diff --git a/2014/CVE-2014-0196.json b/2014/CVE-2014-0196.json index 68bc3b2566..819d41db4b 100644 --- a/2014/CVE-2014-0196.json +++ b/2014/CVE-2014-0196.json @@ -21,5 +21,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 28126641, + "name": "CVE-2014-0196", + "full_name": "tempbottle\/CVE-2014-0196", + "owner": { + "login": "tempbottle", + "id": 1203820, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1203820?v=4", + "html_url": "https:\/\/github.com\/tempbottle" + }, + "html_url": "https:\/\/github.com\/tempbottle\/CVE-2014-0196", + "description": "CVE-2014-0196: Linux kernel pty layer race condition memory corruption", + "fork": false, + "created_at": "2014-12-17T07:39:00Z", + "updated_at": "2015-10-24T13:32:06Z", + "pushed_at": "2014-05-13T04:53:40Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0224.json b/2014/CVE-2014-0224.json index 755428430e..eeea72471b 100644 --- a/2014/CVE-2014-0224.json +++ b/2014/CVE-2014-0224.json @@ -22,6 +22,52 @@ "watchers": 35, "score": 0 }, + { + "id": 21604310, + "name": "CVE-2014-0224", + "full_name": "iph0n3\/CVE-2014-0224", + "owner": { + "login": "iph0n3", + "id": 1528152, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1528152?v=4", + "html_url": "https:\/\/github.com\/iph0n3" + }, + "html_url": "https:\/\/github.com\/iph0n3\/CVE-2014-0224", + "description": null, + "fork": false, + "created_at": "2014-07-08T08:08:00Z", + "updated_at": "2015-08-10T05:31:12Z", + "pushed_at": "2014-06-06T08:33:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 21711116, + "name": "ccs-eval", + "full_name": "droptables\/ccs-eval", + "owner": { + "login": "droptables", + "id": 5084547, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5084547?v=4", + "html_url": "https:\/\/github.com\/droptables" + }, + "html_url": "https:\/\/github.com\/droptables\/ccs-eval", + "description": "Used for evaluating hosts for CVE-2014-0224", + "fork": false, + "created_at": "2014-07-10T21:32:28Z", + "updated_at": "2015-04-07T04:27:18Z", + "pushed_at": "2014-07-10T21:41:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 21854976, "name": "openssl-ccs-cve-2014-0224", @@ -44,5 +90,28 @@ "forks": 4, "watchers": 12, "score": 0 + }, + { + "id": 21900951, + "name": "CVE-2014-0224", + "full_name": "secretnonempty\/CVE-2014-0224", + "owner": { + "login": "secretnonempty", + "id": 1168808, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1168808?v=4", + "html_url": "https:\/\/github.com\/secretnonempty" + }, + "html_url": "https:\/\/github.com\/secretnonempty\/CVE-2014-0224", + "description": null, + "fork": false, + "created_at": "2014-07-16T13:09:41Z", + "updated_at": "2020-07-23T03:32:39Z", + "pushed_at": "2014-07-18T06:53:23Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 4, + "forks": 4, + "watchers": 6, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0521.json b/2014/CVE-2014-0521.json new file mode 100644 index 0000000000..94c7c79b06 --- /dev/null +++ b/2014/CVE-2014-0521.json @@ -0,0 +1,25 @@ +[ + { + "id": 23252947, + "name": "cve-2014-0521", + "full_name": "molnarg\/cve-2014-0521", + "owner": { + "login": "molnarg", + "id": 894421, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/894421?v=4", + "html_url": "https:\/\/github.com\/molnarg" + }, + "html_url": "https:\/\/github.com\/molnarg\/cve-2014-0521", + "description": null, + "fork": false, + "created_at": "2014-08-23T09:54:18Z", + "updated_at": "2021-02-15T11:51:51Z", + "pushed_at": "2014-08-25T06:41:02Z", + "stargazers_count": 12, + "watchers_count": 12, + "forks_count": 11, + "forks": 11, + "watchers": 12, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1677.json b/2014/CVE-2014-1677.json new file mode 100644 index 0000000000..50dcb66ffa --- /dev/null +++ b/2014/CVE-2014-1677.json @@ -0,0 +1,25 @@ +[ + { + "id": 22477484, + "name": "freePW_tc7200Eploit", + "full_name": "tihmstar\/freePW_tc7200Eploit", + "owner": { + "login": "tihmstar", + "id": 1363935, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1363935?v=4", + "html_url": "https:\/\/github.com\/tihmstar" + }, + "html_url": "https:\/\/github.com\/tihmstar\/freePW_tc7200Eploit", + "description": "Technicolor TC7200 - Credentials Disclosure CVE : CVE-2014-1677", + "fork": false, + "created_at": "2014-07-31T17:01:29Z", + "updated_at": "2019-10-08T13:33:12Z", + "pushed_at": "2014-07-31T17:07:46Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-3120.json b/2014/CVE-2014-3120.json index a89f5262dd..f0e8973536 100644 --- a/2014/CVE-2014-3120.json +++ b/2014/CVE-2014-3120.json @@ -21,5 +21,28 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 21585576, + "name": "ElasticSearch-CVE-2014-3120", + "full_name": "echohtp\/ElasticSearch-CVE-2014-3120", + "owner": { + "login": "echohtp", + "id": 313060, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/313060?v=4", + "html_url": "https:\/\/github.com\/echohtp" + }, + "html_url": "https:\/\/github.com\/echohtp\/ElasticSearch-CVE-2014-3120", + "description": "POC Code to exploite CVE-2014-3120", + "fork": false, + "created_at": "2014-07-07T20:28:34Z", + "updated_at": "2020-08-26T00:54:13Z", + "pushed_at": "2014-07-07T20:35:30Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 5, + "forks": 5, + "watchers": 6, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index 07b7cc481b..a3139f727e 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1,4 +1,142 @@ [ + { + "id": 24422837, + "name": "bash-cve-2014-6271-fixes", + "full_name": "dlitz\/bash-cve-2014-6271-fixes", + "owner": { + "login": "dlitz", + "id": 99377, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99377?v=4", + "html_url": "https:\/\/github.com\/dlitz" + }, + "html_url": "https:\/\/github.com\/dlitz\/bash-cve-2014-6271-fixes", + "description": "Collected fixes for bash CVE-2014-6271", + "fork": false, + "created_at": "2014-09-24T16:26:17Z", + "updated_at": "2014-09-24T16:26:17Z", + "pushed_at": "2014-09-24T17:38:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24427252, + "name": "ansible-bashpocalypse", + "full_name": "npm\/ansible-bashpocalypse", + "owner": { + "login": "npm", + "id": 6078720, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6078720?v=4", + "html_url": "https:\/\/github.com\/npm" + }, + "html_url": "https:\/\/github.com\/npm\/ansible-bashpocalypse", + "description": "Patch for CVE-2014-6271", + "fork": false, + "created_at": "2014-09-24T18:27:03Z", + "updated_at": "2019-11-15T20:59:42Z", + "pushed_at": "2014-09-24T19:03:14Z", + "stargazers_count": 6, + "watchers_count": 6, + "forks_count": 5, + "forks": 5, + "watchers": 6, + "score": 0 + }, + { + "id": 24433228, + "name": "patched-bash-4.3", + "full_name": "ryancnelson\/patched-bash-4.3", + "owner": { + "login": "ryancnelson", + "id": 347171, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/347171?v=4", + "html_url": "https:\/\/github.com\/ryancnelson" + }, + "html_url": "https:\/\/github.com\/ryancnelson\/patched-bash-4.3", + "description": "patched-bash-4.3 for CVE-2014-6271", + "fork": false, + "created_at": "2014-09-24T21:24:43Z", + "updated_at": "2014-09-24T21:32:34Z", + "pushed_at": "2014-09-26T23:35:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24437176, + "name": "cookbook-bash-CVE-2014-6271", + "full_name": "jblaine\/cookbook-bash-CVE-2014-6271", + "owner": { + "login": "jblaine", + "id": 438740, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/438740?v=4", + "html_url": "https:\/\/github.com\/jblaine" + }, + "html_url": "https:\/\/github.com\/jblaine\/cookbook-bash-CVE-2014-6271", + "description": "Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271", + "fork": false, + "created_at": "2014-09-25T00:11:01Z", + "updated_at": "2014-09-25T00:13:03Z", + "pushed_at": "2014-09-25T12:45:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24438512, + "name": "cve-2014-6271-spec", + "full_name": "rrreeeyyy\/cve-2014-6271-spec", + "owner": { + "login": "rrreeeyyy", + "id": 2457736, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2457736?v=4", + "html_url": "https:\/\/github.com\/rrreeeyyy" + }, + "html_url": "https:\/\/github.com\/rrreeeyyy\/cve-2014-6271-spec", + "description": null, + "fork": false, + "created_at": "2014-09-25T01:12:04Z", + "updated_at": "2014-09-25T01:12:24Z", + "pushed_at": "2014-09-25T01:12:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24440225, + "name": "shellshock_scanner", + "full_name": "scottjpack\/shellshock_scanner", + "owner": { + "login": "scottjpack", + "id": 2293674, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2293674?v=4", + "html_url": "https:\/\/github.com\/scottjpack" + }, + "html_url": "https:\/\/github.com\/scottjpack\/shellshock_scanner", + "description": "Python Scanner for \"ShellShock\" (CVE-2014-6271)", + "fork": false, + "created_at": "2014-09-25T02:15:24Z", + "updated_at": "2020-12-01T08:40:09Z", + "pushed_at": "2014-09-29T23:22:12Z", + "stargazers_count": 42, + "watchers_count": 42, + "forks_count": 56, + "forks": 56, + "watchers": 42, + "score": 0 + }, { "id": 24441140, "name": "Cgi-bin_bash_Reverse", @@ -22,6 +160,52 @@ "watchers": 1, "score": 0 }, + { + "id": 24446252, + "name": "bash-up", + "full_name": "justzx2011\/bash-up", + "owner": { + "login": "justzx2011", + "id": 1185865, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1185865?v=4", + "html_url": "https:\/\/github.com\/justzx2011" + }, + "html_url": "https:\/\/github.com\/justzx2011\/bash-up", + "description": "a auto script to fix CVE-2014-6271 bash vulnerability", + "fork": false, + "created_at": "2014-09-25T06:24:18Z", + "updated_at": "2014-09-25T06:24:18Z", + "pushed_at": "2014-09-25T06:31:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24449282, + "name": "CVE-2014-6271", + "full_name": "mattclegg\/CVE-2014-6271", + "owner": { + "login": "mattclegg", + "id": 303487, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/303487?v=4", + "html_url": "https:\/\/github.com\/mattclegg" + }, + "html_url": "https:\/\/github.com\/mattclegg\/CVE-2014-6271", + "description": null, + "fork": false, + "created_at": "2014-09-25T08:10:26Z", + "updated_at": "2014-09-25T08:27:53Z", + "pushed_at": "2014-09-25T08:30:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 24451053, "name": "Nessus_CVE-2014-6271_check", @@ -45,6 +229,190 @@ "watchers": 0, "score": 0 }, + { + "id": 24457150, + "name": "Rainstorm", + "full_name": "RainMak3r\/Rainstorm", + "owner": { + "login": "RainMak3r", + "id": 3872733, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3872733?v=4", + "html_url": "https:\/\/github.com\/RainMak3r" + }, + "html_url": "https:\/\/github.com\/RainMak3r\/Rainstorm", + "description": "CVE-2014-6271 RCE tool ", + "fork": false, + "created_at": "2014-09-25T12:28:33Z", + "updated_at": "2018-11-16T13:59:04Z", + "pushed_at": "2014-09-26T01:09:55Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + }, + { + "id": 24457675, + "name": "shocknaww", + "full_name": "gabemarshall\/shocknaww", + "owner": { + "login": "gabemarshall", + "id": 2541585, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2541585?v=4", + "html_url": "https:\/\/github.com\/gabemarshall" + }, + "html_url": "https:\/\/github.com\/gabemarshall\/shocknaww", + "description": "Simple script to check for CVE-2014-6271", + "fork": false, + "created_at": "2014-09-25T12:46:13Z", + "updated_at": "2016-02-20T13:34:31Z", + "pushed_at": "2014-09-29T15:53:21Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 24458320, + "name": "CVE-2014-6271", + "full_name": "woltage\/CVE-2014-6271", + "owner": { + "login": "woltage", + "id": 250504, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/250504?v=4", + "html_url": "https:\/\/github.com\/woltage" + }, + "html_url": "https:\/\/github.com\/woltage\/CVE-2014-6271", + "description": null, + "fork": false, + "created_at": "2014-09-25T13:06:50Z", + "updated_at": "2014-09-25T13:11:11Z", + "pushed_at": "2014-09-26T05:59:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24465754, + "name": "vagrant-shellshock", + "full_name": "ariarijp\/vagrant-shellshock", + "owner": { + "login": "ariarijp", + "id": 635649, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/635649?v=4", + "html_url": "https:\/\/github.com\/ariarijp" + }, + "html_url": "https:\/\/github.com\/ariarijp\/vagrant-shellshock", + "description": "CVE-2014-6271の検証用Vagrantfileです", + "fork": false, + "created_at": "2014-09-25T16:19:41Z", + "updated_at": "2014-09-25T16:19:46Z", + "pushed_at": "2014-09-28T04:25:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24477401, + "name": "shellshock", + "full_name": "themson\/shellshock", + "owner": { + "login": "themson", + "id": 6145047, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6145047?v=4", + "html_url": "https:\/\/github.com\/themson" + }, + "html_url": "https:\/\/github.com\/themson\/shellshock", + "description": "scripts associate with bourne shell EVN function parsing vulnerability CVE-2014-6271", + "fork": false, + "created_at": "2014-09-25T22:22:40Z", + "updated_at": "2016-04-16T03:43:20Z", + "pushed_at": "2014-09-27T17:38:07Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 24481523, + "name": "BadBash", + "full_name": "securusglobal\/BadBash", + "owner": { + "login": "securusglobal", + "id": 709629, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/709629?v=4", + "html_url": "https:\/\/github.com\/securusglobal" + }, + "html_url": "https:\/\/github.com\/securusglobal\/BadBash", + "description": "CVE-2014-6271 (ShellShock) RCE PoC tool ", + "fork": false, + "created_at": "2014-09-26T01:30:14Z", + "updated_at": "2020-09-25T16:27:43Z", + "pushed_at": "2014-09-26T01:35:34Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 1, + "forks": 1, + "watchers": 4, + "score": 0 + }, + { + "id": 24485944, + "name": "CVE-2014-6271", + "full_name": "villadora\/CVE-2014-6271", + "owner": { + "login": "villadora", + "id": 724998, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/724998?v=4", + "html_url": "https:\/\/github.com\/villadora" + }, + "html_url": "https:\/\/github.com\/villadora\/CVE-2014-6271", + "description": "scaner for cve-2014-6271", + "fork": false, + "created_at": "2014-09-26T04:15:15Z", + "updated_at": "2014-09-28T02:16:43Z", + "pushed_at": "2014-09-26T04:15:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 24495682, + "name": "salt-shellshock", + "full_name": "APSL\/salt-shellshock", + "owner": { + "login": "APSL", + "id": 469968, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/469968?v=4", + "html_url": "https:\/\/github.com\/APSL" + }, + "html_url": "https:\/\/github.com\/APSL\/salt-shellshock", + "description": "Salt recipe for shellshock (CVE-2014-6271)", + "fork": false, + "created_at": "2014-09-26T10:30:37Z", + "updated_at": "2014-09-26T18:01:43Z", + "pushed_at": "2014-09-26T11:04:53Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, { "id": 24504536, "name": "bash-fix-exploit", @@ -68,6 +436,29 @@ "watchers": 0, "score": 0 }, + { + "id": 24511712, + "name": "debian-lenny-bash_3.2.52-cve-2014-6271", + "full_name": "internero\/debian-lenny-bash_3.2.52-cve-2014-6271", + "owner": { + "login": "internero", + "id": 553577, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/553577?v=4", + "html_url": "https:\/\/github.com\/internero" + }, + "html_url": "https:\/\/github.com\/internero\/debian-lenny-bash_3.2.52-cve-2014-6271", + "description": "Debian Lenny Bash packages with cve-2014-6271 patches (i386 and amd64)", + "fork": false, + "created_at": "2014-09-26T18:59:04Z", + "updated_at": "2014-09-26T18:59:04Z", + "pushed_at": "2014-09-26T19:10:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 24520969, "name": "shellshock-shell", @@ -91,6 +482,98 @@ "watchers": 1, "score": 0 }, + { + "id": 24523190, + "name": "shellshock_crawler", + "full_name": "vonnyfly\/shellshock_crawler", + "owner": { + "login": "vonnyfly", + "id": 935511, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/935511?v=4", + "html_url": "https:\/\/github.com\/vonnyfly" + }, + "html_url": "https:\/\/github.com\/vonnyfly\/shellshock_crawler", + "description": "Using google to scan sites for \"ShellShock\" (CVE-2014-6271)", + "fork": false, + "created_at": "2014-09-27T04:08:19Z", + "updated_at": "2014-09-27T04:09:17Z", + "pushed_at": "2014-09-27T04:18:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 3, + "forks": 3, + "watchers": 0, + "score": 0 + }, + { + "id": 24543190, + "name": "bash-3.2-fixed-CVE-2014-6271", + "full_name": "u20024804\/bash-3.2-fixed-CVE-2014-6271", + "owner": { + "login": "u20024804", + "id": 47252, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4", + "html_url": "https:\/\/github.com\/u20024804" + }, + "html_url": "https:\/\/github.com\/u20024804\/bash-3.2-fixed-CVE-2014-6271", + "description": null, + "fork": false, + "created_at": "2014-09-27T21:29:23Z", + "updated_at": "2014-09-27T22:21:09Z", + "pushed_at": "2014-09-27T22:21:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24544128, + "name": "bash-4.2-fixed-CVE-2014-6271", + "full_name": "u20024804\/bash-4.2-fixed-CVE-2014-6271", + "owner": { + "login": "u20024804", + "id": 47252, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4", + "html_url": "https:\/\/github.com\/u20024804" + }, + "html_url": "https:\/\/github.com\/u20024804\/bash-4.2-fixed-CVE-2014-6271", + "description": null, + "fork": false, + "created_at": "2014-09-27T22:22:27Z", + "updated_at": "2014-09-27T22:38:34Z", + "pushed_at": "2014-09-27T22:38:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 24544131, + "name": "bash-4.3-fixed-CVE-2014-6271", + "full_name": "u20024804\/bash-4.3-fixed-CVE-2014-6271", + "owner": { + "login": "u20024804", + "id": 47252, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47252?v=4", + "html_url": "https:\/\/github.com\/u20024804" + }, + "html_url": "https:\/\/github.com\/u20024804\/bash-4.3-fixed-CVE-2014-6271", + "description": null, + "fork": false, + "created_at": "2014-09-27T22:22:41Z", + "updated_at": "2014-09-27T22:58:14Z", + "pushed_at": "2014-09-27T22:58:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 24549863, "name": "shellshock-cgi", @@ -114,6 +597,144 @@ "watchers": 9, "score": 0 }, + { + "id": 24566397, + "name": "ShellShock-CGI-Scan", + "full_name": "proclnas\/ShellShock-CGI-Scan", + "owner": { + "login": "proclnas", + "id": 3154242, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3154242?v=4", + "html_url": "https:\/\/github.com\/proclnas" + }, + "html_url": "https:\/\/github.com\/proclnas\/ShellShock-CGI-Scan", + "description": "A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug)", + "fork": false, + "created_at": "2014-09-28T18:05:20Z", + "updated_at": "2020-04-01T13:28:02Z", + "pushed_at": "2014-09-28T17:57:57Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 3, + "forks": 3, + "watchers": 1, + "score": 0 + }, + { + "id": 24589519, + "name": "RIS", + "full_name": "sch3m4\/RIS", + "owner": { + "login": "sch3m4", + "id": 607081, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/607081?v=4", + "html_url": "https:\/\/github.com\/sch3m4" + }, + "html_url": "https:\/\/github.com\/sch3m4\/RIS", + "description": "CVE-2014-6271 Remote Interactive Shell - PoC Exploit", + "fork": false, + "created_at": "2014-09-29T10:06:18Z", + "updated_at": "2019-08-13T15:51:47Z", + "pushed_at": "2014-09-29T10:09:16Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 24595830, + "name": "CVE-2014-6271_Test", + "full_name": "ryeyao\/CVE-2014-6271_Test", + "owner": { + "login": "ryeyao", + "id": 1586403, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1586403?v=4", + "html_url": "https:\/\/github.com\/ryeyao" + }, + "html_url": "https:\/\/github.com\/ryeyao\/CVE-2014-6271_Test", + "description": null, + "fork": false, + "created_at": "2014-09-29T13:16:08Z", + "updated_at": "2014-12-22T09:56:08Z", + "pushed_at": "2014-09-29T18:33:11Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 24602197, + "name": "CGIShell", + "full_name": "cj1324\/CGIShell", + "owner": { + "login": "cj1324", + "id": 489649, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/489649?v=4", + "html_url": "https:\/\/github.com\/cj1324" + }, + "html_url": "https:\/\/github.com\/cj1324\/CGIShell", + "description": "shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGI", + "fork": false, + "created_at": "2014-09-29T16:02:15Z", + "updated_at": "2020-04-07T07:58:34Z", + "pushed_at": "2014-10-02T10:36:15Z", + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 12, + "forks": 12, + "watchers": 14, + "score": 0 + }, + { + "id": 24608575, + "name": "puppet-shellshock", + "full_name": "renanvicente\/puppet-shellshock", + "owner": { + "login": "renanvicente", + "id": 5564668, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5564668?v=4", + "html_url": "https:\/\/github.com\/renanvicente" + }, + "html_url": "https:\/\/github.com\/renanvicente\/puppet-shellshock", + "description": "This module determine the vulnerability of a bash binary to the shellshock exploits (CVE-2014-6271 or CVE-2014-7169) and then patch that where possible", + "fork": false, + "created_at": "2014-09-29T18:57:38Z", + "updated_at": "2020-04-07T07:58:55Z", + "pushed_at": "2014-09-29T20:07:14Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 24765252, + "name": "Shellshock-Vulnerability-Scan", + "full_name": "indiandragon\/Shellshock-Vulnerability-Scan", + "owner": { + "login": "indiandragon", + "id": 1708856, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1708856?v=4", + "html_url": "https:\/\/github.com\/indiandragon" + }, + "html_url": "https:\/\/github.com\/indiandragon\/Shellshock-Vulnerability-Scan", + "description": "Android app to scan for bash Vulnerability - CVE-2014-6271 also known as Shellshock", + "fork": false, + "created_at": "2014-10-03T16:22:28Z", + "updated_at": "2018-08-14T11:50:42Z", + "pushed_at": "2014-10-04T06:00:10Z", + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 8, + "forks": 8, + "watchers": 8, + "score": 0 + }, { "id": 26286804, "name": "pyshellshock", diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index d43f16b3f2..52158a3ab0 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -59,13 +59,13 @@ "description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-08T14:19:51Z", - "updated_at": "2021-03-08T06:27:09Z", + "updated_at": "2021-03-21T10:12:55Z", "pushed_at": "2018-04-07T01:10:06Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "forks_count": 38, "forks": 38, - "watchers": 69, + "watchers": 70, "score": 0 }, { diff --git a/2016/CVE-2016-2555.json b/2016/CVE-2016-2555.json index ec03965b9b..0b4d353701 100644 --- a/2016/CVE-2016-2555.json +++ b/2016/CVE-2016-2555.json @@ -36,8 +36,8 @@ "description": "Exploiting CVE-2016-2555 enumerating and dumping the underlying Database.", "fork": false, "created_at": "2021-03-20T11:42:32Z", - "updated_at": "2021-03-20T11:43:48Z", - "pushed_at": "2021-03-20T11:43:46Z", + "updated_at": "2021-03-21T14:03:02Z", + "pushed_at": "2021-03-21T14:03:00Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json index 8271b69d83..2c84ced56b 100644 --- a/2017/CVE-2017-0144.json +++ b/2017/CVE-2017-0144.json @@ -13,13 +13,13 @@ "description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)", "fork": false, "created_at": "2017-07-16T19:44:04Z", - "updated_at": "2021-03-15T05:37:56Z", + "updated_at": "2021-03-21T09:31:47Z", "pushed_at": "2019-07-23T19:24:01Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "forks_count": 109, "forks": 109, - "watchers": 275, + "watchers": 276, "score": 0 }, { diff --git a/2017/CVE-2017-18044.json b/2017/CVE-2017-18044.json index 1e725ae9f2..c1c279fc64 100644 --- a/2017/CVE-2017-18044.json +++ b/2017/CVE-2017-18044.json @@ -13,13 +13,13 @@ "description": "Commvault-CVE-2017-18044", "fork": false, "created_at": "2018-10-02T19:18:31Z", - "updated_at": "2020-03-30T03:51:07Z", + "updated_at": "2021-03-21T10:31:14Z", "pushed_at": "2018-10-07T18:12:55Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "forks_count": 5, "forks": 5, - "watchers": 4, + "watchers": 3, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index 754cffe49e..b0d39725ee 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -13,13 +13,13 @@ "description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC", "fork": false, "created_at": "2017-04-10T03:44:04Z", - "updated_at": "2021-03-16T06:37:24Z", + "updated_at": "2021-03-21T09:51:44Z", "pushed_at": "2017-04-12T09:17:27Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 186, + "watchers_count": 186, "forks_count": 81, "forks": 81, - "watchers": 185, + "watchers": 186, "score": 0 }, { diff --git a/2018/CVE-2018-0202.json b/2018/CVE-2018-0202.json new file mode 100644 index 0000000000..a8735f2aa0 --- /dev/null +++ b/2018/CVE-2018-0202.json @@ -0,0 +1,25 @@ +[ + { + "id": 158891873, + "name": "CVE-2018-0202", + "full_name": "jaychowjingjie\/CVE-2018-0202", + "owner": { + "login": "jaychowjingjie", + "id": 11684383, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684383?v=4", + "html_url": "https:\/\/github.com\/jaychowjingjie" + }, + "html_url": "https:\/\/github.com\/jaychowjingjie\/CVE-2018-0202", + "description": "Security & Privacy in Computing(Fall 2018), Final Group Project at JHUISI, clamscan vulnerability in Cisco's ClamAV 0.99.3", + "fork": false, + "created_at": "2018-11-24T01:18:52Z", + "updated_at": "2019-03-26T05:00:47Z", + "pushed_at": "2019-03-26T05:00:46Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-0296.json b/2018/CVE-2018-0296.json index 60ab5d723d..73c0c9cfe0 100644 --- a/2018/CVE-2018-0296.json +++ b/2018/CVE-2018-0296.json @@ -67,5 +67,28 @@ "forks": 2, "watchers": 1, "score": 0 + }, + { + "id": 162431036, + "name": "CVE-2018-0296", + "full_name": "qiantu88\/CVE-2018-0296", + "owner": { + "login": "qiantu88", + "id": 35452263, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35452263?v=4", + "html_url": "https:\/\/github.com\/qiantu88" + }, + "html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-0296", + "description": "https:\/\/github.com\/milo2012\/CVE-2018-0296.git", + "fork": false, + "created_at": "2018-12-19T11:57:43Z", + "updated_at": "2018-12-19T11:59:47Z", + "pushed_at": "2018-12-19T11:59:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-0708.json b/2018/CVE-2018-0708.json new file mode 100644 index 0000000000..d63af969c2 --- /dev/null +++ b/2018/CVE-2018-0708.json @@ -0,0 +1,25 @@ +[ + { + "id": 198731225, + "name": "CVE-2019-0708", + "full_name": "ntkernel0\/CVE-2019-0708", + "owner": { + "login": "ntkernel0", + "id": 46866847, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46866847?v=4", + "html_url": "https:\/\/github.com\/ntkernel0" + }, + "html_url": "https:\/\/github.com\/ntkernel0\/CVE-2019-0708", + "description": "收集网上CVE-2018-0708的poc和exp(目前没有找到exp)", + "fork": false, + "created_at": "2019-07-25T01:05:21Z", + "updated_at": "2019-12-07T02:05:23Z", + "pushed_at": "2019-07-25T01:03:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-0952.json b/2018/CVE-2018-0952.json new file mode 100644 index 0000000000..2386b5980f --- /dev/null +++ b/2018/CVE-2018-0952.json @@ -0,0 +1,25 @@ +[ + { + "id": 145615979, + "name": "CVE-2018-0952-SystemCollector", + "full_name": "atredispartners\/CVE-2018-0952-SystemCollector", + "owner": { + "login": "atredispartners", + "id": 7254370, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7254370?v=4", + "html_url": "https:\/\/github.com\/atredispartners" + }, + "html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector", + "description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service", + "fork": false, + "created_at": "2018-08-21T20:29:10Z", + "updated_at": "2021-02-02T05:09:56Z", + "pushed_at": "2018-08-21T20:30:24Z", + "stargazers_count": 107, + "watchers_count": 107, + "forks_count": 36, + "forks": 36, + "watchers": 107, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000082.json b/2018/CVE-2018-1000082.json new file mode 100644 index 0000000000..56bf67aa7f --- /dev/null +++ b/2018/CVE-2018-1000082.json @@ -0,0 +1,25 @@ +[ + { + "id": 216815203, + "name": "CVE-2018-1000082-exploit", + "full_name": "SECFORCE\/CVE-2018-1000082-exploit", + "owner": { + "login": "SECFORCE", + "id": 8157384, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", + "html_url": "https:\/\/github.com\/SECFORCE" + }, + "html_url": "https:\/\/github.com\/SECFORCE\/CVE-2018-1000082-exploit", + "description": null, + "fork": false, + "created_at": "2019-10-22T13:02:02Z", + "updated_at": "2020-04-22T03:28:35Z", + "pushed_at": "2019-10-22T13:02:03Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000134.json b/2018/CVE-2018-1000134.json new file mode 100644 index 0000000000..0d223efbd5 --- /dev/null +++ b/2018/CVE-2018-1000134.json @@ -0,0 +1,25 @@ +[ + { + "id": 156499957, + "name": "cve-2018-1000134", + "full_name": "dragotime\/cve-2018-1000134", + "owner": { + "login": "dragotime", + "id": 43851975, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43851975?v=4", + "html_url": "https:\/\/github.com\/dragotime" + }, + "html_url": "https:\/\/github.com\/dragotime\/cve-2018-1000134", + "description": null, + "fork": false, + "created_at": "2018-11-07T06:22:47Z", + "updated_at": "2018-11-07T06:22:47Z", + "pushed_at": "2018-11-07T06:22:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000140.json b/2018/CVE-2018-1000140.json new file mode 100644 index 0000000000..f6465b69d1 --- /dev/null +++ b/2018/CVE-2018-1000140.json @@ -0,0 +1,48 @@ +[ + { + "id": 186699953, + "name": "rsyslog-librelp-CVE-2018-1000140", + "full_name": "s0\/rsyslog-librelp-CVE-2018-1000140", + "owner": { + "login": "s0", + "id": 3319932, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3319932?v=4", + "html_url": "https:\/\/github.com\/s0" + }, + "html_url": "https:\/\/github.com\/s0\/rsyslog-librelp-CVE-2018-1000140", + "description": "Pinned version of rsyslov vulnerable to CVE-2018-1000140", + "fork": false, + "created_at": "2019-05-14T21:02:07Z", + "updated_at": "2019-05-14T21:08:19Z", + "pushed_at": "2019-05-14T21:07:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 186706555, + "name": "rsyslog-librelp-CVE-2018-1000140-fixed", + "full_name": "s0\/rsyslog-librelp-CVE-2018-1000140-fixed", + "owner": { + "login": "s0", + "id": 3319932, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3319932?v=4", + "html_url": "https:\/\/github.com\/s0" + }, + "html_url": "https:\/\/github.com\/s0\/rsyslog-librelp-CVE-2018-1000140-fixed", + "description": null, + "fork": false, + "created_at": "2019-05-14T21:58:54Z", + "updated_at": "2019-05-14T21:59:39Z", + "pushed_at": "2019-05-14T21:59:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000224.json b/2018/CVE-2018-1000224.json new file mode 100644 index 0000000000..4d7f0b3ffd --- /dev/null +++ b/2018/CVE-2018-1000224.json @@ -0,0 +1,25 @@ +[ + { + "id": 183944666, + "name": "ITS", + "full_name": "zann1x\/ITS", + "owner": { + "login": "zann1x", + "id": 19776837, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19776837?v=4", + "html_url": "https:\/\/github.com\/zann1x" + }, + "html_url": "https:\/\/github.com\/zann1x\/ITS", + "description": "Repo for a uni project to give a detailed explanation of CVE-2018-1000224", + "fork": false, + "created_at": "2019-04-28T18:31:03Z", + "updated_at": "2019-11-02T15:04:46Z", + "pushed_at": "2019-06-21T13:14:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000802.json b/2018/CVE-2018-1000802.json new file mode 100644 index 0000000000..4f7b78445b --- /dev/null +++ b/2018/CVE-2018-1000802.json @@ -0,0 +1,25 @@ +[ + { + "id": 148814288, + "name": "CVE-2018-1000802-PoC", + "full_name": "tna0y\/CVE-2018-1000802-PoC", + "owner": { + "login": "tna0y", + "id": 22504374, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22504374?v=4", + "html_url": "https:\/\/github.com\/tna0y" + }, + "html_url": "https:\/\/github.com\/tna0y\/CVE-2018-1000802-PoC", + "description": "Python CVE-2018-1000802 Proof-of-Concept", + "fork": false, + "created_at": "2018-09-14T16:22:12Z", + "updated_at": "2020-05-29T07:36:51Z", + "pushed_at": "2018-09-14T16:38:29Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 0, + "forks": 0, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1000861.json b/2018/CVE-2018-1000861.json index 3e981e0464..145bdff01b 100644 --- a/2018/CVE-2018-1000861.json +++ b/2018/CVE-2018-1000861.json @@ -1,4 +1,27 @@ [ + { + "id": 183322760, + "name": "CVE-2019-1003000_RCE-DETECTION", + "full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION", + "owner": { + "login": "1NTheKut", + "id": 26243759, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26243759?v=4", + "html_url": "https:\/\/github.com\/1NTheKut" + }, + "html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION", + "description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)", + "fork": false, + "created_at": "2019-04-24T23:52:42Z", + "updated_at": "2020-09-25T09:24:39Z", + "pushed_at": "2019-05-01T07:11:28Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 1, + "forks": 1, + "watchers": 2, + "score": 0 + }, { "id": 291078833, "name": "CVE-2018-1000861", diff --git a/2018/CVE-2018-1002105.json b/2018/CVE-2018-1002105.json new file mode 100644 index 0000000000..751425dc0a --- /dev/null +++ b/2018/CVE-2018-1002105.json @@ -0,0 +1,117 @@ +[ + { + "id": 160451056, + "name": "cve-2018-1002105", + "full_name": "gravitational\/cve-2018-1002105", + "owner": { + "login": "gravitational", + "id": 10781132, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10781132?v=4", + "html_url": "https:\/\/github.com\/gravitational" + }, + "html_url": "https:\/\/github.com\/gravitational\/cve-2018-1002105", + "description": "Test utility for cve-2018-1002105", + "fork": false, + "created_at": "2018-12-05T02:51:43Z", + "updated_at": "2021-03-02T14:25:22Z", + "pushed_at": "2018-12-13T16:56:28Z", + "stargazers_count": 193, + "watchers_count": 193, + "forks_count": 25, + "forks": 25, + "watchers": 193, + "score": 0 + }, + { + "id": 160665138, + "name": "poc_CVE-2018-1002105", + "full_name": "evict\/poc_CVE-2018-1002105", + "owner": { + "login": "evict", + "id": 7238650, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7238650?v=4", + "html_url": "https:\/\/github.com\/evict" + }, + "html_url": "https:\/\/github.com\/evict\/poc_CVE-2018-1002105", + "description": "PoC for CVE-2018-1002105.", + "fork": false, + "created_at": "2018-12-06T11:28:02Z", + "updated_at": "2021-03-04T03:16:53Z", + "pushed_at": "2018-12-21T14:34:04Z", + "stargazers_count": 216, + "watchers_count": 216, + "forks_count": 39, + "forks": 39, + "watchers": 216, + "score": 0 + }, + { + "id": 161109755, + "name": "Kubernetes-1.12.3-all-auto-install", + "full_name": "imlzw\/Kubernetes-1.12.3-all-auto-install", + "owner": { + "login": "imlzw", + "id": 7478692, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7478692?v=4", + "html_url": "https:\/\/github.com\/imlzw" + }, + "html_url": "https:\/\/github.com\/imlzw\/Kubernetes-1.12.3-all-auto-install", + "description": "个人整理的Centos7.x + Kubernetes-1.12.3 + Dashboard-1.8.3 无 CVE-2018-1002105 漏洞的master节点全自动快速一键安装部署文件,适用于测试环境,生产环境的快速安装部署", + "fork": false, + "created_at": "2018-12-10T03:14:55Z", + "updated_at": "2021-01-24T18:36:35Z", + "pushed_at": "2019-02-26T08:49:22Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 3, + "forks": 3, + "watchers": 2, + "score": 0 + }, + { + "id": 184282942, + "name": "cve-2018-1002105", + "full_name": "bgeesaman\/cve-2018-1002105", + "owner": { + "login": "bgeesaman", + "id": 3769609, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3769609?v=4", + "html_url": "https:\/\/github.com\/bgeesaman" + }, + "html_url": "https:\/\/github.com\/bgeesaman\/cve-2018-1002105", + "description": "PoC command injection example for cve-2018-1002105 based off https:\/\/github.com\/gravitational\/cve-2018-1002105", + "fork": false, + "created_at": "2019-04-30T15:01:23Z", + "updated_at": "2019-04-30T15:14:04Z", + "pushed_at": "2019-04-30T15:14:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 209629712, + "name": "cve-2018-1002105", + "full_name": "mdnix\/cve-2018-1002105", + "owner": { + "login": "mdnix", + "id": 43579204, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43579204?v=4", + "html_url": "https:\/\/github.com\/mdnix" + }, + "html_url": "https:\/\/github.com\/mdnix\/cve-2018-1002105", + "description": null, + "fork": false, + "created_at": "2019-09-19T19:08:02Z", + "updated_at": "2020-07-17T07:40:59Z", + "pushed_at": "2019-09-23T15:50:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10118.json b/2018/CVE-2018-10118.json new file mode 100644 index 0000000000..4c383fd7a2 --- /dev/null +++ b/2018/CVE-2018-10118.json @@ -0,0 +1,25 @@ +[ + { + "id": 191191957, + "name": "CVE-2018-10118", + "full_name": "GeunSam2\/CVE-2018-10118", + "owner": { + "login": "GeunSam2", + "id": 41275199, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275199?v=4", + "html_url": "https:\/\/github.com\/GeunSam2" + }, + "html_url": "https:\/\/github.com\/GeunSam2\/CVE-2018-10118", + "description": "exploit tool of CVE-2018-10118", + "fork": false, + "created_at": "2019-06-10T15:13:25Z", + "updated_at": "2019-06-10T15:13:58Z", + "pushed_at": "2019-06-10T15:13:56Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10517.json b/2018/CVE-2018-10517.json new file mode 100644 index 0000000000..b0fa8639f7 --- /dev/null +++ b/2018/CVE-2018-10517.json @@ -0,0 +1,25 @@ +[ + { + "id": 156886365, + "name": "CVE-2018-10517", + "full_name": "0x00-0x00\/CVE-2018-10517", + "owner": { + "login": "0x00-0x00", + "id": 23364530, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", + "html_url": "https:\/\/github.com\/0x00-0x00" + }, + "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10517", + "description": "CMS Made Simple 2.2.7 RCE exploit", + "fork": false, + "created_at": "2018-11-09T16:09:39Z", + "updated_at": "2020-06-07T11:21:05Z", + "pushed_at": "2018-11-09T16:09:46Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 4, + "forks": 4, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10920.json b/2018/CVE-2018-10920.json new file mode 100644 index 0000000000..89a253da63 --- /dev/null +++ b/2018/CVE-2018-10920.json @@ -0,0 +1,25 @@ +[ + { + "id": 167577440, + "name": "CVE-2018-10920_PoC", + "full_name": "shutingrz\/CVE-2018-10920_PoC", + "owner": { + "login": "shutingrz", + "id": 2587857, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2587857?v=4", + "html_url": "https:\/\/github.com\/shutingrz" + }, + "html_url": "https:\/\/github.com\/shutingrz\/CVE-2018-10920_PoC", + "description": "Knot Resolver CVE-2018-10920 \/ DO NOT ABUSE", + "fork": false, + "created_at": "2019-01-25T16:24:49Z", + "updated_at": "2019-01-25T16:26:11Z", + "pushed_at": "2019-01-25T16:26:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 68bd3f2880..5fed7529a6 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -1,4 +1,27 @@ [ + { + "id": 153427159, + "name": "CVE-2018-10933", + "full_name": "SoledaD208\/CVE-2018-10933", + "owner": { + "login": "SoledaD208", + "id": 8731578, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8731578?v=4", + "html_url": "https:\/\/github.com\/SoledaD208" + }, + "html_url": "https:\/\/github.com\/SoledaD208\/CVE-2018-10933", + "description": "CVE-2018-10933 very simple POC", + "fork": false, + "created_at": "2018-10-17T09:01:44Z", + "updated_at": "2020-12-18T03:51:25Z", + "pushed_at": "2018-10-23T13:51:06Z", + "stargazers_count": 131, + "watchers_count": 131, + "forks_count": 40, + "forks": 40, + "watchers": 131, + "score": 0 + }, { "id": 153468806, "name": "CVE-2018-10933", @@ -22,6 +45,581 @@ "watchers": 467, "score": 0 }, + { + "id": 153477523, + "name": "CVE-2018-10933", + "full_name": "hook-s3c\/CVE-2018-10933", + "owner": { + "login": "hook-s3c", + "id": 31825993, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4", + "html_url": "https:\/\/github.com\/hook-s3c" + }, + "html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933", + "description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit", + "fork": false, + "created_at": "2018-10-17T15:09:41Z", + "updated_at": "2018-10-17T15:09:44Z", + "pushed_at": "2018-10-17T15:09:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 1, + "forks": 1, + "watchers": 0, + "score": 0 + }, + { + "id": 153506738, + "name": "CVE-2018-10933", + "full_name": "kn6869610\/CVE-2018-10933", + "owner": { + "login": "kn6869610", + "id": 6917744, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4", + "html_url": "https:\/\/github.com\/kn6869610" + }, + "html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933", + "description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.", + "fork": false, + "created_at": "2018-10-17T18:44:05Z", + "updated_at": "2018-10-22T03:02:27Z", + "pushed_at": "2018-10-17T18:45:30Z", + "stargazers_count": 13, + "watchers_count": 13, + "forks_count": 3, + "forks": 3, + "watchers": 13, + "score": 0 + }, + { + "id": 153534574, + "name": "libssh-scanner", + "full_name": "leapsecurity\/libssh-scanner", + "owner": { + "login": "leapsecurity", + "id": 40601062, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40601062?v=4", + "html_url": "https:\/\/github.com\/leapsecurity" + }, + "html_url": "https:\/\/github.com\/leapsecurity\/libssh-scanner", + "description": "Script to identify hosts vulnerable to CVE-2018-10933", + "fork": false, + "created_at": "2018-10-17T23:05:10Z", + "updated_at": "2021-03-17T03:38:40Z", + "pushed_at": "2018-11-04T17:29:33Z", + "stargazers_count": 231, + "watchers_count": 231, + "forks_count": 55, + "forks": 55, + "watchers": 231, + "score": 0 + }, + { + "id": 153562229, + "name": "CVE-2018-10933_ssh", + "full_name": "likescam\/CVE-2018-10933_ssh", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh", + "description": null, + "fork": false, + "created_at": "2018-10-18T04:10:25Z", + "updated_at": "2018-10-18T04:10:39Z", + "pushed_at": "2018-10-18T04:10:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 153562319, + "name": "bpnd-libssh", + "full_name": "trbpnd\/bpnd-libssh", + "owner": { + "login": "trbpnd", + "id": 39193403, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4", + "html_url": "https:\/\/github.com\/trbpnd" + }, + "html_url": "https:\/\/github.com\/trbpnd\/bpnd-libssh", + "description": "Multi-threaded, reliable scanner for CVE-2018-10933.", + "fork": false, + "created_at": "2018-10-18T04:11:33Z", + "updated_at": "2018-10-23T03:13:35Z", + "pushed_at": "2018-10-22T16:44:13Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 2, + "forks": 2, + "watchers": 5, + "score": 0 + }, + { + "id": 153598283, + "name": "CVE-2018-10933-libSSH-Authentication-Bypass", + "full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass", + "owner": { + "login": "likescam", + "id": 2469038, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", + "html_url": "https:\/\/github.com\/likescam" + }, + "html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass", + "description": null, + "fork": false, + "created_at": "2018-10-18T09:27:08Z", + "updated_at": "2018-10-18T16:47:53Z", + "pushed_at": "2018-10-18T09:27:22Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 153643745, + "name": "hunt-for-cve-2018-10933", + "full_name": "marco-lancini\/hunt-for-cve-2018-10933", + "owner": { + "login": "marco-lancini", + "id": 1472968, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4", + "html_url": "https:\/\/github.com\/marco-lancini" + }, + "html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933", + "description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)", + "fork": false, + "created_at": "2018-10-18T15:08:25Z", + "updated_at": "2020-10-25T16:36:25Z", + "pushed_at": "2018-10-18T15:11:35Z", + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 4, + "forks": 4, + "watchers": 10, + "score": 0 + }, + { + "id": 153675108, + "name": "cve-2018-10933", + "full_name": "hackerhouse-opensource\/cve-2018-10933", + "owner": { + "login": "hackerhouse-opensource", + "id": 43967630, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4", + "html_url": "https:\/\/github.com\/hackerhouse-opensource" + }, + "html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2018-10933", + "description": "cve-2018-10933 libssh authentication bypass", + "fork": false, + "created_at": "2018-10-18T19:13:45Z", + "updated_at": "2021-02-21T08:07:54Z", + "pushed_at": "2018-10-21T21:24:29Z", + "stargazers_count": 97, + "watchers_count": 97, + "forks_count": 31, + "forks": 31, + "watchers": 97, + "score": 0 + }, + { + "id": 153681539, + "name": "cve-2018-10933", + "full_name": "cve-2018\/cve-2018-10933", + "owner": { + "login": "cve-2018", + "id": 44275695, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44275695?v=4", + "html_url": "https:\/\/github.com\/cve-2018" + }, + "html_url": "https:\/\/github.com\/cve-2018\/cve-2018-10933", + "description": null, + "fork": false, + "created_at": "2018-10-18T20:11:22Z", + "updated_at": "2018-10-23T03:22:26Z", + "pushed_at": "2018-10-23T03:22:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 153855090, + "name": "CVE-2018-10933", + "full_name": "jas502n\/CVE-2018-10933", + "owner": { + "login": "jas502n", + "id": 16593068, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", + "html_url": "https:\/\/github.com\/jas502n" + }, + "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933", + "description": "libssh CVE-2018-10933", + "fork": false, + "created_at": "2018-10-20T00:24:04Z", + "updated_at": "2019-07-31T09:33:04Z", + "pushed_at": "2018-10-20T00:29:04Z", + "stargazers_count": 19, + "watchers_count": 19, + "forks_count": 5, + "forks": 5, + "watchers": 19, + "score": 0 + }, + { + "id": 153856713, + "name": "cve-2018-10933_poc", + "full_name": "ninp0\/cve-2018-10933_poc", + "owner": { + "login": "ninp0", + "id": 1008583, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4", + "html_url": "https:\/\/github.com\/ninp0" + }, + "html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc", + "description": "Variant of hackerhouse-opensource\/cve-2018-10933", + "fork": false, + "created_at": "2018-10-20T00:53:24Z", + "updated_at": "2018-10-22T15:05:53Z", + "pushed_at": "2018-10-20T01:53:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 153878160, + "name": "CVE-2018-10933_Scanner", + "full_name": "pghook\/CVE-2018-10933_Scanner", + "owner": { + "login": "pghook", + "id": 14160529, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4", + "html_url": "https:\/\/github.com\/pghook" + }, + "html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner", + "description": null, + "fork": false, + "created_at": "2018-10-20T06:53:59Z", + "updated_at": "2020-05-15T17:20:56Z", + "pushed_at": "2018-10-20T04:54:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 3, + "forks": 3, + "watchers": 0, + "score": 0 + }, + { + "id": 153920395, + "name": "POC-CVE-2018-10933", + "full_name": "Virgula0\/POC-CVE-2018-10933", + "owner": { + "login": "Virgula0", + "id": 16546435, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16546435?v=4", + "html_url": "https:\/\/github.com\/Virgula0" + }, + "html_url": "https:\/\/github.com\/Virgula0\/POC-CVE-2018-10933", + "description": "LibSSH Authentication Bypass Exploit using RCE", + "fork": false, + "created_at": "2018-10-20T15:34:26Z", + "updated_at": "2021-03-03T11:40:37Z", + "pushed_at": "2018-10-25T18:23:52Z", + "stargazers_count": 12, + "watchers_count": 12, + "forks_count": 8, + "forks": 8, + "watchers": 12, + "score": 0 + }, + { + "id": 153975086, + "name": "pythonprojects-CVE-2018-10933", + "full_name": "shifa123\/pythonprojects-CVE-2018-10933", + "owner": { + "login": "shifa123", + "id": 18241082, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4", + "html_url": "https:\/\/github.com\/shifa123" + }, + "html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933", + "description": "CVE-2018-10933", + "fork": false, + "created_at": "2018-10-21T05:01:12Z", + "updated_at": "2021-01-15T03:06:17Z", + "pushed_at": "2018-10-21T05:13:13Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 4, + "forks": 4, + "watchers": 2, + "score": 0 + }, + { + "id": 154050332, + "name": "CVE-2018-10933", + "full_name": "xFreed0m\/CVE-2018-10933", + "owner": { + "login": "xFreed0m", + "id": 13978578, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13978578?v=4", + "html_url": "https:\/\/github.com\/xFreed0m" + }, + "html_url": "https:\/\/github.com\/xFreed0m\/CVE-2018-10933", + "description": "a python script to exploit libssh authentication vulnerability", + "fork": false, + "created_at": "2018-10-21T20:41:40Z", + "updated_at": "2020-07-09T18:52:44Z", + "pushed_at": "2019-12-05T13:34:11Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 3, + "forks": 3, + "watchers": 4, + "score": 0 + }, + { + "id": 154390432, + "name": "CVE-2018-10933", + "full_name": "Bifrozt\/CVE-2018-10933", + "owner": { + "login": "Bifrozt", + "id": 8437560, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8437560?v=4", + "html_url": "https:\/\/github.com\/Bifrozt" + }, + "html_url": "https:\/\/github.com\/Bifrozt\/CVE-2018-10933", + "description": "CVE-2018-10933", + "fork": false, + "created_at": "2018-10-23T20:11:35Z", + "updated_at": "2018-10-23T20:14:53Z", + "pushed_at": "2018-10-23T20:14:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 154398082, + "name": "CVE-2018-10933", + "full_name": "r3dxpl0it\/CVE-2018-10933", + "owner": { + "login": "r3dxpl0it", + "id": 43002597, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43002597?v=4", + "html_url": "https:\/\/github.com\/r3dxpl0it" + }, + "html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-10933", + "description": "CVE-2018-10933 POC (LIBSSH)", + "fork": false, + "created_at": "2018-10-23T21:17:52Z", + "updated_at": "2021-03-03T11:40:35Z", + "pushed_at": "2018-10-24T07:58:27Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 3, + "forks": 3, + "watchers": 2, + "score": 0 + }, + { + "id": 154500673, + "name": "libssh-scanner", + "full_name": "ivanacostarubio\/libssh-scanner", + "owner": { + "login": "ivanacostarubio", + "id": 16559, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16559?v=4", + "html_url": "https:\/\/github.com\/ivanacostarubio" + }, + "html_url": "https:\/\/github.com\/ivanacostarubio\/libssh-scanner", + "description": "A libssh CVE-2018-10933 scanner written in rust", + "fork": false, + "created_at": "2018-10-24T12:52:09Z", + "updated_at": "2019-02-24T23:51:07Z", + "pushed_at": "2018-10-24T12:52:31Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 1, + "forks": 1, + "watchers": 1, + "score": 0 + }, + { + "id": 154520949, + "name": "precompiled-CVE-2018-10933", + "full_name": "throwawayaccount12312312\/precompiled-CVE-2018-10933", + "owner": { + "login": "throwawayaccount12312312", + "id": 44440605, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44440605?v=4", + "html_url": "https:\/\/github.com\/throwawayaccount12312312" + }, + "html_url": "https:\/\/github.com\/throwawayaccount12312312\/precompiled-CVE-2018-10933", + "description": null, + "fork": false, + "created_at": "2018-10-24T15:02:51Z", + "updated_at": "2018-10-24T15:04:19Z", + "pushed_at": "2018-10-24T15:04:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 154621353, + "name": "CVE-2018-10933", + "full_name": "ensimag-security\/CVE-2018-10933", + "owner": { + "login": "ensimag-security", + "id": 44459067, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44459067?v=4", + "html_url": "https:\/\/github.com\/ensimag-security" + }, + "html_url": "https:\/\/github.com\/ensimag-security\/CVE-2018-10933", + "description": null, + "fork": false, + "created_at": "2018-10-25T06:32:06Z", + "updated_at": "2018-11-28T14:11:24Z", + "pushed_at": "2018-11-28T14:14:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 157908147, + "name": "libSSH-bypass", + "full_name": "Ad1bDaw\/libSSH-bypass", + "owner": { + "login": "Ad1bDaw", + "id": 35436703, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35436703?v=4", + "html_url": "https:\/\/github.com\/Ad1bDaw" + }, + "html_url": "https:\/\/github.com\/Ad1bDaw\/libSSH-bypass", + "description": "Implementation of CVE-2018-10933 with CIDR block scanner ", + "fork": false, + "created_at": "2018-11-16T18:46:28Z", + "updated_at": "2018-11-16T19:00:29Z", + "pushed_at": "2018-11-16T19:00:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 158524069, + "name": "CVE-2018-10933-POC", + "full_name": "sambiyal\/CVE-2018-10933-POC", + "owner": { + "login": "sambiyal", + "id": 25122043, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25122043?v=4", + "html_url": "https:\/\/github.com\/sambiyal" + }, + "html_url": "https:\/\/github.com\/sambiyal\/CVE-2018-10933-POC", + "description": "libSSH bypass", + "fork": false, + "created_at": "2018-11-21T09:34:12Z", + "updated_at": "2018-11-21T09:57:11Z", + "pushed_at": "2018-11-21T09:43:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 162456991, + "name": "LibSSH-Authentication-Bypass", + "full_name": "nikhil1232\/LibSSH-Authentication-Bypass", + "owner": { + "login": "nikhil1232", + "id": 39535219, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39535219?v=4", + "html_url": "https:\/\/github.com\/nikhil1232" + }, + "html_url": "https:\/\/github.com\/nikhil1232\/LibSSH-Authentication-Bypass", + "description": "LibSSH Authentication Bypass CVE-2018-10933", + "fork": false, + "created_at": "2018-12-19T15:33:00Z", + "updated_at": "2020-01-09T05:02:59Z", + "pushed_at": "2018-12-19T15:46:37Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 1, + "forks": 1, + "watchers": 5, + "score": 0 + }, + { + "id": 169983604, + "name": "LibSSH-exploit", + "full_name": "Kurlee\/LibSSH-exploit", + "owner": { + "login": "Kurlee", + "id": 44727604, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44727604?v=4", + "html_url": "https:\/\/github.com\/Kurlee" + }, + "html_url": "https:\/\/github.com\/Kurlee\/LibSSH-exploit", + "description": "Takes advantage of CVE-2018-10933", + "fork": false, + "created_at": "2019-02-10T13:55:06Z", + "updated_at": "2019-02-10T14:02:29Z", + "pushed_at": "2019-02-10T14:02:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 223548534, + "name": "Libssh-server-CVE-2018-10933", + "full_name": "crispy-peppers\/Libssh-server-CVE-2018-10933", + "owner": { + "login": "crispy-peppers", + "id": 23626307, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23626307?v=4", + "html_url": "https:\/\/github.com\/crispy-peppers" + }, + "html_url": "https:\/\/github.com\/crispy-peppers\/Libssh-server-CVE-2018-10933", + "description": null, + "fork": false, + "created_at": "2019-11-23T07:22:25Z", + "updated_at": "2019-11-23T07:23:28Z", + "pushed_at": "2019-11-23T07:23:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 246461801, "name": "CVE-2018-10933", diff --git a/2018/CVE-2018-10936.json b/2018/CVE-2018-10936.json new file mode 100644 index 0000000000..6c6a463ae4 --- /dev/null +++ b/2018/CVE-2018-10936.json @@ -0,0 +1,25 @@ +[ + { + "id": 158224861, + "name": "CVE-2018-10936", + "full_name": "tafamace\/CVE-2018-10936", + "owner": { + "login": "tafamace", + "id": 45160113, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45160113?v=4", + "html_url": "https:\/\/github.com\/tafamace" + }, + "html_url": "https:\/\/github.com\/tafamace\/CVE-2018-10936", + "description": null, + "fork": false, + "created_at": "2018-11-19T13:09:47Z", + "updated_at": "2018-11-19T13:13:10Z", + "pushed_at": "2018-11-19T13:13:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-10949.json b/2018/CVE-2018-10949.json new file mode 100644 index 0000000000..8947766396 --- /dev/null +++ b/2018/CVE-2018-10949.json @@ -0,0 +1,25 @@ +[ + { + "id": 147528239, + "name": "CVE-2018-10949", + "full_name": "0x00-0x00\/CVE-2018-10949", + "owner": { + "login": "0x00-0x00", + "id": 23364530, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", + "html_url": "https:\/\/github.com\/0x00-0x00" + }, + "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10949", + "description": "Zimbra Collaboration Suite Username Enumeration ", + "fork": false, + "created_at": "2018-09-05T14:09:13Z", + "updated_at": "2020-10-20T18:45:33Z", + "pushed_at": "2018-09-05T14:10:09Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 3, + "forks": 3, + "watchers": 2, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json index 985a5242f9..27eba06dc5 100644 --- a/2018/CVE-2018-11235.json +++ b/2018/CVE-2018-11235.json @@ -137,6 +137,167 @@ "watchers": 1, "score": 0 }, + { + "id": 143149359, + "name": "CVE-2018-11235", + "full_name": "knqyf263\/CVE-2018-11235", + "owner": { + "login": "knqyf263", + "id": 2253692, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", + "html_url": "https:\/\/github.com\/knqyf263" + }, + "html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11235", + "description": "CVE-2018-11235 (Git)", + "fork": false, + "created_at": "2018-08-01T11:52:54Z", + "updated_at": "2019-04-24T05:32:20Z", + "pushed_at": "2018-11-23T14:34:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 160238249, + "name": "CVE-2018-11235", + "full_name": "ygouzerh\/CVE-2018-11235", + "owner": { + "login": "ygouzerh", + "id": 33725211, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33725211?v=4", + "html_url": "https:\/\/github.com\/ygouzerh" + }, + "html_url": "https:\/\/github.com\/ygouzerh\/CVE-2018-11235", + "description": "Proof of Concept - RCE Exploitation : Git submodules' names vulnerability - Ensimag November 2018", + "fork": false, + "created_at": "2018-12-03T18:50:27Z", + "updated_at": "2019-05-14T02:06:19Z", + "pushed_at": "2019-05-14T02:06:18Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 180293963, + "name": "CVE-2018-11235-Git-Submodule-CE", + "full_name": "qweraqq\/CVE-2018-11235-Git-Submodule-CE", + "owner": { + "login": "qweraqq", + "id": 5697699, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5697699?v=4", + "html_url": "https:\/\/github.com\/qweraqq" + }, + "html_url": "https:\/\/github.com\/qweraqq\/CVE-2018-11235-Git-Submodule-CE", + "description": "CVE-2018-11235-Git PoC", + "fork": false, + "created_at": "2019-04-09T05:48:22Z", + "updated_at": "2020-12-13T18:51:12Z", + "pushed_at": "2019-04-09T09:23:03Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 189964702, + "name": "CVE-2018-11235", + "full_name": "jhswartz\/CVE-2018-11235", + "owner": { + "login": "jhswartz", + "id": 51316199, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51316199?v=4", + "html_url": "https:\/\/github.com\/jhswartz" + }, + "html_url": "https:\/\/github.com\/jhswartz\/CVE-2018-11235", + "description": "git {<2.13.7, <2.14.4, <2.15.2, <2.16.4, <2.17.1} remote code execution", + "fork": false, + "created_at": "2019-06-03T08:24:16Z", + "updated_at": "2019-06-22T09:47:38Z", + "pushed_at": "2019-06-03T08:24:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 193244232, + "name": "CVE-2018-11235", + "full_name": "AnonymKing\/CVE-2018-11235", + "owner": { + "login": "AnonymKing", + "id": 26847177, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26847177?v=4", + "html_url": "https:\/\/github.com\/AnonymKing" + }, + "html_url": "https:\/\/github.com\/AnonymKing\/CVE-2018-11235", + "description": "CVE-2018-11235(PoC && Exp)", + "fork": false, + "created_at": "2019-06-22T14:39:08Z", + "updated_at": "2019-06-24T09:04:10Z", + "pushed_at": "2019-06-22T14:42:08Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 195966434, + "name": "CVE-2018-11235", + "full_name": "morhax\/CVE-2018-11235", + "owner": { + "login": "morhax", + "id": 12779060, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4", + "html_url": "https:\/\/github.com\/morhax" + }, + "html_url": "https:\/\/github.com\/morhax\/CVE-2018-11235", + "description": null, + "fork": false, + "created_at": "2019-07-09T08:28:49Z", + "updated_at": "2019-07-09T08:28:49Z", + "pushed_at": "2019-07-09T08:28:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 218206529, + "name": "CVE-2018-11235-test", + "full_name": "cchang27\/CVE-2018-11235-test", + "owner": { + "login": "cchang27", + "id": 54129952, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54129952?v=4", + "html_url": "https:\/\/github.com\/cchang27" + }, + "html_url": "https:\/\/github.com\/cchang27\/CVE-2018-11235-test", + "description": null, + "fork": false, + "created_at": "2019-10-29T04:49:45Z", + "updated_at": "2019-10-29T04:49:45Z", + "pushed_at": "2019-10-29T04:49:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 245079097, "name": "CVE-2018-11235", diff --git a/2018/CVE-2018-1133.json b/2018/CVE-2018-1133.json new file mode 100644 index 0000000000..4fe3794253 --- /dev/null +++ b/2018/CVE-2018-1133.json @@ -0,0 +1,48 @@ +[ + { + "id": 175834951, + "name": "MoodleExploit", + "full_name": "darrynten\/MoodleExploit", + "owner": { + "login": "darrynten", + "id": 3657251, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3657251?v=4", + "html_url": "https:\/\/github.com\/darrynten" + }, + "html_url": "https:\/\/github.com\/darrynten\/MoodleExploit", + "description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133", + "fork": false, + "created_at": "2019-03-15T14:25:20Z", + "updated_at": "2021-02-20T18:14:31Z", + "pushed_at": "2019-03-15T14:48:18Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 3, + "forks": 3, + "watchers": 4, + "score": 0 + }, + { + "id": 324510428, + "name": "MOODLE-3.X-Remote-Code-Execution", + "full_name": "Feidao-fei\/MOODLE-3.X-Remote-Code-Execution", + "owner": { + "login": "Feidao-fei", + "id": 52765767, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52765767?v=4", + "html_url": "https:\/\/github.com\/Feidao-fei" + }, + "html_url": "https:\/\/github.com\/Feidao-fei\/MOODLE-3.X-Remote-Code-Execution", + "description": "cve-2018-1133 moodle athenticated as teacher remote code execution. ", + "fork": false, + "created_at": "2020-12-26T08:09:19Z", + "updated_at": "2021-01-22T18:16:32Z", + "pushed_at": "2019-03-16T15:19:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11564.json b/2018/CVE-2018-11564.json new file mode 100644 index 0000000000..ec7e9c5552 --- /dev/null +++ b/2018/CVE-2018-11564.json @@ -0,0 +1,25 @@ +[ + { + "id": 191192237, + "name": "CVE-2018-11564", + "full_name": "GeunSam2\/CVE-2018-11564", + "owner": { + "login": "GeunSam2", + "id": 41275199, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41275199?v=4", + "html_url": "https:\/\/github.com\/GeunSam2" + }, + "html_url": "https:\/\/github.com\/GeunSam2\/CVE-2018-11564", + "description": "exploit tool of CVE-2018-11564", + "fork": false, + "created_at": "2019-06-10T15:15:07Z", + "updated_at": "2019-06-10T15:15:33Z", + "pushed_at": "2019-06-10T15:15:22Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11686.json b/2018/CVE-2018-11686.json new file mode 100644 index 0000000000..7a758f0e95 --- /dev/null +++ b/2018/CVE-2018-11686.json @@ -0,0 +1,25 @@ +[ + { + "id": 176804317, + "name": "CVE-2018-11686", + "full_name": "mpgn\/CVE-2018-11686", + "owner": { + "login": "mpgn", + "id": 5891788, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", + "html_url": "https:\/\/github.com\/mpgn" + }, + "html_url": "https:\/\/github.com\/mpgn\/CVE-2018-11686", + "description": "CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6", + "fork": false, + "created_at": "2019-03-20T19:36:10Z", + "updated_at": "2020-05-27T12:15:17Z", + "pushed_at": "2019-03-20T20:56:02Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 2, + "forks": 2, + "watchers": 7, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11759.json b/2018/CVE-2018-11759.json new file mode 100644 index 0000000000..45a1c0eeac --- /dev/null +++ b/2018/CVE-2018-11759.json @@ -0,0 +1,48 @@ +[ + { + "id": 155689679, + "name": "CVE-2018-11759", + "full_name": "immunIT\/CVE-2018-11759", + "owner": { + "login": "immunIT", + "id": 17569882, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17569882?v=4", + "html_url": "https:\/\/github.com\/immunIT" + }, + "html_url": "https:\/\/github.com\/immunIT\/CVE-2018-11759", + "description": "Proof of concept showing how to exploit the CVE-2018-11759", + "fork": false, + "created_at": "2018-11-01T09:11:07Z", + "updated_at": "2020-07-13T15:43:59Z", + "pushed_at": "2018-12-11T12:59:26Z", + "stargazers_count": 35, + "watchers_count": 35, + "forks_count": 14, + "forks": 14, + "watchers": 35, + "score": 0 + }, + { + "id": 160896534, + "name": "Identificador-CVE-2018-11759", + "full_name": "Jul10l1r4\/Identificador-CVE-2018-11759", + "owner": { + "login": "Jul10l1r4", + "id": 32502168, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32502168?v=4", + "html_url": "https:\/\/github.com\/Jul10l1r4" + }, + "html_url": "https:\/\/github.com\/Jul10l1r4\/Identificador-CVE-2018-11759", + "description": "This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer", + "fork": false, + "created_at": "2018-12-08T02:32:14Z", + "updated_at": "2020-07-27T00:22:55Z", + "pushed_at": "2019-01-21T20:03:22Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 2, + "forks": 2, + "watchers": 4, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11761.json b/2018/CVE-2018-11761.json new file mode 100644 index 0000000000..fdf3c644aa --- /dev/null +++ b/2018/CVE-2018-11761.json @@ -0,0 +1,25 @@ +[ + { + "id": 167112093, + "name": "CVE-2018-11761", + "full_name": "brianwrf\/CVE-2018-11761", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf" + }, + "html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11761", + "description": "Apache Tika Denial of Service Vulnerability (CVE-2018-11761)", + "fork": false, + "created_at": "2019-01-23T03:40:26Z", + "updated_at": "2020-03-29T03:51:16Z", + "pushed_at": "2019-01-23T03:44:46Z", + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 0, + "forks": 0, + "watchers": 8, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11770.json b/2018/CVE-2018-11770.json new file mode 100644 index 0000000000..1a1a608774 --- /dev/null +++ b/2018/CVE-2018-11770.json @@ -0,0 +1,25 @@ +[ + { + "id": 213971110, + "name": "CVE-2018-11770", + "full_name": "ivanitlearning\/CVE-2018-11770", + "owner": { + "login": "ivanitlearning", + "id": 52420671, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52420671?v=4", + "html_url": "https:\/\/github.com\/ivanitlearning" + }, + "html_url": "https:\/\/github.com\/ivanitlearning\/CVE-2018-11770", + "description": "Python RCE exploit for Apache Spark rewritten from Metasploit module", + "fork": false, + "created_at": "2019-10-09T16:41:39Z", + "updated_at": "2019-10-15T16:01:59Z", + "pushed_at": "2019-10-15T16:01:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11776.json b/2018/CVE-2018-11776.json index ea0d5ae92b..f343db4bb2 100644 --- a/2018/CVE-2018-11776.json +++ b/2018/CVE-2018-11776.json @@ -1,4 +1,303 @@ [ + { + "id": 145897861, + "name": "CVE-2018-11776", + "full_name": "trbpnd\/CVE-2018-11776", + "owner": { + "login": "trbpnd", + "id": 39193403, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39193403?v=4", + "html_url": "https:\/\/github.com\/trbpnd" + }, + "html_url": "https:\/\/github.com\/trbpnd\/CVE-2018-11776", + "description": "Docker image for a vulnerable struts app", + "fork": false, + "created_at": "2018-08-23T19:25:26Z", + "updated_at": "2018-08-23T19:28:53Z", + "pushed_at": "2018-08-23T19:28:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 145901668, + "name": "CVE-2018-11776", + "full_name": "xfox64x\/CVE-2018-11776", + "owner": { + "login": "xfox64x", + "id": 11416821, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11416821?v=4", + "html_url": "https:\/\/github.com\/xfox64x" + }, + "html_url": "https:\/\/github.com\/xfox64x\/CVE-2018-11776", + "description": "Creating a vulnerable environment and the PoC ", + "fork": false, + "created_at": "2018-08-23T20:06:17Z", + "updated_at": "2020-05-11T21:00:33Z", + "pushed_at": "2019-11-25T21:21:55Z", + "stargazers_count": 14, + "watchers_count": 14, + "forks_count": 7, + "forks": 7, + "watchers": 14, + "score": 0 + }, + { + "id": 145935231, + "name": "CVE-2018-11776", + "full_name": "jiguangin\/CVE-2018-11776", + "owner": { + "login": "jiguangin", + "id": 22545712, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22545712?v=4", + "html_url": "https:\/\/github.com\/jiguangin" + }, + "html_url": "https:\/\/github.com\/jiguangin\/CVE-2018-11776", + "description": "CVE-2018-11776(S2-057) EXPLOIT CODE", + "fork": false, + "created_at": "2018-08-24T03:01:29Z", + "updated_at": "2020-12-29T15:23:34Z", + "pushed_at": "2018-08-24T03:27:02Z", + "stargazers_count": 10, + "watchers_count": 10, + "forks_count": 5, + "forks": 5, + "watchers": 10, + "score": 0 + }, + { + "id": 145985371, + "name": "CVE-2018-11776-Python-PoC", + "full_name": "hook-s3c\/CVE-2018-11776-Python-PoC", + "owner": { + "login": "hook-s3c", + "id": 31825993, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4", + "html_url": "https:\/\/github.com\/hook-s3c" + }, + "html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-11776-Python-PoC", + "description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab", + "fork": false, + "created_at": "2018-08-24T11:53:02Z", + "updated_at": "2021-03-01T18:21:49Z", + "pushed_at": "2018-08-25T02:14:49Z", + "stargazers_count": 118, + "watchers_count": 118, + "forks_count": 48, + "forks": 48, + "watchers": 118, + "score": 0 + }, + { + "id": 146056002, + "name": "struts-pwn_CVE-2018-11776", + "full_name": "mazen160\/struts-pwn_CVE-2018-11776", + "owner": { + "login": "mazen160", + "id": 8996052, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4", + "html_url": "https:\/\/github.com\/mazen160" + }, + "html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2018-11776", + "description": " An exploit for Apache Struts CVE-2018-11776", + "fork": false, + "created_at": "2018-08-25T01:53:30Z", + "updated_at": "2021-02-16T04:17:55Z", + "pushed_at": "2018-08-26T02:31:39Z", + "stargazers_count": 300, + "watchers_count": 300, + "forks_count": 102, + "forks": 102, + "watchers": 300, + "score": 0 + }, + { + "id": 146060181, + "name": "CVE-2018-11776", + "full_name": "bhdresh\/CVE-2018-11776", + "owner": { + "login": "bhdresh", + "id": 8931885, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4", + "html_url": "https:\/\/github.com\/bhdresh" + }, + "html_url": "https:\/\/github.com\/bhdresh\/CVE-2018-11776", + "description": "Vulnerable docker container for CVE-2018-11776", + "fork": false, + "created_at": "2018-08-25T03:06:30Z", + "updated_at": "2020-01-06T22:41:00Z", + "pushed_at": "2018-08-25T04:53:35Z", + "stargazers_count": 8, + "watchers_count": 8, + "forks_count": 5, + "forks": 5, + "watchers": 8, + "score": 0 + }, + { + "id": 146094544, + "name": "CVE-2018-11776", + "full_name": "knqyf263\/CVE-2018-11776", + "owner": { + "login": "knqyf263", + "id": 2253692, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", + "html_url": "https:\/\/github.com\/knqyf263" + }, + "html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11776", + "description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)", + "fork": false, + "created_at": "2018-08-25T12:45:15Z", + "updated_at": "2021-01-19T03:50:38Z", + "pushed_at": "2018-08-25T14:20:46Z", + "stargazers_count": 4, + "watchers_count": 4, + "forks_count": 2, + "forks": 2, + "watchers": 4, + "score": 0 + }, + { + "id": 146330536, + "name": "Strutter", + "full_name": "Ekultek\/Strutter", + "owner": { + "login": "Ekultek", + "id": 14183473, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14183473?v=4", + "html_url": "https:\/\/github.com\/Ekultek" + }, + "html_url": "https:\/\/github.com\/Ekultek\/Strutter", + "description": "Proof of Concept for CVE-2018-11776", + "fork": false, + "created_at": "2018-08-27T17:22:16Z", + "updated_at": "2020-12-12T20:05:33Z", + "pushed_at": "2018-09-12T14:28:35Z", + "stargazers_count": 20, + "watchers_count": 20, + "forks_count": 3, + "forks": 3, + "watchers": 20, + "score": 0 + }, + { + "id": 146373342, + "name": "cve-2018-11776-docker", + "full_name": "tuxotron\/cve-2018-11776-docker", + "owner": { + "login": "tuxotron", + "id": 937637, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/937637?v=4", + "html_url": "https:\/\/github.com\/tuxotron" + }, + "html_url": "https:\/\/github.com\/tuxotron\/cve-2018-11776-docker", + "description": null, + "fork": false, + "created_at": "2018-08-28T01:14:52Z", + "updated_at": "2019-09-24T14:38:18Z", + "pushed_at": "2018-08-29T17:58:27Z", + "stargazers_count": 3, + "watchers_count": 3, + "forks_count": 0, + "forks": 0, + "watchers": 3, + "score": 0 + }, + { + "id": 146519519, + "name": "S2-057-CVE-2018-11776", + "full_name": "brianwrf\/S2-057-CVE-2018-11776", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf" + }, + "html_url": "https:\/\/github.com\/brianwrf\/S2-057-CVE-2018-11776", + "description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)", + "fork": false, + "created_at": "2018-08-28T23:48:14Z", + "updated_at": "2018-12-23T03:47:07Z", + "pushed_at": "2018-08-29T00:03:56Z", + "stargazers_count": 15, + "watchers_count": 15, + "forks_count": 4, + "forks": 4, + "watchers": 15, + "score": 0 + }, + { + "id": 146650579, + "name": "Apache-Struts-Shodan-Exploit", + "full_name": "649\/Apache-Struts-Shodan-Exploit", + "owner": { + "login": "649", + "id": 23534047, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23534047?v=4", + "html_url": "https:\/\/github.com\/649" + }, + "html_url": "https:\/\/github.com\/649\/Apache-Struts-Shodan-Exploit", + "description": "This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.", + "fork": false, + "created_at": "2018-08-29T19:50:26Z", + "updated_at": "2021-03-04T19:02:01Z", + "pushed_at": "2018-08-30T00:16:01Z", + "stargazers_count": 52, + "watchers_count": 52, + "forks_count": 16, + "forks": 16, + "watchers": 52, + "score": 0 + }, + { + "id": 147746262, + "name": "CVE-2018-11776-Python-PoC", + "full_name": "jezzus\/CVE-2018-11776-Python-PoC", + "owner": { + "login": "jezzus", + "id": 9899999, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9899999?v=4", + "html_url": "https:\/\/github.com\/jezzus" + }, + "html_url": "https:\/\/github.com\/jezzus\/CVE-2018-11776-Python-PoC", + "description": null, + "fork": false, + "created_at": "2018-09-06T23:49:20Z", + "updated_at": "2018-09-06T23:49:20Z", + "pushed_at": "2018-09-06T23:49:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 164352202, + "name": "cve-2018-11776", + "full_name": "cved-sources\/cve-2018-11776", + "owner": { + "login": "cved-sources", + "id": 46423677, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", + "html_url": "https:\/\/github.com\/cved-sources" + }, + "html_url": "https:\/\/github.com\/cved-sources\/cve-2018-11776", + "description": "cve-2018-11776", + "fork": false, + "created_at": "2019-01-06T22:47:25Z", + "updated_at": "2019-09-12T19:52:44Z", + "pushed_at": "2019-02-01T21:29:54Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, { "id": 193423029, "name": "apche-struts-vuln-demo-cve-2018-11776", @@ -22,6 +321,29 @@ "watchers": 0, "score": 0 }, + { + "id": 213772542, + "name": "CVE-2018-11776", + "full_name": "cucadili\/CVE-2018-11776", + "owner": { + "login": "cucadili", + "id": 48569185, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48569185?v=4", + "html_url": "https:\/\/github.com\/cucadili" + }, + "html_url": "https:\/\/github.com\/cucadili\/CVE-2018-11776", + "description": "Investigation of CVE-2018-11776 vulnerability that allows attackers to remotely execute code and gain control over Apache Struts-based applications.", + "fork": false, + "created_at": "2019-10-08T23:01:49Z", + "updated_at": "2019-10-08T23:46:28Z", + "pushed_at": "2019-10-08T23:46:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 214186123, "name": "Apache-Struts-0Day-Exploit", diff --git a/2018/CVE-2018-11788.json b/2018/CVE-2018-11788.json new file mode 100644 index 0000000000..a299ef6997 --- /dev/null +++ b/2018/CVE-2018-11788.json @@ -0,0 +1,25 @@ +[ + { + "id": 164298909, + "name": "CVE-2018-11788", + "full_name": "brianwrf\/CVE-2018-11788", + "owner": { + "login": "brianwrf", + "id": 8141813, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4", + "html_url": "https:\/\/github.com\/brianwrf" + }, + "html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11788", + "description": "Apache Karaf XXE Vulnerability (CVE-2018-11788)", + "fork": false, + "created_at": "2019-01-06T11:01:39Z", + "updated_at": "2020-03-29T02:47:45Z", + "pushed_at": "2019-01-06T11:50:43Z", + "stargazers_count": 36, + "watchers_count": 36, + "forks_count": 5, + "forks": 5, + "watchers": 36, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-11882.json b/2018/CVE-2018-11882.json new file mode 100644 index 0000000000..144a568bfe --- /dev/null +++ b/2018/CVE-2018-11882.json @@ -0,0 +1,25 @@ +[ + { + "id": 197681680, + "name": "cve-2018-11882", + "full_name": "jguard01\/cve-2018-11882", + "owner": { + "login": "jguard01", + "id": 53065612, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53065612?v=4", + "html_url": "https:\/\/github.com\/jguard01" + }, + "html_url": "https:\/\/github.com\/jguard01\/cve-2018-11882", + "description": null, + "fork": false, + "created_at": "2019-07-19T01:40:05Z", + "updated_at": "2019-07-19T01:42:00Z", + "pushed_at": "2019-07-19T01:41:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-12018.json b/2018/CVE-2018-12018.json new file mode 100644 index 0000000000..46fac5724c --- /dev/null +++ b/2018/CVE-2018-12018.json @@ -0,0 +1,25 @@ +[ + { + "id": 153770795, + "name": "CVE-2018-12018", + "full_name": "k3v142\/CVE-2018-12018", + "owner": { + "login": "k3v142", + "id": 12337759, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12337759?v=4", + "html_url": "https:\/\/github.com\/k3v142" + }, + "html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018", + "description": "EPoD (Ethereum Packet of Death)", + "fork": false, + "created_at": "2018-10-19T11:11:01Z", + "updated_at": "2019-12-14T15:32:33Z", + "pushed_at": "2018-10-20T21:07:42Z", + "stargazers_count": 5, + "watchers_count": 5, + "forks_count": 0, + "forks": 0, + "watchers": 5, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-12038.json b/2018/CVE-2018-12038.json new file mode 100644 index 0000000000..7f4e8c6f0e --- /dev/null +++ b/2018/CVE-2018-12038.json @@ -0,0 +1,25 @@ +[ + { + "id": 162155985, + "name": "remote-bitlocker-encryption-report", + "full_name": "gdraperi\/remote-bitlocker-encryption-report", + "owner": { + "login": "gdraperi", + "id": 33750242, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33750242?v=4", + "html_url": "https:\/\/github.com\/gdraperi" + }, + "html_url": "https:\/\/github.com\/gdraperi\/remote-bitlocker-encryption-report", + "description": "PowerShell script to mitigate CVE-2018-12038. The script takes a list of PC as input, gets their BitLocker encryption type remotely, and outputs a report as a CSV file", + "fork": false, + "created_at": "2018-12-17T16:02:26Z", + "updated_at": "2019-02-11T14:30:38Z", + "pushed_at": "2018-12-07T20:11:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-12086.json b/2018/CVE-2018-12086.json new file mode 100644 index 0000000000..0ca49b48f6 --- /dev/null +++ b/2018/CVE-2018-12086.json @@ -0,0 +1,25 @@ +[ + { + "id": 171705705, + "name": "stack-overflow-poc", + "full_name": "kevinherron\/stack-overflow-poc", + "owner": { + "login": "kevinherron", + "id": 340273, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/340273?v=4", + "html_url": "https:\/\/github.com\/kevinherron" + }, + "html_url": "https:\/\/github.com\/kevinherron\/stack-overflow-poc", + "description": "PoC for CVE-2018-12086 affecting various OPC UA stacks", + "fork": false, + "created_at": "2019-02-20T16:11:26Z", + "updated_at": "2019-10-31T13:35:21Z", + "pushed_at": "2019-10-31T13:35:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-1235.json b/2018/CVE-2018-1235.json new file mode 100644 index 0000000000..54d8eabfd7 --- /dev/null +++ b/2018/CVE-2018-1235.json @@ -0,0 +1,25 @@ +[ + { + "id": 181948503, + "name": "CVE-2018-1235", + "full_name": "AbsoZed\/CVE-2018-1235", + "owner": { + "login": "AbsoZed", + "id": 17788335, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17788335?v=4", + "html_url": "https:\/\/github.com\/AbsoZed" + }, + "html_url": "https:\/\/github.com\/AbsoZed\/CVE-2018-1235", + "description": "A python script that tests for an exploitable instance of CVE-2018-1235.", + "fork": false, + "created_at": "2019-04-17T18:37:00Z", + "updated_at": "2019-04-18T12:47:38Z", + "pushed_at": "2019-04-18T12:47:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-12386.json b/2018/CVE-2018-12386.json index 8f9118f4ee..7a102de145 100644 --- a/2018/CVE-2018-12386.json +++ b/2018/CVE-2018-12386.json @@ -1,4 +1,27 @@ [ + { + "id": 201420418, + "name": "cve-2018-12386", + "full_name": "Hydra3evil\/cve-2018-12386", + "owner": { + "login": "Hydra3evil", + "id": 53893501, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53893501?v=4", + "html_url": "https:\/\/github.com\/Hydra3evil" + }, + "html_url": "https:\/\/github.com\/Hydra3evil\/cve-2018-12386", + "description": "CVE-2018-12386 - Firefox Sandboxed RCE Exploit for Linux (Firefox