Auto Update 2021/03/22 00:10:35

This commit is contained in:
motikan2010-bot 2021-03-22 00:10:35 +09:00
parent 4fc8af0b24
commit da15181983
233 changed files with 12261 additions and 88 deletions

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 28126641,
"name": "CVE-2014-0196",
"full_name": "tempbottle\/CVE-2014-0196",
"owner": {
"login": "tempbottle",
"id": 1203820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1203820?v=4",
"html_url": "https:\/\/github.com\/tempbottle"
},
"html_url": "https:\/\/github.com\/tempbottle\/CVE-2014-0196",
"description": "CVE-2014-0196: Linux kernel pty layer race condition memory corruption",
"fork": false,
"created_at": "2014-12-17T07:39:00Z",
"updated_at": "2015-10-24T13:32:06Z",
"pushed_at": "2014-05-13T04:53:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -22,6 +22,52 @@
"watchers": 35,
"score": 0
},
{
"id": 21604310,
"name": "CVE-2014-0224",
"full_name": "iph0n3\/CVE-2014-0224",
"owner": {
"login": "iph0n3",
"id": 1528152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1528152?v=4",
"html_url": "https:\/\/github.com\/iph0n3"
},
"html_url": "https:\/\/github.com\/iph0n3\/CVE-2014-0224",
"description": null,
"fork": false,
"created_at": "2014-07-08T08:08:00Z",
"updated_at": "2015-08-10T05:31:12Z",
"pushed_at": "2014-06-06T08:33:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 21711116,
"name": "ccs-eval",
"full_name": "droptables\/ccs-eval",
"owner": {
"login": "droptables",
"id": 5084547,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5084547?v=4",
"html_url": "https:\/\/github.com\/droptables"
},
"html_url": "https:\/\/github.com\/droptables\/ccs-eval",
"description": "Used for evaluating hosts for CVE-2014-0224",
"fork": false,
"created_at": "2014-07-10T21:32:28Z",
"updated_at": "2015-04-07T04:27:18Z",
"pushed_at": "2014-07-10T21:41:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 21854976,
"name": "openssl-ccs-cve-2014-0224",
@ -44,5 +90,28 @@
"forks": 4,
"watchers": 12,
"score": 0
},
{
"id": 21900951,
"name": "CVE-2014-0224",
"full_name": "secretnonempty\/CVE-2014-0224",
"owner": {
"login": "secretnonempty",
"id": 1168808,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1168808?v=4",
"html_url": "https:\/\/github.com\/secretnonempty"
},
"html_url": "https:\/\/github.com\/secretnonempty\/CVE-2014-0224",
"description": null,
"fork": false,
"created_at": "2014-07-16T13:09:41Z",
"updated_at": "2020-07-23T03:32:39Z",
"pushed_at": "2014-07-18T06:53:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
}
]

25
2014/CVE-2014-0521.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 23252947,
"name": "cve-2014-0521",
"full_name": "molnarg\/cve-2014-0521",
"owner": {
"login": "molnarg",
"id": 894421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/894421?v=4",
"html_url": "https:\/\/github.com\/molnarg"
},
"html_url": "https:\/\/github.com\/molnarg\/cve-2014-0521",
"description": null,
"fork": false,
"created_at": "2014-08-23T09:54:18Z",
"updated_at": "2021-02-15T11:51:51Z",
"pushed_at": "2014-08-25T06:41:02Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 11,
"forks": 11,
"watchers": 12,
"score": 0
}
]

25
2014/CVE-2014-1677.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 22477484,
"name": "freePW_tc7200Eploit",
"full_name": "tihmstar\/freePW_tc7200Eploit",
"owner": {
"login": "tihmstar",
"id": 1363935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1363935?v=4",
"html_url": "https:\/\/github.com\/tihmstar"
},
"html_url": "https:\/\/github.com\/tihmstar\/freePW_tc7200Eploit",
"description": "Technicolor TC7200 - Credentials Disclosure CVE : CVE-2014-1677",
"fork": false,
"created_at": "2014-07-31T17:01:29Z",
"updated_at": "2019-10-08T13:33:12Z",
"pushed_at": "2014-07-31T17:07:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 21585576,
"name": "ElasticSearch-CVE-2014-3120",
"full_name": "echohtp\/ElasticSearch-CVE-2014-3120",
"owner": {
"login": "echohtp",
"id": 313060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/313060?v=4",
"html_url": "https:\/\/github.com\/echohtp"
},
"html_url": "https:\/\/github.com\/echohtp\/ElasticSearch-CVE-2014-3120",
"description": "POC Code to exploite CVE-2014-3120",
"fork": false,
"created_at": "2014-07-07T20:28:34Z",
"updated_at": "2020-08-26T00:54:13Z",
"pushed_at": "2014-07-07T20:35:30Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -1,4 +1,142 @@
[
{
"id": 24422837,
"name": "bash-cve-2014-6271-fixes",
"full_name": "dlitz\/bash-cve-2014-6271-fixes",
"owner": {
"login": "dlitz",
"id": 99377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99377?v=4",
"html_url": "https:\/\/github.com\/dlitz"
},
"html_url": "https:\/\/github.com\/dlitz\/bash-cve-2014-6271-fixes",
"description": "Collected fixes for bash CVE-2014-6271",
"fork": false,
"created_at": "2014-09-24T16:26:17Z",
"updated_at": "2014-09-24T16:26:17Z",
"pushed_at": "2014-09-24T17:38:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24427252,
"name": "ansible-bashpocalypse",
"full_name": "npm\/ansible-bashpocalypse",
"owner": {
"login": "npm",
"id": 6078720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6078720?v=4",
"html_url": "https:\/\/github.com\/npm"
},
"html_url": "https:\/\/github.com\/npm\/ansible-bashpocalypse",
"description": "Patch for CVE-2014-6271",
"fork": false,
"created_at": "2014-09-24T18:27:03Z",
"updated_at": "2019-11-15T20:59:42Z",
"pushed_at": "2014-09-24T19:03:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"score": 0
},
{
"id": 24433228,
"name": "patched-bash-4.3",
"full_name": "ryancnelson\/patched-bash-4.3",
"owner": {
"login": "ryancnelson",
"id": 347171,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/347171?v=4",
"html_url": "https:\/\/github.com\/ryancnelson"
},
"html_url": "https:\/\/github.com\/ryancnelson\/patched-bash-4.3",
"description": "patched-bash-4.3 for CVE-2014-6271",
"fork": false,
"created_at": "2014-09-24T21:24:43Z",
"updated_at": "2014-09-24T21:32:34Z",
"pushed_at": "2014-09-26T23:35:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24437176,
"name": "cookbook-bash-CVE-2014-6271",
"full_name": "jblaine\/cookbook-bash-CVE-2014-6271",
"owner": {
"login": "jblaine",
"id": 438740,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/438740?v=4",
"html_url": "https:\/\/github.com\/jblaine"
},
"html_url": "https:\/\/github.com\/jblaine\/cookbook-bash-CVE-2014-6271",
"description": "Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271",
"fork": false,
"created_at": "2014-09-25T00:11:01Z",
"updated_at": "2014-09-25T00:13:03Z",
"pushed_at": "2014-09-25T12:45:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24438512,
"name": "cve-2014-6271-spec",
"full_name": "rrreeeyyy\/cve-2014-6271-spec",
"owner": {
"login": "rrreeeyyy",
"id": 2457736,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2457736?v=4",
"html_url": "https:\/\/github.com\/rrreeeyyy"
},
"html_url": "https:\/\/github.com\/rrreeeyyy\/cve-2014-6271-spec",
"description": null,
"fork": false,
"created_at": "2014-09-25T01:12:04Z",
"updated_at": "2014-09-25T01:12:24Z",
"pushed_at": "2014-09-25T01:12:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24440225,
"name": "shellshock_scanner",
"full_name": "scottjpack\/shellshock_scanner",
"owner": {
"login": "scottjpack",
"id": 2293674,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2293674?v=4",
"html_url": "https:\/\/github.com\/scottjpack"
},
"html_url": "https:\/\/github.com\/scottjpack\/shellshock_scanner",
"description": "Python Scanner for \"ShellShock\" (CVE-2014-6271)",
"fork": false,
"created_at": "2014-09-25T02:15:24Z",
"updated_at": "2020-12-01T08:40:09Z",
"pushed_at": "2014-09-29T23:22:12Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 56,
"forks": 56,
"watchers": 42,
"score": 0
},
{
"id": 24441140,
"name": "Cgi-bin_bash_Reverse",
@ -22,6 +160,52 @@
"watchers": 1,
"score": 0
},
{
"id": 24446252,
"name": "bash-up",
"full_name": "justzx2011\/bash-up",
"owner": {
"login": "justzx2011",
"id": 1185865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1185865?v=4",
"html_url": "https:\/\/github.com\/justzx2011"
},
"html_url": "https:\/\/github.com\/justzx2011\/bash-up",
"description": "a auto script to fix CVE-2014-6271 bash vulnerability",
"fork": false,
"created_at": "2014-09-25T06:24:18Z",
"updated_at": "2014-09-25T06:24:18Z",
"pushed_at": "2014-09-25T06:31:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24449282,
"name": "CVE-2014-6271",
"full_name": "mattclegg\/CVE-2014-6271",
"owner": {
"login": "mattclegg",
"id": 303487,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/303487?v=4",
"html_url": "https:\/\/github.com\/mattclegg"
},
"html_url": "https:\/\/github.com\/mattclegg\/CVE-2014-6271",
"description": null,
"fork": false,
"created_at": "2014-09-25T08:10:26Z",
"updated_at": "2014-09-25T08:27:53Z",
"pushed_at": "2014-09-25T08:30:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24451053,
"name": "Nessus_CVE-2014-6271_check",
@ -45,6 +229,190 @@
"watchers": 0,
"score": 0
},
{
"id": 24457150,
"name": "Rainstorm",
"full_name": "RainMak3r\/Rainstorm",
"owner": {
"login": "RainMak3r",
"id": 3872733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3872733?v=4",
"html_url": "https:\/\/github.com\/RainMak3r"
},
"html_url": "https:\/\/github.com\/RainMak3r\/Rainstorm",
"description": "CVE-2014-6271 RCE tool ",
"fork": false,
"created_at": "2014-09-25T12:28:33Z",
"updated_at": "2018-11-16T13:59:04Z",
"pushed_at": "2014-09-26T01:09:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 24457675,
"name": "shocknaww",
"full_name": "gabemarshall\/shocknaww",
"owner": {
"login": "gabemarshall",
"id": 2541585,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2541585?v=4",
"html_url": "https:\/\/github.com\/gabemarshall"
},
"html_url": "https:\/\/github.com\/gabemarshall\/shocknaww",
"description": "Simple script to check for CVE-2014-6271",
"fork": false,
"created_at": "2014-09-25T12:46:13Z",
"updated_at": "2016-02-20T13:34:31Z",
"pushed_at": "2014-09-29T15:53:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 24458320,
"name": "CVE-2014-6271",
"full_name": "woltage\/CVE-2014-6271",
"owner": {
"login": "woltage",
"id": 250504,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/250504?v=4",
"html_url": "https:\/\/github.com\/woltage"
},
"html_url": "https:\/\/github.com\/woltage\/CVE-2014-6271",
"description": null,
"fork": false,
"created_at": "2014-09-25T13:06:50Z",
"updated_at": "2014-09-25T13:11:11Z",
"pushed_at": "2014-09-26T05:59:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24465754,
"name": "vagrant-shellshock",
"full_name": "ariarijp\/vagrant-shellshock",
"owner": {
"login": "ariarijp",
"id": 635649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/635649?v=4",
"html_url": "https:\/\/github.com\/ariarijp"
},
"html_url": "https:\/\/github.com\/ariarijp\/vagrant-shellshock",
"description": "CVE-2014-6271の検証用Vagrantfileです",
"fork": false,
"created_at": "2014-09-25T16:19:41Z",
"updated_at": "2014-09-25T16:19:46Z",
"pushed_at": "2014-09-28T04:25:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24477401,
"name": "shellshock",
"full_name": "themson\/shellshock",
"owner": {
"login": "themson",
"id": 6145047,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6145047?v=4",
"html_url": "https:\/\/github.com\/themson"
},
"html_url": "https:\/\/github.com\/themson\/shellshock",
"description": "scripts associate with bourne shell EVN function parsing vulnerability CVE-2014-6271",
"fork": false,
"created_at": "2014-09-25T22:22:40Z",
"updated_at": "2016-04-16T03:43:20Z",
"pushed_at": "2014-09-27T17:38:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 24481523,
"name": "BadBash",
"full_name": "securusglobal\/BadBash",
"owner": {
"login": "securusglobal",
"id": 709629,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/709629?v=4",
"html_url": "https:\/\/github.com\/securusglobal"
},
"html_url": "https:\/\/github.com\/securusglobal\/BadBash",
"description": "CVE-2014-6271 (ShellShock) RCE PoC tool ",
"fork": false,
"created_at": "2014-09-26T01:30:14Z",
"updated_at": "2020-09-25T16:27:43Z",
"pushed_at": "2014-09-26T01:35:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 24485944,
"name": "CVE-2014-6271",
"full_name": "villadora\/CVE-2014-6271",
"owner": {
"login": "villadora",
"id": 724998,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/724998?v=4",
"html_url": "https:\/\/github.com\/villadora"
},
"html_url": "https:\/\/github.com\/villadora\/CVE-2014-6271",
"description": "scaner for cve-2014-6271",
"fork": false,
"created_at": "2014-09-26T04:15:15Z",
"updated_at": "2014-09-28T02:16:43Z",
"pushed_at": "2014-09-26T04:15:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 24495682,
"name": "salt-shellshock",
"full_name": "APSL\/salt-shellshock",
"owner": {
"login": "APSL",
"id": 469968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/469968?v=4",
"html_url": "https:\/\/github.com\/APSL"
},
"html_url": "https:\/\/github.com\/APSL\/salt-shellshock",
"description": "Salt recipe for shellshock (CVE-2014-6271)",
"fork": false,
"created_at": "2014-09-26T10:30:37Z",
"updated_at": "2014-09-26T18:01:43Z",
"pushed_at": "2014-09-26T11:04:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 24504536,
"name": "bash-fix-exploit",
@ -68,6 +436,29 @@
"watchers": 0,
"score": 0
},
{
"id": 24511712,
"name": "debian-lenny-bash_3.2.52-cve-2014-6271",
"full_name": "internero\/debian-lenny-bash_3.2.52-cve-2014-6271",
"owner": {
"login": "internero",
"id": 553577,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/553577?v=4",
"html_url": "https:\/\/github.com\/internero"
},
"html_url": "https:\/\/github.com\/internero\/debian-lenny-bash_3.2.52-cve-2014-6271",
"description": "Debian Lenny Bash packages with cve-2014-6271 patches (i386 and amd64)",
"fork": false,
"created_at": "2014-09-26T18:59:04Z",
"updated_at": "2014-09-26T18:59:04Z",
"pushed_at": "2014-09-26T19:10:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24520969,
"name": "shellshock-shell",
@ -91,6 +482,98 @@
"watchers": 1,
"score": 0
},
{
"id": 24523190,
"name": "shellshock_crawler",
"full_name": "vonnyfly\/shellshock_crawler",
"owner": {
"login": "vonnyfly",
"id": 935511,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/935511?v=4",
"html_url": "https:\/\/github.com\/vonnyfly"
},
"html_url": "https:\/\/github.com\/vonnyfly\/shellshock_crawler",
"description": "Using google to scan sites for \"ShellShock\" (CVE-2014-6271)",
"fork": false,
"created_at": "2014-09-27T04:08:19Z",
"updated_at": "2014-09-27T04:09:17Z",
"pushed_at": "2014-09-27T04:18:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 24543190,
"name": "bash-3.2-fixed-CVE-2014-6271",
"full_name": "u20024804\/bash-3.2-fixed-CVE-2014-6271",
"owner": {
"login": "u20024804",
"id": 47252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4",
"html_url": "https:\/\/github.com\/u20024804"
},
"html_url": "https:\/\/github.com\/u20024804\/bash-3.2-fixed-CVE-2014-6271",
"description": null,
"fork": false,
"created_at": "2014-09-27T21:29:23Z",
"updated_at": "2014-09-27T22:21:09Z",
"pushed_at": "2014-09-27T22:21:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24544128,
"name": "bash-4.2-fixed-CVE-2014-6271",
"full_name": "u20024804\/bash-4.2-fixed-CVE-2014-6271",
"owner": {
"login": "u20024804",
"id": 47252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4",
"html_url": "https:\/\/github.com\/u20024804"
},
"html_url": "https:\/\/github.com\/u20024804\/bash-4.2-fixed-CVE-2014-6271",
"description": null,
"fork": false,
"created_at": "2014-09-27T22:22:27Z",
"updated_at": "2014-09-27T22:38:34Z",
"pushed_at": "2014-09-27T22:38:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24544131,
"name": "bash-4.3-fixed-CVE-2014-6271",
"full_name": "u20024804\/bash-4.3-fixed-CVE-2014-6271",
"owner": {
"login": "u20024804",
"id": 47252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4",
"html_url": "https:\/\/github.com\/u20024804"
},
"html_url": "https:\/\/github.com\/u20024804\/bash-4.3-fixed-CVE-2014-6271",
"description": null,
"fork": false,
"created_at": "2014-09-27T22:22:41Z",
"updated_at": "2014-09-27T22:58:14Z",
"pushed_at": "2014-09-27T22:58:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24549863,
"name": "shellshock-cgi",
@ -114,6 +597,144 @@
"watchers": 9,
"score": 0
},
{
"id": 24566397,
"name": "ShellShock-CGI-Scan",
"full_name": "proclnas\/ShellShock-CGI-Scan",
"owner": {
"login": "proclnas",
"id": 3154242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3154242?v=4",
"html_url": "https:\/\/github.com\/proclnas"
},
"html_url": "https:\/\/github.com\/proclnas\/ShellShock-CGI-Scan",
"description": "A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug)",
"fork": false,
"created_at": "2014-09-28T18:05:20Z",
"updated_at": "2020-04-01T13:28:02Z",
"pushed_at": "2014-09-28T17:57:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 24589519,
"name": "RIS",
"full_name": "sch3m4\/RIS",
"owner": {
"login": "sch3m4",
"id": 607081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/607081?v=4",
"html_url": "https:\/\/github.com\/sch3m4"
},
"html_url": "https:\/\/github.com\/sch3m4\/RIS",
"description": "CVE-2014-6271 Remote Interactive Shell - PoC Exploit",
"fork": false,
"created_at": "2014-09-29T10:06:18Z",
"updated_at": "2019-08-13T15:51:47Z",
"pushed_at": "2014-09-29T10:09:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 24595830,
"name": "CVE-2014-6271_Test",
"full_name": "ryeyao\/CVE-2014-6271_Test",
"owner": {
"login": "ryeyao",
"id": 1586403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1586403?v=4",
"html_url": "https:\/\/github.com\/ryeyao"
},
"html_url": "https:\/\/github.com\/ryeyao\/CVE-2014-6271_Test",
"description": null,
"fork": false,
"created_at": "2014-09-29T13:16:08Z",
"updated_at": "2014-12-22T09:56:08Z",
"pushed_at": "2014-09-29T18:33:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 24602197,
"name": "CGIShell",
"full_name": "cj1324\/CGIShell",
"owner": {
"login": "cj1324",
"id": 489649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/489649?v=4",
"html_url": "https:\/\/github.com\/cj1324"
},
"html_url": "https:\/\/github.com\/cj1324\/CGIShell",
"description": "shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGI",
"fork": false,
"created_at": "2014-09-29T16:02:15Z",
"updated_at": "2020-04-07T07:58:34Z",
"pushed_at": "2014-10-02T10:36:15Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 12,
"forks": 12,
"watchers": 14,
"score": 0
},
{
"id": 24608575,
"name": "puppet-shellshock",
"full_name": "renanvicente\/puppet-shellshock",
"owner": {
"login": "renanvicente",
"id": 5564668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5564668?v=4",
"html_url": "https:\/\/github.com\/renanvicente"
},
"html_url": "https:\/\/github.com\/renanvicente\/puppet-shellshock",
"description": "This module determine the vulnerability of a bash binary to the shellshock exploits (CVE-2014-6271 or CVE-2014-7169) and then patch that where possible",
"fork": false,
"created_at": "2014-09-29T18:57:38Z",
"updated_at": "2020-04-07T07:58:55Z",
"pushed_at": "2014-09-29T20:07:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 24765252,
"name": "Shellshock-Vulnerability-Scan",
"full_name": "indiandragon\/Shellshock-Vulnerability-Scan",
"owner": {
"login": "indiandragon",
"id": 1708856,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1708856?v=4",
"html_url": "https:\/\/github.com\/indiandragon"
},
"html_url": "https:\/\/github.com\/indiandragon\/Shellshock-Vulnerability-Scan",
"description": "Android app to scan for bash Vulnerability - CVE-2014-6271 also known as Shellshock",
"fork": false,
"created_at": "2014-10-03T16:22:28Z",
"updated_at": "2018-08-14T11:50:42Z",
"pushed_at": "2014-10-04T06:00:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 8,
"forks": 8,
"watchers": 8,
"score": 0
},
{
"id": 26286804,
"name": "pyshellshock",

View file

@ -59,13 +59,13 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2021-03-08T06:27:09Z",
"updated_at": "2021-03-21T10:12:55Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 38,
"forks": 38,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -36,8 +36,8 @@
"description": "Exploiting CVE-2016-2555 enumerating and dumping the underlying Database.",
"fork": false,
"created_at": "2021-03-20T11:42:32Z",
"updated_at": "2021-03-20T11:43:48Z",
"pushed_at": "2021-03-20T11:43:46Z",
"updated_at": "2021-03-21T14:03:02Z",
"pushed_at": "2021-03-21T14:03:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2021-03-15T05:37:56Z",
"updated_at": "2021-03-21T09:31:47Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"forks_count": 109,
"forks": 109,
"watchers": 275,
"watchers": 276,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Commvault-CVE-2017-18044",
"fork": false,
"created_at": "2018-10-02T19:18:31Z",
"updated_at": "2020-03-30T03:51:07Z",
"updated_at": "2021-03-21T10:31:14Z",
"pushed_at": "2018-10-07T18:12:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2021-03-16T06:37:24Z",
"updated_at": "2021-03-21T09:51:44Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 185,
"watchers_count": 185,
"stargazers_count": 186,
"watchers_count": 186,
"forks_count": 81,
"forks": 81,
"watchers": 185,
"watchers": 186,
"score": 0
},
{

25
2018/CVE-2018-0202.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158891873,
"name": "CVE-2018-0202",
"full_name": "jaychowjingjie\/CVE-2018-0202",
"owner": {
"login": "jaychowjingjie",
"id": 11684383,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684383?v=4",
"html_url": "https:\/\/github.com\/jaychowjingjie"
},
"html_url": "https:\/\/github.com\/jaychowjingjie\/CVE-2018-0202",
"description": "Security & Privacy in Computing(Fall 2018), Final Group Project at JHUISI, clamscan vulnerability in Cisco's ClamAV 0.99.3",
"fork": false,
"created_at": "2018-11-24T01:18:52Z",
"updated_at": "2019-03-26T05:00:47Z",
"pushed_at": "2019-03-26T05:00:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 162431036,
"name": "CVE-2018-0296",
"full_name": "qiantu88\/CVE-2018-0296",
"owner": {
"login": "qiantu88",
"id": 35452263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4",
"html_url": "https:\/\/github.com\/qiantu88"
},
"html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-0296",
"description": "https:\/\/github.com\/milo2012\/CVE-2018-0296.git",
"fork": false,
"created_at": "2018-12-19T11:57:43Z",
"updated_at": "2018-12-19T11:59:47Z",
"pushed_at": "2018-12-19T11:59:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-0708.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 198731225,
"name": "CVE-2019-0708",
"full_name": "ntkernel0\/CVE-2019-0708",
"owner": {
"login": "ntkernel0",
"id": 46866847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46866847?v=4",
"html_url": "https:\/\/github.com\/ntkernel0"
},
"html_url": "https:\/\/github.com\/ntkernel0\/CVE-2019-0708",
"description": "收集网上CVE-2018-0708的poc和exp(目前没有找到exp)",
"fork": false,
"created_at": "2019-07-25T01:05:21Z",
"updated_at": "2019-12-07T02:05:23Z",
"pushed_at": "2019-07-25T01:03:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-0952.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 145615979,
"name": "CVE-2018-0952-SystemCollector",
"full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
"owner": {
"login": "atredispartners",
"id": 7254370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4",
"html_url": "https:\/\/github.com\/atredispartners"
},
"html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
"fork": false,
"created_at": "2018-08-21T20:29:10Z",
"updated_at": "2021-02-02T05:09:56Z",
"pushed_at": "2018-08-21T20:30:24Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 36,
"forks": 36,
"watchers": 107,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 216815203,
"name": "CVE-2018-1000082-exploit",
"full_name": "SECFORCE\/CVE-2018-1000082-exploit",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2018-1000082-exploit",
"description": null,
"fork": false,
"created_at": "2019-10-22T13:02:02Z",
"updated_at": "2020-04-22T03:28:35Z",
"pushed_at": "2019-10-22T13:02:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 156499957,
"name": "cve-2018-1000134",
"full_name": "dragotime\/cve-2018-1000134",
"owner": {
"login": "dragotime",
"id": 43851975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43851975?v=4",
"html_url": "https:\/\/github.com\/dragotime"
},
"html_url": "https:\/\/github.com\/dragotime\/cve-2018-1000134",
"description": null,
"fork": false,
"created_at": "2018-11-07T06:22:47Z",
"updated_at": "2018-11-07T06:22:47Z",
"pushed_at": "2018-11-07T06:22:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -0,0 +1,48 @@
[
{
"id": 186699953,
"name": "rsyslog-librelp-CVE-2018-1000140",
"full_name": "s0\/rsyslog-librelp-CVE-2018-1000140",
"owner": {
"login": "s0",
"id": 3319932,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3319932?v=4",
"html_url": "https:\/\/github.com\/s0"
},
"html_url": "https:\/\/github.com\/s0\/rsyslog-librelp-CVE-2018-1000140",
"description": "Pinned version of rsyslov vulnerable to CVE-2018-1000140",
"fork": false,
"created_at": "2019-05-14T21:02:07Z",
"updated_at": "2019-05-14T21:08:19Z",
"pushed_at": "2019-05-14T21:07:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 186706555,
"name": "rsyslog-librelp-CVE-2018-1000140-fixed",
"full_name": "s0\/rsyslog-librelp-CVE-2018-1000140-fixed",
"owner": {
"login": "s0",
"id": 3319932,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3319932?v=4",
"html_url": "https:\/\/github.com\/s0"
},
"html_url": "https:\/\/github.com\/s0\/rsyslog-librelp-CVE-2018-1000140-fixed",
"description": null,
"fork": false,
"created_at": "2019-05-14T21:58:54Z",
"updated_at": "2019-05-14T21:59:39Z",
"pushed_at": "2019-05-14T21:59:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 183944666,
"name": "ITS",
"full_name": "zann1x\/ITS",
"owner": {
"login": "zann1x",
"id": 19776837,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19776837?v=4",
"html_url": "https:\/\/github.com\/zann1x"
},
"html_url": "https:\/\/github.com\/zann1x\/ITS",
"description": "Repo for a uni project to give a detailed explanation of CVE-2018-1000224",
"fork": false,
"created_at": "2019-04-28T18:31:03Z",
"updated_at": "2019-11-02T15:04:46Z",
"pushed_at": "2019-06-21T13:14:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -0,0 +1,25 @@
[
{
"id": 148814288,
"name": "CVE-2018-1000802-PoC",
"full_name": "tna0y\/CVE-2018-1000802-PoC",
"owner": {
"login": "tna0y",
"id": 22504374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22504374?v=4",
"html_url": "https:\/\/github.com\/tna0y"
},
"html_url": "https:\/\/github.com\/tna0y\/CVE-2018-1000802-PoC",
"description": "Python CVE-2018-1000802 Proof-of-Concept",
"fork": false,
"created_at": "2018-09-14T16:22:12Z",
"updated_at": "2020-05-29T07:36:51Z",
"pushed_at": "2018-09-14T16:38:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 183322760,
"name": "CVE-2019-1003000_RCE-DETECTION",
"full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"owner": {
"login": "1NTheKut",
"id": 26243759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26243759?v=4",
"html_url": "https:\/\/github.com\/1NTheKut"
},
"html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
"description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)",
"fork": false,
"created_at": "2019-04-24T23:52:42Z",
"updated_at": "2020-09-25T09:24:39Z",
"pushed_at": "2019-05-01T07:11:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 291078833,
"name": "CVE-2018-1000861",

117
2018/CVE-2018-1002105.json Normal file
View file

@ -0,0 +1,117 @@
[
{
"id": 160451056,
"name": "cve-2018-1002105",
"full_name": "gravitational\/cve-2018-1002105",
"owner": {
"login": "gravitational",
"id": 10781132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10781132?v=4",
"html_url": "https:\/\/github.com\/gravitational"
},
"html_url": "https:\/\/github.com\/gravitational\/cve-2018-1002105",
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2021-03-02T14:25:22Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 193,
"watchers_count": 193,
"forks_count": 25,
"forks": 25,
"watchers": 193,
"score": 0
},
{
"id": 160665138,
"name": "poc_CVE-2018-1002105",
"full_name": "evict\/poc_CVE-2018-1002105",
"owner": {
"login": "evict",
"id": 7238650,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7238650?v=4",
"html_url": "https:\/\/github.com\/evict"
},
"html_url": "https:\/\/github.com\/evict\/poc_CVE-2018-1002105",
"description": "PoC for CVE-2018-1002105.",
"fork": false,
"created_at": "2018-12-06T11:28:02Z",
"updated_at": "2021-03-04T03:16:53Z",
"pushed_at": "2018-12-21T14:34:04Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 39,
"forks": 39,
"watchers": 216,
"score": 0
},
{
"id": 161109755,
"name": "Kubernetes-1.12.3-all-auto-install",
"full_name": "imlzw\/Kubernetes-1.12.3-all-auto-install",
"owner": {
"login": "imlzw",
"id": 7478692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7478692?v=4",
"html_url": "https:\/\/github.com\/imlzw"
},
"html_url": "https:\/\/github.com\/imlzw\/Kubernetes-1.12.3-all-auto-install",
"description": "个人整理的Centos7.x + Kubernetes-1.12.3 + Dashboard-1.8.3 无 CVE-2018-1002105 漏洞的master节点全自动快速一键安装部署文件适用于测试环境生产环境的快速安装部署",
"fork": false,
"created_at": "2018-12-10T03:14:55Z",
"updated_at": "2021-01-24T18:36:35Z",
"pushed_at": "2019-02-26T08:49:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 184282942,
"name": "cve-2018-1002105",
"full_name": "bgeesaman\/cve-2018-1002105",
"owner": {
"login": "bgeesaman",
"id": 3769609,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3769609?v=4",
"html_url": "https:\/\/github.com\/bgeesaman"
},
"html_url": "https:\/\/github.com\/bgeesaman\/cve-2018-1002105",
"description": "PoC command injection example for cve-2018-1002105 based off https:\/\/github.com\/gravitational\/cve-2018-1002105",
"fork": false,
"created_at": "2019-04-30T15:01:23Z",
"updated_at": "2019-04-30T15:14:04Z",
"pushed_at": "2019-04-30T15:14:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 209629712,
"name": "cve-2018-1002105",
"full_name": "mdnix\/cve-2018-1002105",
"owner": {
"login": "mdnix",
"id": 43579204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43579204?v=4",
"html_url": "https:\/\/github.com\/mdnix"
},
"html_url": "https:\/\/github.com\/mdnix\/cve-2018-1002105",
"description": null,
"fork": false,
"created_at": "2019-09-19T19:08:02Z",
"updated_at": "2020-07-17T07:40:59Z",
"pushed_at": "2019-09-23T15:50:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-10118.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 191191957,
"name": "CVE-2018-10118",
"full_name": "GeunSam2\/CVE-2018-10118",
"owner": {
"login": "GeunSam2",
"id": 41275199,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275199?v=4",
"html_url": "https:\/\/github.com\/GeunSam2"
},
"html_url": "https:\/\/github.com\/GeunSam2\/CVE-2018-10118",
"description": "exploit tool of CVE-2018-10118",
"fork": false,
"created_at": "2019-06-10T15:13:25Z",
"updated_at": "2019-06-10T15:13:58Z",
"pushed_at": "2019-06-10T15:13:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-10517.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 156886365,
"name": "CVE-2018-10517",
"full_name": "0x00-0x00\/CVE-2018-10517",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10517",
"description": "CMS Made Simple 2.2.7 RCE exploit",
"fork": false,
"created_at": "2018-11-09T16:09:39Z",
"updated_at": "2020-06-07T11:21:05Z",
"pushed_at": "2018-11-09T16:09:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
}
]

25
2018/CVE-2018-10920.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 167577440,
"name": "CVE-2018-10920_PoC",
"full_name": "shutingrz\/CVE-2018-10920_PoC",
"owner": {
"login": "shutingrz",
"id": 2587857,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2587857?v=4",
"html_url": "https:\/\/github.com\/shutingrz"
},
"html_url": "https:\/\/github.com\/shutingrz\/CVE-2018-10920_PoC",
"description": "Knot Resolver CVE-2018-10920 \/ DO NOT ABUSE",
"fork": false,
"created_at": "2019-01-25T16:24:49Z",
"updated_at": "2019-01-25T16:26:11Z",
"pushed_at": "2019-01-25T16:26:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 153427159,
"name": "CVE-2018-10933",
"full_name": "SoledaD208\/CVE-2018-10933",
"owner": {
"login": "SoledaD208",
"id": 8731578,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8731578?v=4",
"html_url": "https:\/\/github.com\/SoledaD208"
},
"html_url": "https:\/\/github.com\/SoledaD208\/CVE-2018-10933",
"description": "CVE-2018-10933 very simple POC",
"fork": false,
"created_at": "2018-10-17T09:01:44Z",
"updated_at": "2020-12-18T03:51:25Z",
"pushed_at": "2018-10-23T13:51:06Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 40,
"forks": 40,
"watchers": 131,
"score": 0
},
{
"id": 153468806,
"name": "CVE-2018-10933",
@ -22,6 +45,581 @@
"watchers": 467,
"score": 0
},
{
"id": 153477523,
"name": "CVE-2018-10933",
"full_name": "hook-s3c\/CVE-2018-10933",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
"fork": false,
"created_at": "2018-10-17T15:09:41Z",
"updated_at": "2018-10-17T15:09:44Z",
"pushed_at": "2018-10-17T15:09:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 153506738,
"name": "CVE-2018-10933",
"full_name": "kn6869610\/CVE-2018-10933",
"owner": {
"login": "kn6869610",
"id": 6917744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
"html_url": "https:\/\/github.com\/kn6869610"
},
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
"fork": false,
"created_at": "2018-10-17T18:44:05Z",
"updated_at": "2018-10-22T03:02:27Z",
"pushed_at": "2018-10-17T18:45:30Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 13,
"score": 0
},
{
"id": 153534574,
"name": "libssh-scanner",
"full_name": "leapsecurity\/libssh-scanner",
"owner": {
"login": "leapsecurity",
"id": 40601062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40601062?v=4",
"html_url": "https:\/\/github.com\/leapsecurity"
},
"html_url": "https:\/\/github.com\/leapsecurity\/libssh-scanner",
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2021-03-17T03:38:40Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 231,
"watchers_count": 231,
"forks_count": 55,
"forks": 55,
"watchers": 231,
"score": 0
},
{
"id": 153562229,
"name": "CVE-2018-10933_ssh",
"full_name": "likescam\/CVE-2018-10933_ssh",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
"description": null,
"fork": false,
"created_at": "2018-10-18T04:10:25Z",
"updated_at": "2018-10-18T04:10:39Z",
"pushed_at": "2018-10-18T04:10:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 153562319,
"name": "bpnd-libssh",
"full_name": "trbpnd\/bpnd-libssh",
"owner": {
"login": "trbpnd",
"id": 39193403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4",
"html_url": "https:\/\/github.com\/trbpnd"
},
"html_url": "https:\/\/github.com\/trbpnd\/bpnd-libssh",
"description": "Multi-threaded, reliable scanner for CVE-2018-10933.",
"fork": false,
"created_at": "2018-10-18T04:11:33Z",
"updated_at": "2018-10-23T03:13:35Z",
"pushed_at": "2018-10-22T16:44:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 153598283,
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
"full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"description": null,
"fork": false,
"created_at": "2018-10-18T09:27:08Z",
"updated_at": "2018-10-18T16:47:53Z",
"pushed_at": "2018-10-18T09:27:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 153643745,
"name": "hunt-for-cve-2018-10933",
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
"owner": {
"login": "marco-lancini",
"id": 1472968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
"html_url": "https:\/\/github.com\/marco-lancini"
},
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
"fork": false,
"created_at": "2018-10-18T15:08:25Z",
"updated_at": "2020-10-25T16:36:25Z",
"pushed_at": "2018-10-18T15:11:35Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
},
{
"id": 153675108,
"name": "cve-2018-10933",
"full_name": "hackerhouse-opensource\/cve-2018-10933",
"owner": {
"login": "hackerhouse-opensource",
"id": 43967630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4",
"html_url": "https:\/\/github.com\/hackerhouse-opensource"
},
"html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2018-10933",
"description": "cve-2018-10933 libssh authentication bypass",
"fork": false,
"created_at": "2018-10-18T19:13:45Z",
"updated_at": "2021-02-21T08:07:54Z",
"pushed_at": "2018-10-21T21:24:29Z",
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 31,
"forks": 31,
"watchers": 97,
"score": 0
},
{
"id": 153681539,
"name": "cve-2018-10933",
"full_name": "cve-2018\/cve-2018-10933",
"owner": {
"login": "cve-2018",
"id": 44275695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44275695?v=4",
"html_url": "https:\/\/github.com\/cve-2018"
},
"html_url": "https:\/\/github.com\/cve-2018\/cve-2018-10933",
"description": null,
"fork": false,
"created_at": "2018-10-18T20:11:22Z",
"updated_at": "2018-10-23T03:22:26Z",
"pushed_at": "2018-10-23T03:22:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 153855090,
"name": "CVE-2018-10933",
"full_name": "jas502n\/CVE-2018-10933",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
"description": "libssh CVE-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:24:04Z",
"updated_at": "2019-07-31T09:33:04Z",
"pushed_at": "2018-10-20T00:29:04Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks": 5,
"watchers": 19,
"score": 0
},
{
"id": 153856713,
"name": "cve-2018-10933_poc",
"full_name": "ninp0\/cve-2018-10933_poc",
"owner": {
"login": "ninp0",
"id": 1008583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
"html_url": "https:\/\/github.com\/ninp0"
},
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:53:24Z",
"updated_at": "2018-10-22T15:05:53Z",
"pushed_at": "2018-10-20T01:53:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 153878160,
"name": "CVE-2018-10933_Scanner",
"full_name": "pghook\/CVE-2018-10933_Scanner",
"owner": {
"login": "pghook",
"id": 14160529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
"html_url": "https:\/\/github.com\/pghook"
},
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
"description": null,
"fork": false,
"created_at": "2018-10-20T06:53:59Z",
"updated_at": "2020-05-15T17:20:56Z",
"pushed_at": "2018-10-20T04:54:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 153920395,
"name": "POC-CVE-2018-10933",
"full_name": "Virgula0\/POC-CVE-2018-10933",
"owner": {
"login": "Virgula0",
"id": 16546435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16546435?v=4",
"html_url": "https:\/\/github.com\/Virgula0"
},
"html_url": "https:\/\/github.com\/Virgula0\/POC-CVE-2018-10933",
"description": "LibSSH Authentication Bypass Exploit using RCE",
"fork": false,
"created_at": "2018-10-20T15:34:26Z",
"updated_at": "2021-03-03T11:40:37Z",
"pushed_at": "2018-10-25T18:23:52Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
"forks": 8,
"watchers": 12,
"score": 0
},
{
"id": 153975086,
"name": "pythonprojects-CVE-2018-10933",
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
"owner": {
"login": "shifa123",
"id": 18241082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
"html_url": "https:\/\/github.com\/shifa123"
},
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-21T05:01:12Z",
"updated_at": "2021-01-15T03:06:17Z",
"pushed_at": "2018-10-21T05:13:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
},
{
"id": 154050332,
"name": "CVE-2018-10933",
"full_name": "xFreed0m\/CVE-2018-10933",
"owner": {
"login": "xFreed0m",
"id": 13978578,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13978578?v=4",
"html_url": "https:\/\/github.com\/xFreed0m"
},
"html_url": "https:\/\/github.com\/xFreed0m\/CVE-2018-10933",
"description": "a python script to exploit libssh authentication vulnerability",
"fork": false,
"created_at": "2018-10-21T20:41:40Z",
"updated_at": "2020-07-09T18:52:44Z",
"pushed_at": "2019-12-05T13:34:11Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 154390432,
"name": "CVE-2018-10933",
"full_name": "Bifrozt\/CVE-2018-10933",
"owner": {
"login": "Bifrozt",
"id": 8437560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8437560?v=4",
"html_url": "https:\/\/github.com\/Bifrozt"
},
"html_url": "https:\/\/github.com\/Bifrozt\/CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-23T20:11:35Z",
"updated_at": "2018-10-23T20:14:53Z",
"pushed_at": "2018-10-23T20:14:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 154398082,
"name": "CVE-2018-10933",
"full_name": "r3dxpl0it\/CVE-2018-10933",
"owner": {
"login": "r3dxpl0it",
"id": 43002597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4",
"html_url": "https:\/\/github.com\/r3dxpl0it"
},
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-10933",
"description": "CVE-2018-10933 POC (LIBSSH)",
"fork": false,
"created_at": "2018-10-23T21:17:52Z",
"updated_at": "2021-03-03T11:40:35Z",
"pushed_at": "2018-10-24T07:58:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 154500673,
"name": "libssh-scanner",
"full_name": "ivanacostarubio\/libssh-scanner",
"owner": {
"login": "ivanacostarubio",
"id": 16559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16559?v=4",
"html_url": "https:\/\/github.com\/ivanacostarubio"
},
"html_url": "https:\/\/github.com\/ivanacostarubio\/libssh-scanner",
"description": "A libssh CVE-2018-10933 scanner written in rust",
"fork": false,
"created_at": "2018-10-24T12:52:09Z",
"updated_at": "2019-02-24T23:51:07Z",
"pushed_at": "2018-10-24T12:52:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 154520949,
"name": "precompiled-CVE-2018-10933",
"full_name": "throwawayaccount12312312\/precompiled-CVE-2018-10933",
"owner": {
"login": "throwawayaccount12312312",
"id": 44440605,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44440605?v=4",
"html_url": "https:\/\/github.com\/throwawayaccount12312312"
},
"html_url": "https:\/\/github.com\/throwawayaccount12312312\/precompiled-CVE-2018-10933",
"description": null,
"fork": false,
"created_at": "2018-10-24T15:02:51Z",
"updated_at": "2018-10-24T15:04:19Z",
"pushed_at": "2018-10-24T15:04:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 154621353,
"name": "CVE-2018-10933",
"full_name": "ensimag-security\/CVE-2018-10933",
"owner": {
"login": "ensimag-security",
"id": 44459067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44459067?v=4",
"html_url": "https:\/\/github.com\/ensimag-security"
},
"html_url": "https:\/\/github.com\/ensimag-security\/CVE-2018-10933",
"description": null,
"fork": false,
"created_at": "2018-10-25T06:32:06Z",
"updated_at": "2018-11-28T14:11:24Z",
"pushed_at": "2018-11-28T14:14:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 157908147,
"name": "libSSH-bypass",
"full_name": "Ad1bDaw\/libSSH-bypass",
"owner": {
"login": "Ad1bDaw",
"id": 35436703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35436703?v=4",
"html_url": "https:\/\/github.com\/Ad1bDaw"
},
"html_url": "https:\/\/github.com\/Ad1bDaw\/libSSH-bypass",
"description": "Implementation of CVE-2018-10933 with CIDR block scanner ",
"fork": false,
"created_at": "2018-11-16T18:46:28Z",
"updated_at": "2018-11-16T19:00:29Z",
"pushed_at": "2018-11-16T19:00:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 158524069,
"name": "CVE-2018-10933-POC",
"full_name": "sambiyal\/CVE-2018-10933-POC",
"owner": {
"login": "sambiyal",
"id": 25122043,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25122043?v=4",
"html_url": "https:\/\/github.com\/sambiyal"
},
"html_url": "https:\/\/github.com\/sambiyal\/CVE-2018-10933-POC",
"description": "libSSH bypass",
"fork": false,
"created_at": "2018-11-21T09:34:12Z",
"updated_at": "2018-11-21T09:57:11Z",
"pushed_at": "2018-11-21T09:43:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 162456991,
"name": "LibSSH-Authentication-Bypass",
"full_name": "nikhil1232\/LibSSH-Authentication-Bypass",
"owner": {
"login": "nikhil1232",
"id": 39535219,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39535219?v=4",
"html_url": "https:\/\/github.com\/nikhil1232"
},
"html_url": "https:\/\/github.com\/nikhil1232\/LibSSH-Authentication-Bypass",
"description": "LibSSH Authentication Bypass CVE-2018-10933",
"fork": false,
"created_at": "2018-12-19T15:33:00Z",
"updated_at": "2020-01-09T05:02:59Z",
"pushed_at": "2018-12-19T15:46:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 169983604,
"name": "LibSSH-exploit",
"full_name": "Kurlee\/LibSSH-exploit",
"owner": {
"login": "Kurlee",
"id": 44727604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44727604?v=4",
"html_url": "https:\/\/github.com\/Kurlee"
},
"html_url": "https:\/\/github.com\/Kurlee\/LibSSH-exploit",
"description": "Takes advantage of CVE-2018-10933",
"fork": false,
"created_at": "2019-02-10T13:55:06Z",
"updated_at": "2019-02-10T14:02:29Z",
"pushed_at": "2019-02-10T14:02:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 223548534,
"name": "Libssh-server-CVE-2018-10933",
"full_name": "crispy-peppers\/Libssh-server-CVE-2018-10933",
"owner": {
"login": "crispy-peppers",
"id": 23626307,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23626307?v=4",
"html_url": "https:\/\/github.com\/crispy-peppers"
},
"html_url": "https:\/\/github.com\/crispy-peppers\/Libssh-server-CVE-2018-10933",
"description": null,
"fork": false,
"created_at": "2019-11-23T07:22:25Z",
"updated_at": "2019-11-23T07:23:28Z",
"pushed_at": "2019-11-23T07:23:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 246461801,
"name": "CVE-2018-10933",

25
2018/CVE-2018-10936.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158224861,
"name": "CVE-2018-10936",
"full_name": "tafamace\/CVE-2018-10936",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-10936",
"description": null,
"fork": false,
"created_at": "2018-11-19T13:09:47Z",
"updated_at": "2018-11-19T13:13:10Z",
"pushed_at": "2018-11-19T13:13:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-10949.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 147528239,
"name": "CVE-2018-10949",
"full_name": "0x00-0x00\/CVE-2018-10949",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10949",
"description": "Zimbra Collaboration Suite Username Enumeration ",
"fork": false,
"created_at": "2018-09-05T14:09:13Z",
"updated_at": "2020-10-20T18:45:33Z",
"pushed_at": "2018-09-05T14:10:09Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -137,6 +137,167 @@
"watchers": 1,
"score": 0
},
{
"id": 143149359,
"name": "CVE-2018-11235",
"full_name": "knqyf263\/CVE-2018-11235",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11235",
"description": "CVE-2018-11235 (Git)",
"fork": false,
"created_at": "2018-08-01T11:52:54Z",
"updated_at": "2019-04-24T05:32:20Z",
"pushed_at": "2018-11-23T14:34:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 160238249,
"name": "CVE-2018-11235",
"full_name": "ygouzerh\/CVE-2018-11235",
"owner": {
"login": "ygouzerh",
"id": 33725211,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33725211?v=4",
"html_url": "https:\/\/github.com\/ygouzerh"
},
"html_url": "https:\/\/github.com\/ygouzerh\/CVE-2018-11235",
"description": "Proof of Concept - RCE Exploitation : Git submodules' names vulnerability - Ensimag November 2018",
"fork": false,
"created_at": "2018-12-03T18:50:27Z",
"updated_at": "2019-05-14T02:06:19Z",
"pushed_at": "2019-05-14T02:06:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 180293963,
"name": "CVE-2018-11235-Git-Submodule-CE",
"full_name": "qweraqq\/CVE-2018-11235-Git-Submodule-CE",
"owner": {
"login": "qweraqq",
"id": 5697699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5697699?v=4",
"html_url": "https:\/\/github.com\/qweraqq"
},
"html_url": "https:\/\/github.com\/qweraqq\/CVE-2018-11235-Git-Submodule-CE",
"description": "CVE-2018-11235-Git PoC",
"fork": false,
"created_at": "2019-04-09T05:48:22Z",
"updated_at": "2020-12-13T18:51:12Z",
"pushed_at": "2019-04-09T09:23:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 189964702,
"name": "CVE-2018-11235",
"full_name": "jhswartz\/CVE-2018-11235",
"owner": {
"login": "jhswartz",
"id": 51316199,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51316199?v=4",
"html_url": "https:\/\/github.com\/jhswartz"
},
"html_url": "https:\/\/github.com\/jhswartz\/CVE-2018-11235",
"description": "git {<2.13.7, <2.14.4, <2.15.2, <2.16.4, <2.17.1} remote code execution",
"fork": false,
"created_at": "2019-06-03T08:24:16Z",
"updated_at": "2019-06-22T09:47:38Z",
"pushed_at": "2019-06-03T08:24:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 193244232,
"name": "CVE-2018-11235",
"full_name": "AnonymKing\/CVE-2018-11235",
"owner": {
"login": "AnonymKing",
"id": 26847177,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26847177?v=4",
"html_url": "https:\/\/github.com\/AnonymKing"
},
"html_url": "https:\/\/github.com\/AnonymKing\/CVE-2018-11235",
"description": "CVE-2018-11235PoC && Exp",
"fork": false,
"created_at": "2019-06-22T14:39:08Z",
"updated_at": "2019-06-24T09:04:10Z",
"pushed_at": "2019-06-22T14:42:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 195966434,
"name": "CVE-2018-11235",
"full_name": "morhax\/CVE-2018-11235",
"owner": {
"login": "morhax",
"id": 12779060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
"html_url": "https:\/\/github.com\/morhax"
},
"html_url": "https:\/\/github.com\/morhax\/CVE-2018-11235",
"description": null,
"fork": false,
"created_at": "2019-07-09T08:28:49Z",
"updated_at": "2019-07-09T08:28:49Z",
"pushed_at": "2019-07-09T08:28:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 218206529,
"name": "CVE-2018-11235-test",
"full_name": "cchang27\/CVE-2018-11235-test",
"owner": {
"login": "cchang27",
"id": 54129952,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54129952?v=4",
"html_url": "https:\/\/github.com\/cchang27"
},
"html_url": "https:\/\/github.com\/cchang27\/CVE-2018-11235-test",
"description": null,
"fork": false,
"created_at": "2019-10-29T04:49:45Z",
"updated_at": "2019-10-29T04:49:45Z",
"pushed_at": "2019-10-29T04:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 245079097,
"name": "CVE-2018-11235",

48
2018/CVE-2018-1133.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 175834951,
"name": "MoodleExploit",
"full_name": "darrynten\/MoodleExploit",
"owner": {
"login": "darrynten",
"id": 3657251,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3657251?v=4",
"html_url": "https:\/\/github.com\/darrynten"
},
"html_url": "https:\/\/github.com\/darrynten\/MoodleExploit",
"description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133",
"fork": false,
"created_at": "2019-03-15T14:25:20Z",
"updated_at": "2021-02-20T18:14:31Z",
"pushed_at": "2019-03-15T14:48:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 324510428,
"name": "MOODLE-3.X-Remote-Code-Execution",
"full_name": "Feidao-fei\/MOODLE-3.X-Remote-Code-Execution",
"owner": {
"login": "Feidao-fei",
"id": 52765767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52765767?v=4",
"html_url": "https:\/\/github.com\/Feidao-fei"
},
"html_url": "https:\/\/github.com\/Feidao-fei\/MOODLE-3.X-Remote-Code-Execution",
"description": "cve-2018-1133 moodle athenticated as teacher remote code execution. ",
"fork": false,
"created_at": "2020-12-26T08:09:19Z",
"updated_at": "2021-01-22T18:16:32Z",
"pushed_at": "2019-03-16T15:19:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-11564.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 191192237,
"name": "CVE-2018-11564",
"full_name": "GeunSam2\/CVE-2018-11564",
"owner": {
"login": "GeunSam2",
"id": 41275199,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275199?v=4",
"html_url": "https:\/\/github.com\/GeunSam2"
},
"html_url": "https:\/\/github.com\/GeunSam2\/CVE-2018-11564",
"description": "exploit tool of CVE-2018-11564",
"fork": false,
"created_at": "2019-06-10T15:15:07Z",
"updated_at": "2019-06-10T15:15:33Z",
"pushed_at": "2019-06-10T15:15:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-11686.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 176804317,
"name": "CVE-2018-11686",
"full_name": "mpgn\/CVE-2018-11686",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2018-11686",
"description": "CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6",
"fork": false,
"created_at": "2019-03-20T19:36:10Z",
"updated_at": "2020-05-27T12:15:17Z",
"pushed_at": "2019-03-20T20:56:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
}
]

48
2018/CVE-2018-11759.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 155689679,
"name": "CVE-2018-11759",
"full_name": "immunIT\/CVE-2018-11759",
"owner": {
"login": "immunIT",
"id": 17569882,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17569882?v=4",
"html_url": "https:\/\/github.com\/immunIT"
},
"html_url": "https:\/\/github.com\/immunIT\/CVE-2018-11759",
"description": "Proof of concept showing how to exploit the CVE-2018-11759",
"fork": false,
"created_at": "2018-11-01T09:11:07Z",
"updated_at": "2020-07-13T15:43:59Z",
"pushed_at": "2018-12-11T12:59:26Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 14,
"forks": 14,
"watchers": 35,
"score": 0
},
{
"id": 160896534,
"name": "Identificador-CVE-2018-11759",
"full_name": "Jul10l1r4\/Identificador-CVE-2018-11759",
"owner": {
"login": "Jul10l1r4",
"id": 32502168,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32502168?v=4",
"html_url": "https:\/\/github.com\/Jul10l1r4"
},
"html_url": "https:\/\/github.com\/Jul10l1r4\/Identificador-CVE-2018-11759",
"description": "This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer",
"fork": false,
"created_at": "2018-12-08T02:32:14Z",
"updated_at": "2020-07-27T00:22:55Z",
"pushed_at": "2019-01-21T20:03:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}
]

25
2018/CVE-2018-11761.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 167112093,
"name": "CVE-2018-11761",
"full_name": "brianwrf\/CVE-2018-11761",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11761",
"description": "Apache Tika Denial of Service Vulnerability (CVE-2018-11761)",
"fork": false,
"created_at": "2019-01-23T03:40:26Z",
"updated_at": "2020-03-29T03:51:16Z",
"pushed_at": "2019-01-23T03:44:46Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 8,
"score": 0
}
]

25
2018/CVE-2018-11770.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 213971110,
"name": "CVE-2018-11770",
"full_name": "ivanitlearning\/CVE-2018-11770",
"owner": {
"login": "ivanitlearning",
"id": 52420671,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4",
"html_url": "https:\/\/github.com\/ivanitlearning"
},
"html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2018-11770",
"description": "Python RCE exploit for Apache Spark rewritten from Metasploit module",
"fork": false,
"created_at": "2019-10-09T16:41:39Z",
"updated_at": "2019-10-15T16:01:59Z",
"pushed_at": "2019-10-15T16:01:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,303 @@
[
{
"id": 145897861,
"name": "CVE-2018-11776",
"full_name": "trbpnd\/CVE-2018-11776",
"owner": {
"login": "trbpnd",
"id": 39193403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4",
"html_url": "https:\/\/github.com\/trbpnd"
},
"html_url": "https:\/\/github.com\/trbpnd\/CVE-2018-11776",
"description": "Docker image for a vulnerable struts app",
"fork": false,
"created_at": "2018-08-23T19:25:26Z",
"updated_at": "2018-08-23T19:28:53Z",
"pushed_at": "2018-08-23T19:28:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 145901668,
"name": "CVE-2018-11776",
"full_name": "xfox64x\/CVE-2018-11776",
"owner": {
"login": "xfox64x",
"id": 11416821,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11416821?v=4",
"html_url": "https:\/\/github.com\/xfox64x"
},
"html_url": "https:\/\/github.com\/xfox64x\/CVE-2018-11776",
"description": "Creating a vulnerable environment and the PoC ",
"fork": false,
"created_at": "2018-08-23T20:06:17Z",
"updated_at": "2020-05-11T21:00:33Z",
"pushed_at": "2019-11-25T21:21:55Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"forks": 7,
"watchers": 14,
"score": 0
},
{
"id": 145935231,
"name": "CVE-2018-11776",
"full_name": "jiguangin\/CVE-2018-11776",
"owner": {
"login": "jiguangin",
"id": 22545712,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22545712?v=4",
"html_url": "https:\/\/github.com\/jiguangin"
},
"html_url": "https:\/\/github.com\/jiguangin\/CVE-2018-11776",
"description": "CVE-2018-11776(S2-057) EXPLOIT CODE",
"fork": false,
"created_at": "2018-08-24T03:01:29Z",
"updated_at": "2020-12-29T15:23:34Z",
"pushed_at": "2018-08-24T03:27:02Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks": 5,
"watchers": 10,
"score": 0
},
{
"id": 145985371,
"name": "CVE-2018-11776-Python-PoC",
"full_name": "hook-s3c\/CVE-2018-11776-Python-PoC",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-11776-Python-PoC",
"description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab",
"fork": false,
"created_at": "2018-08-24T11:53:02Z",
"updated_at": "2021-03-01T18:21:49Z",
"pushed_at": "2018-08-25T02:14:49Z",
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 48,
"forks": 48,
"watchers": 118,
"score": 0
},
{
"id": 146056002,
"name": "struts-pwn_CVE-2018-11776",
"full_name": "mazen160\/struts-pwn_CVE-2018-11776",
"owner": {
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160"
},
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2018-11776",
"description": " An exploit for Apache Struts CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T01:53:30Z",
"updated_at": "2021-02-16T04:17:55Z",
"pushed_at": "2018-08-26T02:31:39Z",
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 102,
"forks": 102,
"watchers": 300,
"score": 0
},
{
"id": 146060181,
"name": "CVE-2018-11776",
"full_name": "bhdresh\/CVE-2018-11776",
"owner": {
"login": "bhdresh",
"id": 8931885,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
"html_url": "https:\/\/github.com\/bhdresh"
},
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2018-11776",
"description": "Vulnerable docker container for CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T03:06:30Z",
"updated_at": "2020-01-06T22:41:00Z",
"pushed_at": "2018-08-25T04:53:35Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"score": 0
},
{
"id": 146094544,
"name": "CVE-2018-11776",
"full_name": "knqyf263\/CVE-2018-11776",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11776",
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
"fork": false,
"created_at": "2018-08-25T12:45:15Z",
"updated_at": "2021-01-19T03:50:38Z",
"pushed_at": "2018-08-25T14:20:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 146330536,
"name": "Strutter",
"full_name": "Ekultek\/Strutter",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/Strutter",
"description": "Proof of Concept for CVE-2018-11776",
"fork": false,
"created_at": "2018-08-27T17:22:16Z",
"updated_at": "2020-12-12T20:05:33Z",
"pushed_at": "2018-09-12T14:28:35Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"forks": 3,
"watchers": 20,
"score": 0
},
{
"id": 146373342,
"name": "cve-2018-11776-docker",
"full_name": "tuxotron\/cve-2018-11776-docker",
"owner": {
"login": "tuxotron",
"id": 937637,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/937637?v=4",
"html_url": "https:\/\/github.com\/tuxotron"
},
"html_url": "https:\/\/github.com\/tuxotron\/cve-2018-11776-docker",
"description": null,
"fork": false,
"created_at": "2018-08-28T01:14:52Z",
"updated_at": "2019-09-24T14:38:18Z",
"pushed_at": "2018-08-29T17:58:27Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 146519519,
"name": "S2-057-CVE-2018-11776",
"full_name": "brianwrf\/S2-057-CVE-2018-11776",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/S2-057-CVE-2018-11776",
"description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)",
"fork": false,
"created_at": "2018-08-28T23:48:14Z",
"updated_at": "2018-12-23T03:47:07Z",
"pushed_at": "2018-08-29T00:03:56Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"score": 0
},
{
"id": 146650579,
"name": "Apache-Struts-Shodan-Exploit",
"full_name": "649\/Apache-Struts-Shodan-Exploit",
"owner": {
"login": "649",
"id": 23534047,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4",
"html_url": "https:\/\/github.com\/649"
},
"html_url": "https:\/\/github.com\/649\/Apache-Struts-Shodan-Exploit",
"description": "This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.",
"fork": false,
"created_at": "2018-08-29T19:50:26Z",
"updated_at": "2021-03-04T19:02:01Z",
"pushed_at": "2018-08-30T00:16:01Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 16,
"forks": 16,
"watchers": 52,
"score": 0
},
{
"id": 147746262,
"name": "CVE-2018-11776-Python-PoC",
"full_name": "jezzus\/CVE-2018-11776-Python-PoC",
"owner": {
"login": "jezzus",
"id": 9899999,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9899999?v=4",
"html_url": "https:\/\/github.com\/jezzus"
},
"html_url": "https:\/\/github.com\/jezzus\/CVE-2018-11776-Python-PoC",
"description": null,
"fork": false,
"created_at": "2018-09-06T23:49:20Z",
"updated_at": "2018-09-06T23:49:20Z",
"pushed_at": "2018-09-06T23:49:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 164352202,
"name": "cve-2018-11776",
"full_name": "cved-sources\/cve-2018-11776",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-11776",
"description": "cve-2018-11776",
"fork": false,
"created_at": "2019-01-06T22:47:25Z",
"updated_at": "2019-09-12T19:52:44Z",
"pushed_at": "2019-02-01T21:29:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 193423029,
"name": "apche-struts-vuln-demo-cve-2018-11776",
@ -22,6 +321,29 @@
"watchers": 0,
"score": 0
},
{
"id": 213772542,
"name": "CVE-2018-11776",
"full_name": "cucadili\/CVE-2018-11776",
"owner": {
"login": "cucadili",
"id": 48569185,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48569185?v=4",
"html_url": "https:\/\/github.com\/cucadili"
},
"html_url": "https:\/\/github.com\/cucadili\/CVE-2018-11776",
"description": "Investigation of CVE-2018-11776 vulnerability that allows attackers to remotely execute code and gain control over Apache Struts-based applications.",
"fork": false,
"created_at": "2019-10-08T23:01:49Z",
"updated_at": "2019-10-08T23:46:28Z",
"pushed_at": "2019-10-08T23:46:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 214186123,
"name": "Apache-Struts-0Day-Exploit",

25
2018/CVE-2018-11788.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 164298909,
"name": "CVE-2018-11788",
"full_name": "brianwrf\/CVE-2018-11788",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11788",
"description": "Apache Karaf XXE Vulnerability (CVE-2018-11788)",
"fork": false,
"created_at": "2019-01-06T11:01:39Z",
"updated_at": "2020-03-29T02:47:45Z",
"pushed_at": "2019-01-06T11:50:43Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 5,
"forks": 5,
"watchers": 36,
"score": 0
}
]

25
2018/CVE-2018-11882.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 197681680,
"name": "cve-2018-11882",
"full_name": "jguard01\/cve-2018-11882",
"owner": {
"login": "jguard01",
"id": 53065612,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53065612?v=4",
"html_url": "https:\/\/github.com\/jguard01"
},
"html_url": "https:\/\/github.com\/jguard01\/cve-2018-11882",
"description": null,
"fork": false,
"created_at": "2019-07-19T01:40:05Z",
"updated_at": "2019-07-19T01:42:00Z",
"pushed_at": "2019-07-19T01:41:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-12018.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 153770795,
"name": "CVE-2018-12018",
"full_name": "k3v142\/CVE-2018-12018",
"owner": {
"login": "k3v142",
"id": 12337759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4",
"html_url": "https:\/\/github.com\/k3v142"
},
"html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018",
"description": "EPoD (Ethereum Packet of Death)",
"fork": false,
"created_at": "2018-10-19T11:11:01Z",
"updated_at": "2019-12-14T15:32:33Z",
"pushed_at": "2018-10-20T21:07:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

25
2018/CVE-2018-12038.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 162155985,
"name": "remote-bitlocker-encryption-report",
"full_name": "gdraperi\/remote-bitlocker-encryption-report",
"owner": {
"login": "gdraperi",
"id": 33750242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33750242?v=4",
"html_url": "https:\/\/github.com\/gdraperi"
},
"html_url": "https:\/\/github.com\/gdraperi\/remote-bitlocker-encryption-report",
"description": "PowerShell script to mitigate CVE-2018-12038. The script takes a list of PC as input, gets their BitLocker encryption type remotely, and outputs a report as a CSV file",
"fork": false,
"created_at": "2018-12-17T16:02:26Z",
"updated_at": "2019-02-11T14:30:38Z",
"pushed_at": "2018-12-07T20:11:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-12086.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171705705,
"name": "stack-overflow-poc",
"full_name": "kevinherron\/stack-overflow-poc",
"owner": {
"login": "kevinherron",
"id": 340273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/340273?v=4",
"html_url": "https:\/\/github.com\/kevinherron"
},
"html_url": "https:\/\/github.com\/kevinherron\/stack-overflow-poc",
"description": "PoC for CVE-2018-12086 affecting various OPC UA stacks",
"fork": false,
"created_at": "2019-02-20T16:11:26Z",
"updated_at": "2019-10-31T13:35:21Z",
"pushed_at": "2019-10-31T13:35:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-1235.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 181948503,
"name": "CVE-2018-1235",
"full_name": "AbsoZed\/CVE-2018-1235",
"owner": {
"login": "AbsoZed",
"id": 17788335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17788335?v=4",
"html_url": "https:\/\/github.com\/AbsoZed"
},
"html_url": "https:\/\/github.com\/AbsoZed\/CVE-2018-1235",
"description": "A python script that tests for an exploitable instance of CVE-2018-1235.",
"fork": false,
"created_at": "2019-04-17T18:37:00Z",
"updated_at": "2019-04-18T12:47:38Z",
"pushed_at": "2019-04-18T12:47:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 201420418,
"name": "cve-2018-12386",
"full_name": "Hydra3evil\/cve-2018-12386",
"owner": {
"login": "Hydra3evil",
"id": 53893501,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53893501?v=4",
"html_url": "https:\/\/github.com\/Hydra3evil"
},
"html_url": "https:\/\/github.com\/Hydra3evil\/cve-2018-12386",
"description": "CVE-2018-12386 - Firefox Sandboxed RCE Exploit for Linux (Firefox <v62.0.3)",
"fork": false,
"created_at": "2019-08-09T07:58:03Z",
"updated_at": "2020-04-11T17:00:30Z",
"pushed_at": "2019-05-08T18:00:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 254623660,
"name": "cve-2018-12386",

25
2018/CVE-2018-12418.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158208279,
"name": "CVE-2018-12418",
"full_name": "tafamace\/CVE-2018-12418",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12418",
"description": null,
"fork": false,
"created_at": "2018-11-19T11:12:00Z",
"updated_at": "2018-11-19T11:15:44Z",
"pushed_at": "2018-11-19T11:15:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-12463.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 140411928,
"name": "CVE-2018-12463",
"full_name": "alt3kx\/CVE-2018-12463",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
"fork": false,
"created_at": "2018-07-10T09:51:40Z",
"updated_at": "2021-01-12T12:20:23Z",
"pushed_at": "2018-07-17T08:13:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2018/CVE-2018-12537.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158209208,
"name": "CVE-2018-12537",
"full_name": "tafamace\/CVE-2018-12537",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12537",
"description": null,
"fork": false,
"created_at": "2018-11-19T11:18:35Z",
"updated_at": "2018-11-19T11:32:44Z",
"pushed_at": "2018-11-19T11:32:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-12540.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158212154,
"name": "CVE-2018-12540",
"full_name": "tafamace\/CVE-2018-12540",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12540",
"description": null,
"fork": false,
"created_at": "2018-11-19T11:41:16Z",
"updated_at": "2018-11-19T11:46:57Z",
"pushed_at": "2018-11-19T11:46:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-1259.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158194793,
"name": "CVE-2018-1259",
"full_name": "tafamace\/CVE-2018-1259",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1259",
"description": null,
"fork": false,
"created_at": "2018-11-19T09:25:32Z",
"updated_at": "2018-11-19T09:32:46Z",
"pushed_at": "2018-11-19T09:32:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 156870746,
"name": "CVE-2018-12613",
"full_name": "0x00-0x00\/CVE-2018-12613",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-12613",
"description": "PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit",
"fork": false,
"created_at": "2018-11-09T14:10:20Z",
"updated_at": "2020-03-11T07:23:14Z",
"pushed_at": "2018-11-09T14:42:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 208791479,
"name": "CVE-2018-12613",
"full_name": "ivanitlearning\/CVE-2018-12613",
"owner": {
"login": "ivanitlearning",
"id": 52420671,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4",
"html_url": "https:\/\/github.com\/ivanitlearning"
},
"html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2018-12613",
"description": "Modified standalone exploit ported for Python 3",
"fork": false,
"created_at": "2019-09-16T12:14:52Z",
"updated_at": "2020-09-02T19:14:31Z",
"pushed_at": "2019-09-16T14:04:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 241542443,
"name": "CVE-2018-12613-phpMyAdmin",

View file

@ -45,6 +45,52 @@
"watchers": 19,
"score": 0
},
{
"id": 158213121,
"name": "CVE-2018-1270",
"full_name": "tafamace\/CVE-2018-1270",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1270",
"description": null,
"fork": false,
"created_at": "2018-11-19T11:47:40Z",
"updated_at": "2018-11-19T12:00:19Z",
"pushed_at": "2018-11-19T12:00:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 162062968,
"name": "CVE-2018-1270",
"full_name": "Venscor\/CVE-2018-1270",
"owner": {
"login": "Venscor",
"id": 13192497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13192497?v=4",
"html_url": "https:\/\/github.com\/Venscor"
},
"html_url": "https:\/\/github.com\/Venscor\/CVE-2018-1270",
"description": "CVE-2018-1270 表达式RCE环境",
"fork": false,
"created_at": "2018-12-17T02:22:53Z",
"updated_at": "2018-12-17T02:28:09Z",
"pushed_at": "2018-12-17T02:28:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 295839871,
"name": "owasp-formation-cve-2018-1270",

View file

@ -40,9 +40,78 @@
"pushed_at": "2018-06-05T15:07:18Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 9,
"forks": 9,
"forks_count": 8,
"forks": 8,
"watchers": 21,
"score": 0
},
{
"id": 151734933,
"name": "poc-cve-2018-1273",
"full_name": "webr0ck\/poc-cve-2018-1273",
"owner": {
"login": "webr0ck",
"id": 30629042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30629042?v=4",
"html_url": "https:\/\/github.com\/webr0ck"
},
"html_url": "https:\/\/github.com\/webr0ck\/poc-cve-2018-1273",
"description": null,
"fork": false,
"created_at": "2018-10-05T14:42:07Z",
"updated_at": "2018-10-09T09:26:39Z",
"pushed_at": "2018-10-05T14:42:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 166271014,
"name": "cve-2018-1273",
"full_name": "cved-sources\/cve-2018-1273",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-1273",
"description": "cve-2018-1273",
"fork": false,
"created_at": "2019-01-17T17:55:17Z",
"updated_at": "2019-02-01T21:30:32Z",
"pushed_at": "2019-02-01T21:30:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 183995263,
"name": "cve-2018-1273",
"full_name": "jas502n\/cve-2018-1273",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/cve-2018-1273",
"description": "Spring Data Commons RCE 远程命令执行漏洞",
"fork": false,
"created_at": "2019-04-29T03:43:15Z",
"updated_at": "2020-09-23T02:08:56Z",
"pushed_at": "2019-04-29T04:25:35Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 13,
"forks": 13,
"watchers": 51,
"score": 0
}
]

25
2018/CVE-2018-12798.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 215230248,
"name": "cve-2018-12798",
"full_name": "sharmasandeepkr\/cve-2018-12798",
"owner": {
"login": "sharmasandeepkr",
"id": 16163884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16163884?v=4",
"html_url": "https:\/\/github.com\/sharmasandeepkr"
},
"html_url": "https:\/\/github.com\/sharmasandeepkr\/cve-2018-12798",
"description": null,
"fork": false,
"created_at": "2019-10-15T07:05:12Z",
"updated_at": "2019-10-15T07:06:41Z",
"pushed_at": "2019-10-15T07:06:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-12895.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 139890292,
"name": "cve-2018-12895-hotfix",
"full_name": "bloom-ux\/cve-2018-12895-hotfix",
"owner": {
"login": "bloom-ux",
"id": 22582007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22582007?v=4",
"html_url": "https:\/\/github.com\/bloom-ux"
},
"html_url": "https:\/\/github.com\/bloom-ux\/cve-2018-12895-hotfix",
"description": "Hotfix for file deletion to to code execution vulnerability in WordPress",
"fork": false,
"created_at": "2018-07-05T19:09:17Z",
"updated_at": "2018-07-05T19:48:44Z",
"pushed_at": "2018-07-05T19:48:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-1313.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158220324,
"name": "CVE-2018-1313",
"full_name": "tafamace\/CVE-2018-1313",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1313",
"description": null,
"fork": false,
"created_at": "2018-11-19T12:38:21Z",
"updated_at": "2018-11-19T12:48:53Z",
"pushed_at": "2018-11-19T12:48:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-1324.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158221452,
"name": "CVE-2018-1324",
"full_name": "tafamace\/CVE-2018-1324",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1324",
"description": null,
"fork": false,
"created_at": "2018-11-19T12:46:37Z",
"updated_at": "2018-11-19T13:04:11Z",
"pushed_at": "2018-11-19T13:04:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-13257.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175997263,
"name": "CVE-2018-13257",
"full_name": "gluxon\/CVE-2018-13257",
"owner": {
"login": "gluxon",
"id": 906558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/906558?v=4",
"html_url": "https:\/\/github.com\/gluxon"
},
"html_url": "https:\/\/github.com\/gluxon\/CVE-2018-13257",
"description": null,
"fork": false,
"created_at": "2019-03-16T16:37:53Z",
"updated_at": "2020-03-25T21:03:44Z",
"pushed_at": "2019-03-16T16:38:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-13341.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 227729620,
"name": "crestron_getsudopwd",
"full_name": "axcheron\/crestron_getsudopwd",
"owner": {
"login": "axcheron",
"id": 5811920,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5811920?v=4",
"html_url": "https:\/\/github.com\/axcheron"
},
"html_url": "https:\/\/github.com\/axcheron\/crestron_getsudopwd",
"description": "Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices",
"fork": false,
"created_at": "2019-12-13T01:27:36Z",
"updated_at": "2021-02-18T14:17:41Z",
"pushed_at": "2019-12-13T01:36:08Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 176753685,
"name": "CVE-2018-1335-EXP-GUI",
"full_name": "SkyBlueEternal\/CVE-2018-1335-EXP-GUI",
"owner": {
"login": "SkyBlueEternal",
"id": 46418185,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46418185?v=4",
"html_url": "https:\/\/github.com\/SkyBlueEternal"
},
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CVE-2018-1335-EXP-GUI",
"description": "GUI版 EXP",
"fork": false,
"created_at": "2019-03-20T14:38:09Z",
"updated_at": "2021-01-11T09:47:34Z",
"pushed_at": "2019-03-20T14:50:05Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"forks": 3,
"watchers": 13,
"score": 0
},
{
"id": 239721705,
"name": "CVE-2018-1335-Python3",

View file

@ -1,4 +1,27 @@
[
{
"id": 201745739,
"name": "CVE-2018-13379",
"full_name": "milo2012\/CVE-2018-13379",
"owner": {
"login": "milo2012",
"id": 905335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
"html_url": "https:\/\/github.com\/milo2012"
},
"html_url": "https:\/\/github.com\/milo2012\/CVE-2018-13379",
"description": "CVE-2018-13379",
"fork": false,
"created_at": "2019-08-11T09:44:37Z",
"updated_at": "2021-02-24T23:02:51Z",
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 222,
"watchers_count": 222,
"forks_count": 81,
"forks": 81,
"watchers": 222,
"score": 0
},
{
"id": 203047235,
"name": "at-doom-fortigate",
@ -22,6 +45,29 @@
"watchers": 2,
"score": 0
},
{
"id": 210555795,
"name": "FortiOS-Credentials-Disclosure",
"full_name": "0xHunter\/FortiOS-Credentials-Disclosure",
"owner": {
"login": "0xHunter",
"id": 55736997,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55736997?v=4",
"html_url": "https:\/\/github.com\/0xHunter"
},
"html_url": "https:\/\/github.com\/0xHunter\/FortiOS-Credentials-Disclosure",
"description": "CVE-2018-13379 Exploit",
"fork": false,
"created_at": "2019-09-24T08:49:46Z",
"updated_at": "2019-12-11T13:11:23Z",
"pushed_at": "2019-09-24T08:51:28Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 214945628,
"name": "cve2018-13379-nmap-script",

25
2018/CVE-2018-13382.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 201754520,
"name": "CVE-2018-13382",
"full_name": "milo2012\/CVE-2018-13382",
"owner": {
"login": "milo2012",
"id": 905335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
"html_url": "https:\/\/github.com\/milo2012"
},
"html_url": "https:\/\/github.com\/milo2012\/CVE-2018-13382",
"description": "CVE-2018-13382",
"fork": false,
"created_at": "2019-08-11T11:13:44Z",
"updated_at": "2021-01-05T14:34:09Z",
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 51,
"forks": 51,
"watchers": 132,
"score": 0
}
]

25
2018/CVE-2018-13410.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 171778059,
"name": "zip",
"full_name": "shinecome\/zip",
"owner": {
"login": "shinecome",
"id": 10205789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10205789?v=4",
"html_url": "https:\/\/github.com\/shinecome"
},
"html_url": "https:\/\/github.com\/shinecome\/zip",
"description": "patch to fix CVE-2018-13410 of zip-30",
"fork": false,
"created_at": "2019-02-21T01:29:00Z",
"updated_at": "2019-02-21T01:38:43Z",
"pushed_at": "2019-02-21T01:36:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-13784.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 141165293,
"name": "prestashop-exploits",
"full_name": "ambionics\/prestashop-exploits",
"owner": {
"login": "ambionics",
"id": 29630660,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
"html_url": "https:\/\/github.com\/ambionics"
},
"html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits",
"description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)",
"fork": false,
"created_at": "2018-07-16T16:33:41Z",
"updated_at": "2021-03-17T03:38:56Z",
"pushed_at": "2018-07-17T09:02:34Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 11,
"forks": 11,
"watchers": 46,
"score": 0
}
]

25
2018/CVE-2018-13864.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158196795,
"name": "CVE-2018-13864",
"full_name": "tafamace\/CVE-2018-13864",
"owner": {
"login": "tafamace",
"id": 45160113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4",
"html_url": "https:\/\/github.com\/tafamace"
},
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-13864",
"description": null,
"fork": false,
"created_at": "2018-11-19T09:40:47Z",
"updated_at": "2018-11-19T09:45:34Z",
"pushed_at": "2018-11-19T09:45:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-14.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 144012223,
"name": "legacySymfony",
"full_name": "lckJack\/legacySymfony",
"owner": {
"login": "lckJack",
"id": 38405856,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38405856?v=4",
"html_url": "https:\/\/github.com\/lckJack"
},
"html_url": "https:\/\/github.com\/lckJack\/legacySymfony",
"description": "Easy script to check if drupal 8.x-8.5.6 is vulnerable to CVE-2018-14.773",
"fork": false,
"created_at": "2018-08-08T12:42:56Z",
"updated_at": "2018-08-08T17:28:27Z",
"pushed_at": "2018-08-08T12:46:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-14083.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 142094467,
"name": "CVE-2018-14083",
"full_name": "pudding2\/CVE-2018-14083",
"owner": {
"login": "pudding2",
"id": 28480779,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28480779?v=4",
"html_url": "https:\/\/github.com\/pudding2"
},
"html_url": "https:\/\/github.com\/pudding2\/CVE-2018-14083",
"description": null,
"fork": false,
"created_at": "2018-07-24T02:36:08Z",
"updated_at": "2019-01-14T11:31:59Z",
"pushed_at": "2018-07-24T02:56:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

48
2018/CVE-2018-14442.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 163386526,
"name": "CVE-2018-14442",
"full_name": "payatu\/CVE-2018-14442",
"owner": {
"login": "payatu",
"id": 16715624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16715624?v=4",
"html_url": "https:\/\/github.com\/payatu"
},
"html_url": "https:\/\/github.com\/payatu\/CVE-2018-14442",
"description": "PoC for Foxit Reader CVE-2018-14442",
"fork": false,
"created_at": "2018-12-28T08:29:28Z",
"updated_at": "2020-07-23T19:50:15Z",
"pushed_at": "2018-12-28T09:46:29Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 17,
"forks": 17,
"watchers": 55,
"score": 0
},
{
"id": 215229045,
"name": "PS-2018-002---CVE-2018-14442",
"full_name": "sharmasandeepkr\/PS-2018-002---CVE-2018-14442",
"owner": {
"login": "sharmasandeepkr",
"id": 16163884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16163884?v=4",
"html_url": "https:\/\/github.com\/sharmasandeepkr"
},
"html_url": "https:\/\/github.com\/sharmasandeepkr\/PS-2018-002---CVE-2018-14442",
"description": null,
"fork": false,
"created_at": "2019-10-15T06:58:27Z",
"updated_at": "2019-10-15T06:59:26Z",
"pushed_at": "2019-10-15T06:59:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-14634.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 152124947,
"name": "cve-2018-14634",
"full_name": "luan0ap\/cve-2018-14634",
"owner": {
"login": "luan0ap",
"id": 26953960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26953960?v=4",
"html_url": "https:\/\/github.com\/luan0ap"
},
"html_url": "https:\/\/github.com\/luan0ap\/cve-2018-14634",
"description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1",
"fork": false,
"created_at": "2018-10-08T18:12:03Z",
"updated_at": "2020-03-29T03:02:36Z",
"pushed_at": "2018-10-09T16:44:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 10,
"forks": 10,
"watchers": 4,
"score": 0
}
]

71
2018/CVE-2018-14665.json Normal file
View file

@ -0,0 +1,71 @@
[
{
"id": 154950649,
"name": "CVE-2018-14665",
"full_name": "jas502n\/CVE-2018-14665",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14665",
"description": "OpenBsd_CVE-2018-14665",
"fork": false,
"created_at": "2018-10-27T10:12:05Z",
"updated_at": "2020-10-26T10:10:05Z",
"pushed_at": "2018-10-27T10:44:35Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"forks": 8,
"watchers": 14,
"score": 0
},
{
"id": 155795794,
"name": "CVE-2018-14665",
"full_name": "bolonobolo\/CVE-2018-14665",
"owner": {
"login": "bolonobolo",
"id": 44464106,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44464106?v=4",
"html_url": "https:\/\/github.com\/bolonobolo"
},
"html_url": "https:\/\/github.com\/bolonobolo\/CVE-2018-14665",
"description": null,
"fork": false,
"created_at": "2018-11-02T01:09:37Z",
"updated_at": "2019-03-22T10:12:21Z",
"pushed_at": "2019-03-22T10:12:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173618501,
"name": "cve-2018-14665",
"full_name": "samueldustin\/cve-2018-14665",
"owner": {
"login": "samueldustin",
"id": 46855517,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46855517?v=4",
"html_url": "https:\/\/github.com\/samueldustin"
},
"html_url": "https:\/\/github.com\/samueldustin\/cve-2018-14665",
"description": null,
"fork": false,
"created_at": "2019-03-03T19:12:56Z",
"updated_at": "2019-03-03T19:13:11Z",
"pushed_at": "2019-03-03T19:13:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

140
2018/CVE-2018-14667.json Normal file
View file

@ -0,0 +1,140 @@
[
{
"id": 158057391,
"name": "cve-2018-14667",
"full_name": "nareshmail\/cve-2018-14667",
"owner": {
"login": "nareshmail",
"id": 6008091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6008091?v=4",
"html_url": "https:\/\/github.com\/nareshmail"
},
"html_url": "https:\/\/github.com\/nareshmail\/cve-2018-14667",
"description": "cve-2018-14667 demo",
"fork": false,
"created_at": "2018-11-18T06:43:46Z",
"updated_at": "2020-04-01T03:46:35Z",
"pushed_at": "2018-11-17T04:13:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 158791727,
"name": "CVE-2018-14667",
"full_name": "zeroto01\/CVE-2018-14667",
"owner": {
"login": "zeroto01",
"id": 45281392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45281392?v=4",
"html_url": "https:\/\/github.com\/zeroto01"
},
"html_url": "https:\/\/github.com\/zeroto01\/CVE-2018-14667",
"description": null,
"fork": false,
"created_at": "2018-11-23T06:44:49Z",
"updated_at": "2018-11-27T04:22:10Z",
"pushed_at": "2018-11-23T06:50:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 159462372,
"name": "CVE-2018-14667",
"full_name": "r00t4dm\/CVE-2018-14667",
"owner": {
"login": "r00t4dm",
"id": 36941976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36941976?v=4",
"html_url": "https:\/\/github.com\/r00t4dm"
},
"html_url": "https:\/\/github.com\/r00t4dm\/CVE-2018-14667",
"description": "about CVE-2018-14667 from RichFaces Framework 3.3.4",
"fork": false,
"created_at": "2018-11-28T07:35:28Z",
"updated_at": "2018-11-29T02:48:19Z",
"pushed_at": "2018-11-29T02:48:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 159766854,
"name": "CVE-2018-14667",
"full_name": "syriusbughunt\/CVE-2018-14667",
"owner": {
"login": "syriusbughunt",
"id": 45476916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45476916?v=4",
"html_url": "https:\/\/github.com\/syriusbughunt"
},
"html_url": "https:\/\/github.com\/syriusbughunt\/CVE-2018-14667",
"description": "All about CVE-2018-14667; From what it is to how to successfully exploit it.",
"fork": false,
"created_at": "2018-11-30T04:06:08Z",
"updated_at": "2021-02-18T03:16:19Z",
"pushed_at": "2018-11-30T07:10:44Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 11,
"forks": 11,
"watchers": 41,
"score": 0
},
{
"id": 199370771,
"name": "cve-2018-14667",
"full_name": "quandqn\/cve-2018-14667",
"owner": {
"login": "quandqn",
"id": 15824211,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15824211?v=4",
"html_url": "https:\/\/github.com\/quandqn"
},
"html_url": "https:\/\/github.com\/quandqn\/cve-2018-14667",
"description": null,
"fork": false,
"created_at": "2019-07-29T03:22:22Z",
"updated_at": "2019-07-29T03:36:11Z",
"pushed_at": "2019-07-29T03:36:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 210294568,
"name": "CVE-2018-14667-poc",
"full_name": "Venscor\/CVE-2018-14667-poc",
"owner": {
"login": "Venscor",
"id": 13192497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13192497?v=4",
"html_url": "https:\/\/github.com\/Venscor"
},
"html_url": "https:\/\/github.com\/Venscor\/CVE-2018-14667-poc",
"description": "CVE-2018-14667-poc Richfaces漏洞环境及PoC",
"fork": false,
"created_at": "2019-09-23T07:45:01Z",
"updated_at": "2021-01-07T08:24:16Z",
"pushed_at": "2019-09-24T05:00:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

25
2018/CVE-2018-14729.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 146291248,
"name": "CVE-2018-14729",
"full_name": "FoolMitAh\/CVE-2018-14729",
"owner": {
"login": "FoolMitAh",
"id": 23001766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001766?v=4",
"html_url": "https:\/\/github.com\/FoolMitAh"
},
"html_url": "https:\/\/github.com\/FoolMitAh\/CVE-2018-14729",
"description": "Discuz backend getshell",
"fork": false,
"created_at": "2018-08-27T11:58:49Z",
"updated_at": "2020-08-06T02:38:53Z",
"pushed_at": "2018-12-15T10:30:34Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 21,
"forks": 21,
"watchers": 82,
"score": 0
}
]

25
2018/CVE-2018-14772.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 148241935,
"name": "CVE-2018-14772",
"full_name": "spencerdodd\/CVE-2018-14772",
"owner": {
"login": "spencerdodd",
"id": 9969454,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9969454?v=4",
"html_url": "https:\/\/github.com\/spencerdodd"
},
"html_url": "https:\/\/github.com\/spencerdodd\/CVE-2018-14772",
"description": "RCE exploit for CVE-2018-14772",
"fork": false,
"created_at": "2018-09-11T01:24:21Z",
"updated_at": "2020-10-21T22:16:16Z",
"pushed_at": "2018-11-01T01:47:17Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"score": 0
}
]

View file

@ -22,6 +22,144 @@
"watchers": 411,
"score": 0
},
{
"id": 148370201,
"name": "WinboxExploit",
"full_name": "msterusky\/WinboxExploit",
"owner": {
"login": "msterusky",
"id": 29436829,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
"html_url": "https:\/\/github.com\/msterusky"
},
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
"fork": false,
"created_at": "2018-09-11T19:36:49Z",
"updated_at": "2021-03-13T16:56:42Z",
"pushed_at": "2018-09-11T20:12:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 5,
"score": 0
},
{
"id": 152906288,
"name": "MikroRoot",
"full_name": "syrex1013\/MikroRoot",
"owner": {
"login": "syrex1013",
"id": 31669127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
"html_url": "https:\/\/github.com\/syrex1013"
},
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
"fork": false,
"created_at": "2018-10-13T19:17:42Z",
"updated_at": "2020-11-02T06:16:27Z",
"pushed_at": "2018-10-14T08:39:24Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 13,
"score": 0
},
{
"id": 161894724,
"name": "CVE-2018-14847",
"full_name": "jas502n\/CVE-2018-14847",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
"fork": false,
"created_at": "2018-12-15T10:38:26Z",
"updated_at": "2020-09-19T14:14:39Z",
"pushed_at": "2018-12-16T04:15:01Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 8,
"forks": 8,
"watchers": 17,
"score": 0
},
{
"id": 178807607,
"name": "winboxPOC",
"full_name": "th3f3n1x87\/winboxPOC",
"owner": {
"login": "th3f3n1x87",
"id": 15888700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15888700?v=4",
"html_url": "https:\/\/github.com\/th3f3n1x87"
},
"html_url": "https:\/\/github.com\/th3f3n1x87\/winboxPOC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
"fork": false,
"created_at": "2019-04-01T07:20:23Z",
"updated_at": "2020-03-24T14:07:22Z",
"pushed_at": "2019-02-18T09:51:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 188679903,
"name": "mikrotik-beast",
"full_name": "mahmoodsabir\/mikrotik-beast",
"owner": {
"login": "mahmoodsabir",
"id": 47719250,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4",
"html_url": "https:\/\/github.com\/mahmoodsabir"
},
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
"fork": false,
"created_at": "2019-05-26T12:26:55Z",
"updated_at": "2020-08-26T17:33:20Z",
"pushed_at": "2019-05-26T13:06:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 211658714,
"name": "Python-MikrotikLoginExploit",
"full_name": "sinichi449\/Python-MikrotikLoginExploit",
"owner": {
"login": "sinichi449",
"id": 44680392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4",
"html_url": "https:\/\/github.com\/sinichi449"
},
"html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit",
"description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
"fork": false,
"created_at": "2019-09-29T12:21:16Z",
"updated_at": "2020-10-01T14:12:59Z",
"pushed_at": "2019-09-30T04:10:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
},
{
"id": 259795725,
"name": "CVE-2018-14847",

25
2018/CVE-2018-15131.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 147528539,
"name": "CVE-2018-15131",
"full_name": "0x00-0x00\/CVE-2018-15131",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-15131",
"description": "Zimbra Collaboration Suite Username Enumeration ",
"fork": false,
"created_at": "2018-09-05T14:11:16Z",
"updated_at": "2018-10-28T04:05:13Z",
"pushed_at": "2018-09-05T14:11:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 144760095,
"name": "laravel-poc-CVE-2018-15133",
"full_name": "kozmic\/laravel-poc-CVE-2018-15133",
"owner": {
"login": "kozmic",
"id": 6666,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6666?v=4",
"html_url": "https:\/\/github.com\/kozmic"
},
"html_url": "https:\/\/github.com\/kozmic\/laravel-poc-CVE-2018-15133",
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2021-03-06T14:32:34Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 223,
"watchers_count": 223,
"forks_count": 42,
"forks": 42,
"watchers": 223,
"score": 0
},
{
"id": 243072477,
"name": "Laravel-CVE-2018-15133",
"full_name": "Bilelxdz\/Laravel-CVE-2018-15133",
"owner": {
"login": "Bilelxdz",
"id": 35871833,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35871833?v=4",
"html_url": "https:\/\/github.com\/Bilelxdz"
},
"html_url": "https:\/\/github.com\/Bilelxdz\/Laravel-CVE-2018-15133",
"description": "Cette exploit en python va vous permettre de créer des listes de sites et les exploiter rapidement.",
"fork": false,
"created_at": "2020-02-25T18:36:13Z",
"updated_at": "2021-01-24T09:08:22Z",
"pushed_at": "2019-05-17T23:41:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 253158422,
"name": "Laravel-PHP-Unit-RCE-Auto-shell-uploader",

25
2018/CVE-2018-15365.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 150475298,
"name": "CVE-2018-15365",
"full_name": "nixwizard\/CVE-2018-15365",
"owner": {
"login": "nixwizard",
"id": 3982790,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3982790?v=4",
"html_url": "https:\/\/github.com\/nixwizard"
},
"html_url": "https:\/\/github.com\/nixwizard\/CVE-2018-15365",
"description": null,
"fork": false,
"created_at": "2018-09-26T18:56:41Z",
"updated_at": "2018-09-27T07:31:12Z",
"pushed_at": "2018-09-27T07:31:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 145175629,
"name": "massh-enum",
"full_name": "trimstray\/massh-enum",
"owner": {
"login": "trimstray",
"id": 31127917,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31127917?v=4",
"html_url": "https:\/\/github.com\/trimstray"
},
"html_url": "https:\/\/github.com\/trimstray\/massh-enum",
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
"fork": false,
"created_at": "2018-08-17T23:48:15Z",
"updated_at": "2021-03-05T18:53:53Z",
"pushed_at": "2019-11-15T08:12:32Z",
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 29,
"forks": 29,
"watchers": 121,
"score": 0
},
{
"id": 145296891,
"name": "opensshenum",
"full_name": "gbonacini\/opensshenum",
"owner": {
"login": "gbonacini",
"id": 5440458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5440458?v=4",
"html_url": "https:\/\/github.com\/gbonacini"
},
"html_url": "https:\/\/github.com\/gbonacini\/opensshenum",
"description": "CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug",
"fork": false,
"created_at": "2018-08-19T11:23:54Z",
"updated_at": "2019-09-15T11:44:34Z",
"pushed_at": "2018-10-17T12:27:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 145483388,
"name": "CVE-2018-15473-Exploit",
@ -22,6 +68,29 @@
"watchers": 435,
"score": 0
},
{
"id": 151394702,
"name": "cve-2018-15473",
"full_name": "epi052\/cve-2018-15473",
"owner": {
"login": "epi052",
"id": 43392618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43392618?v=4",
"html_url": "https:\/\/github.com\/epi052"
},
"html_url": "https:\/\/github.com\/epi052\/cve-2018-15473",
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2021-03-15T20:12:50Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"score": 0
},
{
"id": 152145946,
"name": "CVE-2018-15473_exploit",
@ -68,6 +137,167 @@
"watchers": 7,
"score": 0
},
{
"id": 155492594,
"name": "SSHUsernameBruter-SSHUB",
"full_name": "JoeBlackSecurity\/SSHUsernameBruter-SSHUB",
"owner": {
"login": "JoeBlackSecurity",
"id": 44617164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44617164?v=4",
"html_url": "https:\/\/github.com\/JoeBlackSecurity"
},
"html_url": "https:\/\/github.com\/JoeBlackSecurity\/SSHUsernameBruter-SSHUB",
"description": "Fully functional script for brute forcing SSH and trying credentials - CVE-2018-15473",
"fork": false,
"created_at": "2018-10-31T03:23:46Z",
"updated_at": "2020-04-23T05:36:20Z",
"pushed_at": "2018-12-05T12:04:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 165318682,
"name": "cve-2018-15473",
"full_name": "cved-sources\/cve-2018-15473",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-15473",
"description": "cve-2018-15473",
"fork": false,
"created_at": "2019-01-11T22:17:08Z",
"updated_at": "2019-02-01T21:35:54Z",
"pushed_at": "2019-02-01T21:35:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 167137381,
"name": "CVE-2018-15473-exp",
"full_name": "LINYIKAI\/CVE-2018-15473-exp",
"owner": {
"login": "LINYIKAI",
"id": 18764303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18764303?v=4",
"html_url": "https:\/\/github.com\/LINYIKAI"
},
"html_url": "https:\/\/github.com\/LINYIKAI\/CVE-2018-15473-exp",
"description": "This is a exp of CVE-2018-15473",
"fork": false,
"created_at": "2019-01-23T07:25:21Z",
"updated_at": "2019-09-06T06:03:44Z",
"pushed_at": "2019-01-23T07:30:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 183799054,
"name": "enumpossible",
"full_name": "secmode\/enumpossible",
"owner": {
"login": "secmode",
"id": 43304873,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43304873?v=4",
"html_url": "https:\/\/github.com\/secmode"
},
"html_url": "https:\/\/github.com\/secmode\/enumpossible",
"description": "Checks a list of SSH servers for password-based auth availability and for the existence of SSH user enumeration vulnerability (CVE-2018-15473) in those identified.",
"fork": false,
"created_at": "2019-04-27T16:52:23Z",
"updated_at": "2020-09-26T06:53:13Z",
"pushed_at": "2019-09-24T21:38:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 192739498,
"name": "-",
"full_name": "trickster1103\/-",
"owner": {
"login": "trickster1103",
"id": 23507655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23507655?v=4",
"html_url": "https:\/\/github.com\/trickster1103"
},
"html_url": "https:\/\/github.com\/trickster1103\/-",
"description": "OpenSSH 用户名枚举漏洞CVE-2018-15473",
"fork": false,
"created_at": "2019-06-19T13:37:58Z",
"updated_at": "2019-06-19T13:42:05Z",
"pushed_at": "2019-06-19T13:39:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 200200646,
"name": "SSH-account-enumeration-verification-script",
"full_name": "NHPT\/SSH-account-enumeration-verification-script",
"owner": {
"login": "NHPT",
"id": 42366434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
"html_url": "https:\/\/github.com\/NHPT"
},
"html_url": "https:\/\/github.com\/NHPT\/SSH-account-enumeration-verification-script",
"description": "SSH account enumeration verification script(CVE-2018-15473)",
"fork": false,
"created_at": "2019-08-02T08:50:34Z",
"updated_at": "2019-08-03T09:15:16Z",
"pushed_at": "2019-08-03T09:15:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 218928111,
"name": "EP4-redes",
"full_name": "CaioCGH\/EP4-redes",
"owner": {
"login": "CaioCGH",
"id": 31115668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31115668?v=4",
"html_url": "https:\/\/github.com\/CaioCGH"
},
"html_url": "https:\/\/github.com\/CaioCGH\/EP4-redes",
"description": "CVE-2018-15473-Exploit",
"fork": false,
"created_at": "2019-11-01T06:39:57Z",
"updated_at": "2019-11-01T06:48:21Z",
"pushed_at": "2019-11-01T06:48:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 262294232,
"name": "easy_security",

25
2018/CVE-2018-15499.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 145583266,
"name": "CVE-2018-15499",
"full_name": "DownWithUp\/CVE-2018-15499",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-15499",
"description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)",
"fork": false,
"created_at": "2018-08-21T15:26:35Z",
"updated_at": "2021-02-27T22:04:13Z",
"pushed_at": "2018-08-23T12:55:23Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
}
]

25
2018/CVE-2018-15686.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 212683464,
"name": "remediate_cesa_2019_2091",
"full_name": "hpcprofessional\/remediate_cesa_2019_2091",
"owner": {
"login": "hpcprofessional",
"id": 13439879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13439879?v=4",
"html_url": "https:\/\/github.com\/hpcprofessional"
},
"html_url": "https:\/\/github.com\/hpcprofessional\/remediate_cesa_2019_2091",
"description": "Remediation task for CVE-2018-15686, CVE-2018-16866, and CVE-2018-16888 affecting SystemD in EL7",
"fork": false,
"created_at": "2019-10-03T21:26:04Z",
"updated_at": "2019-12-09T21:14:44Z",
"pushed_at": "2019-12-09T21:14:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-15727.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 146628899,
"name": "grafana-CVE-2018-15727",
"full_name": "u238\/grafana-CVE-2018-15727",
"owner": {
"login": "u238",
"id": 2368573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2368573?v=4",
"html_url": "https:\/\/github.com\/u238"
},
"html_url": "https:\/\/github.com\/u238\/grafana-CVE-2018-15727",
"description": "a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)",
"fork": false,
"created_at": "2018-08-29T16:35:22Z",
"updated_at": "2020-07-29T06:48:10Z",
"pushed_at": "2018-08-31T20:31:12Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 7,
"forks": 7,
"watchers": 21,
"score": 0
}
]

25
2018/CVE-2018-15832.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 148423840,
"name": "Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
"full_name": "JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
"owner": {
"login": "JacksonKuo",
"id": 5520730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5520730?v=4",
"html_url": "https:\/\/github.com\/JacksonKuo"
},
"html_url": "https:\/\/github.com\/JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
"description": "CVE-2018-15832",
"fork": false,
"created_at": "2018-09-12T04:59:11Z",
"updated_at": "2018-09-12T05:05:37Z",
"pushed_at": "2018-09-12T05:00:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-15877.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 169778674,
"name": "cve-2018-15877",
"full_name": "cved-sources\/cve-2018-15877",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-15877",
"description": "cve-2018-15877",
"fork": false,
"created_at": "2019-02-08T18:15:37Z",
"updated_at": "2019-02-08T18:16:19Z",
"pushed_at": "2019-02-08T18:16:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-15912.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 146484081,
"name": "CVE-2018-15912-PoC",
"full_name": "coderobe\/CVE-2018-15912-PoC",
"owner": {
"login": "coderobe",
"id": 8442384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8442384?v=4",
"html_url": "https:\/\/github.com\/coderobe"
},
"html_url": "https:\/\/github.com\/coderobe\/CVE-2018-15912-PoC",
"description": null,
"fork": false,
"created_at": "2018-08-28T17:40:52Z",
"updated_at": "2018-08-30T10:59:24Z",
"pushed_at": "2018-08-28T17:54:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

48
2018/CVE-2018-15961.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 160696698,
"name": "CVE-2018-15961",
"full_name": "vah13\/CVE-2018-15961",
"owner": {
"login": "vah13",
"id": 7976421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7976421?v=4",
"html_url": "https:\/\/github.com\/vah13"
},
"html_url": "https:\/\/github.com\/vah13\/CVE-2018-15961",
"description": "Unrestricted file upload in Adobe ColdFusion",
"fork": false,
"created_at": "2018-12-06T15:47:57Z",
"updated_at": "2019-10-21T04:12:24Z",
"pushed_at": "2018-12-11T16:06:39Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"score": 0
},
{
"id": 166859165,
"name": "cve-2018-15961",
"full_name": "cved-sources\/cve-2018-15961",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-15961",
"description": "cve-2018-15961",
"fork": false,
"created_at": "2019-01-21T18:15:17Z",
"updated_at": "2019-01-21T18:15:36Z",
"pushed_at": "2019-01-21T18:15:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-15968.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 215223074,
"name": "cve-2018-15968",
"full_name": "sharmasandeepkr\/cve-2018-15968",
"owner": {
"login": "sharmasandeepkr",
"id": 16163884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16163884?v=4",
"html_url": "https:\/\/github.com\/sharmasandeepkr"
},
"html_url": "https:\/\/github.com\/sharmasandeepkr\/cve-2018-15968",
"description": null,
"fork": false,
"created_at": "2019-10-15T06:26:08Z",
"updated_at": "2019-10-15T06:29:24Z",
"pushed_at": "2019-10-15T06:29:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 160592463,
"name": "CVE-2018-15982",
"full_name": "FlatL1neAPT\/CVE-2018-15982",
"owner": {
"login": "FlatL1neAPT",
"id": 33692082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33692082?v=4",
"html_url": "https:\/\/github.com\/FlatL1neAPT"
},
"html_url": "https:\/\/github.com\/FlatL1neAPT\/CVE-2018-15982",
"description": "Flash sources for CVE-2018-15982 used by NK",
"fork": false,
"created_at": "2018-12-05T23:41:37Z",
"updated_at": "2020-03-30T04:44:32Z",
"pushed_at": "2018-12-05T21:42:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 15,
"forks": 15,
"watchers": 1,
"score": 0
},
{
"id": 160650543,
"name": "CVE-2018-15982_PoC",
"full_name": "AirEvan\/CVE-2018-15982_PoC",
"owner": {
"login": "AirEvan",
"id": 26640179,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26640179?v=4",
"html_url": "https:\/\/github.com\/AirEvan"
},
"html_url": "https:\/\/github.com\/AirEvan\/CVE-2018-15982_PoC",
"description": "CVE-2018-15982_PoC",
"fork": false,
"created_at": "2018-12-06T09:24:47Z",
"updated_at": "2020-10-21T13:09:38Z",
"pushed_at": "2019-11-06T09:10:36Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"score": 0
},
{
"id": 161118743,
"name": "CVE-2018-15982_EXP",
"full_name": "Ridter\/CVE-2018-15982_EXP",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/CVE-2018-15982_EXP",
"description": "exp of CVE-2018-15982",
"fork": false,
"created_at": "2018-12-10T04:53:31Z",
"updated_at": "2021-01-13T19:57:16Z",
"pushed_at": "2019-01-04T09:29:01Z",
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 65,
"forks": 65,
"watchers": 180,
"score": 0
},
{
"id": 161362902,
"name": "adobe-flash-cve2018-15982",
@ -21,5 +90,97 @@
"forks": 5,
"watchers": 10,
"score": 0
},
{
"id": 161422909,
"name": "CVE-2018-15982_EXP_IE",
"full_name": "jas502n\/CVE-2018-15982_EXP_IE",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-15982_EXP_IE",
"description": "CVE-2018-15982_EXP_IE",
"fork": false,
"created_at": "2018-12-12T02:41:31Z",
"updated_at": "2020-04-06T10:50:19Z",
"pushed_at": "2018-12-12T02:54:01Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"forks": 7,
"watchers": 12,
"score": 0
},
{
"id": 161431093,
"name": "CVE-2018-15982",
"full_name": "scanfsec\/CVE-2018-15982",
"owner": {
"login": "scanfsec",
"id": 8190138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8190138?v=4",
"html_url": "https:\/\/github.com\/scanfsec"
},
"html_url": "https:\/\/github.com\/scanfsec\/CVE-2018-15982",
"description": "Aggressor Script to launch IE driveby for CVE-2018-15982.",
"fork": false,
"created_at": "2018-12-12T04:07:08Z",
"updated_at": "2020-05-03T09:35:34Z",
"pushed_at": "2019-12-07T14:18:04Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 7,
"forks": 7,
"watchers": 25,
"score": 0
},
{
"id": 162516879,
"name": "CVE-2018-15982",
"full_name": "SyFi\/CVE-2018-15982",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4",
"html_url": "https:\/\/github.com\/SyFi"
},
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-15982",
"description": "Flash 2018-15982 UAF ",
"fork": false,
"created_at": "2018-12-20T02:40:22Z",
"updated_at": "2020-02-13T14:33:56Z",
"pushed_at": "2018-12-20T11:14:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 219955315,
"name": "CVE-2018-15982",
"full_name": "create12138\/CVE-2018-15982",
"owner": {
"login": "create12138",
"id": 53077864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53077864?v=4",
"html_url": "https:\/\/github.com\/create12138"
},
"html_url": "https:\/\/github.com\/create12138\/CVE-2018-15982",
"description": null,
"fork": false,
"created_at": "2019-11-06T09:08:04Z",
"updated_at": "2019-11-06T09:08:04Z",
"pushed_at": "2019-11-06T09:08:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-16119.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 153753890,
"name": "CVE-2018-16119",
"full_name": "hdbreaker\/CVE-2018-16119",
"owner": {
"login": "hdbreaker",
"id": 5799585,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5799585?v=4",
"html_url": "https:\/\/github.com\/hdbreaker"
},
"html_url": "https:\/\/github.com\/hdbreaker\/CVE-2018-16119",
"description": "TP-Link TL-WR1043ND - Authenticated Remote Code Execution",
"fork": false,
"created_at": "2018-10-19T08:50:52Z",
"updated_at": "2021-01-27T09:25:57Z",
"pushed_at": "2019-04-29T15:26:28Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 2,
"forks": 2,
"watchers": 12,
"score": 0
}
]

25
2018/CVE-2018-16135.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 215251578,
"name": "CVE-2018-16135",
"full_name": "c0d3G33k\/CVE-2018-16135",
"owner": {
"login": "c0d3G33k",
"id": 16446505,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16446505?v=4",
"html_url": "https:\/\/github.com\/c0d3G33k"
},
"html_url": "https:\/\/github.com\/c0d3G33k\/CVE-2018-16135",
"description": "Opera Mini Location Permission Spoof Vulnerability",
"fork": false,
"created_at": "2019-10-15T08:50:54Z",
"updated_at": "2020-03-21T18:41:51Z",
"pushed_at": "2019-10-15T09:03:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-16156.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 161401564,
"name": "CVE-2018-16156-Exploit",
"full_name": "securifera\/CVE-2018-16156-Exploit",
"owner": {
"login": "securifera",
"id": 12126525,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12126525?v=4",
"html_url": "https:\/\/github.com\/securifera"
},
"html_url": "https:\/\/github.com\/securifera\/CVE-2018-16156-Exploit",
"description": null,
"fork": false,
"created_at": "2018-12-11T22:25:22Z",
"updated_at": "2020-03-30T03:50:41Z",
"pushed_at": "2018-12-11T22:29:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2018/CVE-2018-16283.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 175869476,
"name": "cve-2018-16283",
"full_name": "cved-sources\/cve-2018-16283",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-16283",
"description": "cve-2018-16283",
"fork": false,
"created_at": "2019-03-15T18:07:13Z",
"updated_at": "2019-03-15T18:08:12Z",
"pushed_at": "2019-03-15T18:08:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-16323.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 158098266,
"name": "XBadManners",
"full_name": "ttffdd\/XBadManners",
"owner": {
"login": "ttffdd",
"id": 5412272,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5412272?v=4",
"html_url": "https:\/\/github.com\/ttffdd"
},
"html_url": "https:\/\/github.com\/ttffdd\/XBadManners",
"description": "Tool for CVE-2018-16323",
"fork": false,
"created_at": "2018-11-18T15:30:46Z",
"updated_at": "2021-03-17T05:55:22Z",
"pushed_at": "2019-01-17T21:01:56Z",
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 9,
"forks": 9,
"watchers": 78,
"score": 0
}
]

25
2018/CVE-2018-16341.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 190447165,
"name": "CVE-2018-16341",
"full_name": "mpgn\/CVE-2018-16341",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2018-16341",
"description": "CVE-2018-16341 - Nuxeo Remote Code Execution without authentication using Server Side Template Injection",
"fork": false,
"created_at": "2019-06-05T18:24:45Z",
"updated_at": "2020-05-09T20:40:30Z",
"pushed_at": "2019-06-05T18:43:28Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 11,
"score": 0
}
]

25
2018/CVE-2018-16370.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 147602690,
"name": "CVE-2018-16370",
"full_name": "snappyJack\/CVE-2018-16370",
"owner": {
"login": "snappyJack",
"id": 16055573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
"html_url": "https:\/\/github.com\/snappyJack"
},
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16370",
"description": "In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through \/Public\/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.",
"fork": false,
"created_at": "2018-09-06T01:52:47Z",
"updated_at": "2018-09-06T02:02:55Z",
"pushed_at": "2018-09-06T02:02:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-16373.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 147603389,
"name": "CVE-2018-16373",
"full_name": "snappyJack\/CVE-2018-16373",
"owner": {
"login": "snappyJack",
"id": 16055573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16055573?v=4",
"html_url": "https:\/\/github.com\/snappyJack"
},
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16373",
"description": "Frog CMS 0.9.5 has an Upload > vulnerability that can create files via > \/admin\/?\/plugin\/file_manager\/save",
"fork": false,
"created_at": "2018-09-06T02:00:24Z",
"updated_at": "2018-09-06T02:01:33Z",
"pushed_at": "2018-09-06T02:01:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -21,5 +21,74 @@
"forks": 4,
"watchers": 20,
"score": 0
},
{
"id": 157982249,
"name": "CVE-2018-16509",
"full_name": "knqyf263\/CVE-2018-16509",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-16509",
"description": "CVE-2018-16509 (Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities)",
"fork": false,
"created_at": "2018-11-17T12:26:38Z",
"updated_at": "2020-05-07T13:31:56Z",
"pushed_at": "2019-02-01T05:14:34Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 165319040,
"name": "cve-2018-16509",
"full_name": "cved-sources\/cve-2018-16509",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-16509",
"description": "cve-2018-16509",
"fork": false,
"created_at": "2019-01-11T22:19:46Z",
"updated_at": "2019-01-11T22:20:11Z",
"pushed_at": "2019-01-11T22:20:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 200477390,
"name": "CVE-2018-16509",
"full_name": "rhpco\/CVE-2018-16509",
"owner": {
"login": "rhpco",
"id": 6824466,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6824466?v=4",
"html_url": "https:\/\/github.com\/rhpco"
},
"html_url": "https:\/\/github.com\/rhpco\/CVE-2018-16509",
"description": "CVE-2018-16509 Docker Playground - Ghostscript command execution",
"fork": false,
"created_at": "2019-08-04T10:09:31Z",
"updated_at": "2019-08-04T10:16:52Z",
"pushed_at": "2019-08-04T10:14:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-16706.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 179937571,
"name": "CVE-2018-16706",
"full_name": "Nurdilin\/CVE-2018-16706",
"owner": {
"login": "Nurdilin",
"id": 17847627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17847627?v=4",
"html_url": "https:\/\/github.com\/Nurdilin"
},
"html_url": "https:\/\/github.com\/Nurdilin\/CVE-2018-16706",
"description": "Or how I turn off my TV via a cronjob",
"fork": false,
"created_at": "2019-04-07T08:30:12Z",
"updated_at": "2019-04-07T09:14:50Z",
"pushed_at": "2019-04-07T09:14:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

25
2018/CVE-2018-16711.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 149358711,
"name": "CVE-2018-16711",
"full_name": "DownWithUp\/CVE-2018-16711",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16711",
"description": "PoC code for CVE-2018-16711 (exploit by wrmsr)",
"fork": false,
"created_at": "2018-09-18T22:18:32Z",
"updated_at": "2021-02-27T22:04:11Z",
"pushed_at": "2018-09-25T12:15:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
}
]

25
2018/CVE-2018-16712.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 150000695,
"name": "CVE-2018-16712",
"full_name": "DownWithUp\/CVE-2018-16712",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16712",
"description": "PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)",
"fork": false,
"created_at": "2018-09-23T16:03:06Z",
"updated_at": "2021-02-27T22:03:59Z",
"pushed_at": "2018-12-01T23:02:46Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 5,
"forks": 5,
"watchers": 24,
"score": 0
}
]

25
2018/CVE-2018-16713.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 148797728,
"name": "CVE-2018-16713",
"full_name": "DownWithUp\/CVE-2018-16713",
"owner": {
"login": "DownWithUp",
"id": 16905064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16905064?v=4",
"html_url": "https:\/\/github.com\/DownWithUp"
},
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-16713",
"description": "PoC code for CVE-2018-16713 (exploit by rdmsr)",
"fork": false,
"created_at": "2018-09-14T14:10:22Z",
"updated_at": "2021-02-27T22:04:10Z",
"pushed_at": "2018-09-25T12:15:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

25
2018/CVE-2018-16854.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 179544105,
"name": "moodle-login-csrf",
"full_name": "danielthatcher\/moodle-login-csrf",
"owner": {
"login": "danielthatcher",
"id": 11726509,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11726509?v=4",
"html_url": "https:\/\/github.com\/danielthatcher"
},
"html_url": "https:\/\/github.com\/danielthatcher\/moodle-login-csrf",
"description": "Scripts for exploiting MSA-18-0020 (CVE-2018-16854) and MSA-19-0004 (CVE-2019-3847)",
"fork": false,
"created_at": "2019-04-04T17:24:47Z",
"updated_at": "2019-09-29T23:50:29Z",
"pushed_at": "2019-07-21T15:52:46Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 181296970,
"name": "libreofficeExploit1",
"full_name": "4nimanegra\/libreofficeExploit1",
"owner": {
"login": "4nimanegra",
"id": 18334322,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18334322?v=4",
"html_url": "https:\/\/github.com\/4nimanegra"
},
"html_url": "https:\/\/github.com\/4nimanegra\/libreofficeExploit1",
"description": "CVE-2018-16858 exploit implementation",
"fork": false,
"created_at": "2019-04-14T11:10:18Z",
"updated_at": "2019-04-19T14:43:20Z",
"pushed_at": "2019-04-14T19:20:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 220178785,
"name": "detect-cve-2018-16858",

Some files were not shown because too many files have changed in this diff Show more