
||||
|
||||
### CVE-2018-7211 (2018-02-17)
|
||||
|
||||
<code>
|
||||
An issue was discovered in iDashboards 9.6b. The SSO implementation is affected by a weak obfuscation library, allowing man-in-the-middle attackers to discover credentials.
|
||||
</code>
|
||||
|
||||
- [c3r34lk1ll3r/CVE-2018-7211-PoC](https://github.com/c3r34lk1ll3r/CVE-2018-7211-PoC)
|
||||
|
||||
### CVE-2018-7249 (2018-02-26)
|
||||
|
||||
<code>
|
||||
An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. Two carefully timed calls to IOCTL 0xCA002813 can cause a race condition that leads to a use-after-free. When exploited, an unprivileged attacker can run arbitrary code in the kernel.
|
||||
</code>
|
||||
|
||||
- [Elvin9/NotSecDrv](https://github.com/Elvin9/NotSecDrv)
|
||||
|
||||
### CVE-2018-7250 (2018-02-26)
|
||||
|
||||
<code>
|
||||
An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.
|
||||
</code>
|
||||
|
||||
- [Elvin9/SecDrvPoolLeak](https://github.com/Elvin9/SecDrvPoolLeak)
|
||||
|
||||
### CVE-2018-7284 (2018-02-21)
|
||||
|
||||
<code>
|
||||
|
@ -11270,6 +11474,14 @@ A remote code execution vulnerability exists within multiple subsystems of Drupa
|
|||
- [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602)
|
||||
- [cyberharsh/DrupalCVE-2018-7602](https://github.com/cyberharsh/DrupalCVE-2018-7602)
|
||||
|
||||
### CVE-2018-7669 (2018-04-27)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file= URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack.
|
||||
</code>
|
||||
|
||||
- [palaziv/CVE-2018-7669](https://github.com/palaziv/CVE-2018-7669)
|
||||
|
||||
### CVE-2018-7690 (2018-12-13)
|
||||
|
||||
<code>
|
||||
|
@ -11370,6 +11582,14 @@ An issue was discovered in the web server in Flexense SyncBreeze Enterprise 10.6
|
|||
|
||||
- [EgeBalci/CVE-2018-8065](https://github.com/EgeBalci/CVE-2018-8065)
|
||||
|
||||
### CVE-2018-8078 (2018-03-13)
|
||||
|
||||
<code>
|
||||
YzmCMS 3.7 has Stored XSS via the title parameter to advertisement/adver/edit.html.
|
||||
</code>
|
||||
|
||||
- [Jx0n0/YZMCMSxss](https://github.com/Jx0n0/YZMCMSxss)
|
||||
|
||||
### CVE-2018-8090 (2018-07-25)
|
||||
|
||||
<code>
|
||||
|
@ -11378,6 +11598,14 @@ Quick Heal Total Security 64 bit 17.00 (QHTS64.exe), (QHTSFT64.exe) - Version 10
|
|||
|
||||
- [kernelm0de/CVE-2018-8090](https://github.com/kernelm0de/CVE-2018-8090)
|
||||
|
||||
### CVE-2018-8108 (2018-03-14)
|
||||
|
||||
<code>
|
||||
The select component in bui through 2018-03-13 has XSS because it performs an escape operation on already-escaped text, as demonstrated by workGroupList text.
|
||||
</code>
|
||||
|
||||
- [zlgxzswjy/BUI-select-xss](https://github.com/zlgxzswjy/BUI-select-xss)
|
||||
|
||||
### CVE-2018-8115 (2018-05-02)
|
||||
|
||||
<code>
|
||||
|
@ -11559,6 +11787,14 @@ Authentication bypass vulnerability in the core config manager in Nagios XI 5.2.
|
|||
|
||||
- [xfer0/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed](https://github.com/xfer0/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed)
|
||||
|
||||
### CVE-2018-8820 (2018-03-28)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Square 9 GlobalForms 6.2.x. A Time Based SQL injection vulnerability in the "match" parameter allows remote authenticated attackers to execute arbitrary SQL commands. It is possible to upgrade access to full server compromise via xp_cmdshell. In some cases, the authentication requirement for the attack can be met by sending the default admin credentials.
|
||||
</code>
|
||||
|
||||
- [hateshape/frevvomapexec](https://github.com/hateshape/frevvomapexec)
|
||||
|
||||
### CVE-2018-8897 (2018-05-08)
|
||||
|
||||
<code>
|
||||
|
@ -11586,6 +11822,14 @@ There is a SQL injection in the PHPSHE 1.6 userbank parameter.
|
|||
|
||||
- [coolboy0816/CVE-2018-8943](https://github.com/coolboy0816/CVE-2018-8943)
|
||||
|
||||
### CVE-2018-8970 (2018-03-24)
|
||||
|
||||
<code>
|
||||
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.
|
||||
</code>
|
||||
|
||||
- [tiran/CVE-2018-8970](https://github.com/tiran/CVE-2018-8970)
|
||||
|
||||
### CVE-2018-9059 (2018-04-20)
|
||||
|
||||
<code>
|
||||
|
@ -11644,6 +11888,7 @@ An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who
|
|||
</code>
|
||||
|
||||
- [wildkindcc/CVE-2018-9276](https://github.com/wildkindcc/CVE-2018-9276)
|
||||
- [AndyFeiLi/CVE-2018-9276](https://github.com/AndyFeiLi/CVE-2018-9276)
|
||||
- [A1vinSmith/CVE-2018-9276](https://github.com/A1vinSmith/CVE-2018-9276)
|
||||
|
||||
### CVE-2018-9375
|
||||
|
@ -12111,6 +12356,14 @@ An XML external entity (XXE) vulnerability in Fortify Software Security Center (
|
|||
|
||||
- [alt3kx/CVE-2018-12463](https://github.com/alt3kx/CVE-2018-12463)
|
||||
|
||||
### CVE-2018-12533 (2018-06-18)
|
||||
|
||||
<code>
|
||||
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
|
||||
</code>
|
||||
|
||||
- [TheKalin/CVE-2018-12533](https://github.com/TheKalin/CVE-2018-12533)
|
||||
|
||||
### CVE-2018-12537 (2018-08-14)
|
||||
|
||||
<code>
|
||||
|
@ -12206,6 +12459,7 @@ An Improper Limitation of a Pathname to a Restricted Directory ("Path Trave
|
|||
- [pwn3z/CVE-2018-13379-FortinetVPN](https://github.com/pwn3z/CVE-2018-13379-FortinetVPN)
|
||||
- [k4nfr3/CVE-2018-13379-Fortinet](https://github.com/k4nfr3/CVE-2018-13379-Fortinet)
|
||||
- [Zeop-CyberSec/fortios_vpnssl_traversal_leak](https://github.com/Zeop-CyberSec/fortios_vpnssl_traversal_leak)
|
||||
- [B1anda0/CVE-2018-13379](https://github.com/B1anda0/CVE-2018-13379)
|
||||
|
||||
### CVE-2018-13382 (2019-06-04)
|
||||
|
||||
|
@ -12232,6 +12486,14 @@ PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption
|
|||
|
||||
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
|
||||
|
||||
### CVE-2018-13797 (2018-07-10)
|
||||
|
||||
<code>
|
||||
The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.
|
||||
</code>
|
||||
|
||||
- [dsp-testing/CVE-2018-13797](https://github.com/dsp-testing/CVE-2018-13797)
|
||||
|
||||
### CVE-2018-13864 (2018-07-17)
|
||||
|
||||
<code>
|
||||
|
@ -12347,6 +12609,9 @@ In Laravel Framework through 5.5.40 and 5.6.x through 5.6.29, remote code execut
|
|||
- [Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader](https://github.com/Prabesh01/Laravel-PHP-Unit-RCE-Auto-shell-uploader)
|
||||
- [iansangaji/laravel-rce-cve-2018-15133](https://github.com/iansangaji/laravel-rce-cve-2018-15133)
|
||||
- [AlienX2001/better-poc-for-CVE-2018-15133](https://github.com/AlienX2001/better-poc-for-CVE-2018-15133)
|
||||
- [aljavier/exploit_laravel_cve-2018-15133](https://github.com/aljavier/exploit_laravel_cve-2018-15133)
|
||||
- [PwnedShell/Larascript](https://github.com/PwnedShell/Larascript)
|
||||
- [AzhariKun/CVE-2018-15133](https://github.com/AzhariKun/CVE-2018-15133)
|
||||
|
||||
### CVE-2018-15139 (2018-08-13)
|
||||
|
||||
|
@ -12389,6 +12654,7 @@ OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not dela
|
|||
- [coollce/CVE-2018-15473_burte](https://github.com/coollce/CVE-2018-15473_burte)
|
||||
- [Dirty-Racoon/CVE-2018-15473-py3](https://github.com/Dirty-Racoon/CVE-2018-15473-py3)
|
||||
- [Sait-Nuri/CVE-2018-15473](https://github.com/Sait-Nuri/CVE-2018-15473)
|
||||
- [WildfootW/CVE-2018-15473_OpenSSH_7.7](https://github.com/WildfootW/CVE-2018-15473_OpenSSH_7.7)
|
||||
|
||||
### CVE-2018-15499 (2018-08-24)
|
||||
|
||||
|
@ -12543,12 +12809,21 @@ Frog CMS 0.9.5 has an Upload vulnerability that can create files via /admin/?/pl
|
|||
|
||||
- [snappyJack/CVE-2018-16373](https://github.com/snappyJack/CVE-2018-16373)
|
||||
|
||||
### CVE-2018-16492 (2019-02-01)
|
||||
|
||||
<code>
|
||||
A prototype pollution vulnerability was found in module extend <2.0.2, ~<3.0.2 that allows an attacker to inject arbitrary properties onto Object.prototype.
|
||||
</code>
|
||||
|
||||
- [dsp-testing/CVE-2018-16492](https://github.com/dsp-testing/CVE-2018-16492)
|
||||
|
||||
### CVE-2018-16509 (2018-09-05)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
|
||||
</code>
|
||||
|
||||
- [farisv/PIL-RCE-Ghostscript-CVE-2018-16509](https://github.com/farisv/PIL-RCE-Ghostscript-CVE-2018-16509)
|
||||
- [knqyf263/CVE-2018-16509](https://github.com/knqyf263/CVE-2018-16509)
|
||||
- [cved-sources/cve-2018-16509](https://github.com/cved-sources/cve-2018-16509)
|
||||
- [rhpco/CVE-2018-16509](https://github.com/rhpco/CVE-2018-16509)
|
||||
|
@ -12595,8 +12870,17 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
|
|||
- [SalimAlk/CVE-2018-16763-](https://github.com/SalimAlk/CVE-2018-16763-)
|
||||
- [ecebotarosh/CVE-2018-16763-exploit](https://github.com/ecebotarosh/CVE-2018-16763-exploit)
|
||||
- [n3m1dotsys/CVE-2018-16763-Exploit-Python3](https://github.com/n3m1dotsys/CVE-2018-16763-Exploit-Python3)
|
||||
- [uwueviee/Fu3l-F1lt3r](https://github.com/uwueviee/Fu3l-F1lt3r)
|
||||
- [shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--](https://github.com/shoamshilo/Fuel-CMS-Remote-Code-Execution-1.4--RCE--)
|
||||
|
||||
### CVE-2018-16843 (2018-11-07)
|
||||
|
||||
<code>
|
||||
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
|
||||
</code>
|
||||
|
||||
- [flyniu666/ingress-nginx-0.21-1.19.5](https://github.com/flyniu666/ingress-nginx-0.21-1.19.5)
|
||||
|
||||
### CVE-2018-16854 (2018-11-26)
|
||||
|
||||
<code>
|
||||
|
@ -12909,6 +13193,7 @@ TP-Link Archer C5 devices through V2_160201_US allow remote command execution vi
|
|||
GitLab CE/EE, versions 8.18 up to 11.x before 11.3.11, 11.4 before 11.4.8, and 11.5 before 11.5.1, are vulnerable to an SSRF vulnerability in webhooks.
|
||||
</code>
|
||||
|
||||
- [xenophil90/edb-49263-fixed](https://github.com/xenophil90/edb-49263-fixed)
|
||||
- [Algafix/gitlab-RCE-11.4.7](https://github.com/Algafix/gitlab-RCE-11.4.7)
|
||||
|
||||
### CVE-2018-19592 (2019-09-27)
|
||||
|
@ -13018,6 +13303,14 @@ Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build
|
|||
|
||||
- [Alexandre-Bartel/CVE-2018-20343](https://github.com/Alexandre-Bartel/CVE-2018-20343)
|
||||
|
||||
### CVE-2018-20433 (2018-12-24)
|
||||
|
||||
<code>
|
||||
c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.
|
||||
</code>
|
||||
|
||||
- [shanika04/cp30_XXE_partial_fix](https://github.com/shanika04/cp30_XXE_partial_fix)
|
||||
|
||||
### CVE-2018-20434 (2019-04-24)
|
||||
|
||||
<code>
|
||||
|
@ -13074,6 +13367,22 @@ Tautulli versions 2.1.38 and below allows remote attackers to bypass intended ac
|
|||
|
||||
- [manmolecular/tautulli-cve-2018-21031](https://github.com/manmolecular/tautulli-cve-2018-21031)
|
||||
|
||||
### CVE-2018-1000001 (2018-01-31)
|
||||
|
||||
<code>
|
||||
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
|
||||
</code>
|
||||
|
||||
- [0x00-0x00/CVE-2018-1000001](https://github.com/0x00-0x00/CVE-2018-1000001)
|
||||
|
||||
### CVE-2018-1000006 (2018-01-24)
|
||||
|
||||
<code>
|
||||
GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, 1.6.15 and earlier has a vulnerability in the protocol handler, specifically Electron apps running on Windows 10, 7 or 2008 that register custom protocol handlers can be tricked in arbitrary command execution if the user clicks on a specially crafted URL. This has been fixed in versions 1.8.2-beta.4, 1.7.11, and 1.6.16.
|
||||
</code>
|
||||
|
||||
- [CHYbeta/CVE-2018-1000006-DEMO](https://github.com/CHYbeta/CVE-2018-1000006-DEMO)
|
||||
|
||||
### CVE-2018-1000030 (2018-02-08)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue