Auto Update 2020/12/26 12:09:07

This commit is contained in:
motikan2010-bot 2020-12-26 12:09:07 +09:00
parent 43451b955b
commit ecc7f506fd
222 changed files with 5526 additions and 6353 deletions

25
2015/CVE-2015-0006.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 19259219,
"name": "imposter",
"full_name": "bugch3ck\/imposter",
"owner": {
"login": "bugch3ck",
"id": 4165895,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4165895?v=4",
"html_url": "https:\/\/github.com\/bugch3ck"
},
"html_url": "https:\/\/github.com\/bugch3ck\/imposter",
"description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .",
"fork": false,
"created_at": "2014-04-29T01:05:57Z",
"updated_at": "2018-06-26T21:10:14Z",
"pushed_at": "2014-06-07T23:45:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2015/CVE-2015-0072.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 31144704,
"name": "uxss-poc",
"full_name": "dbellavista\/uxss-poc",
"owner": {
"login": "dbellavista",
"id": 1540321,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1540321?v=4",
"html_url": "https:\/\/github.com\/dbellavista"
},
"html_url": "https:\/\/github.com\/dbellavista\/uxss-poc",
"description": "Universal xss PoC with multiple target sites (CVE-2015-0072)",
"fork": false,
"created_at": "2015-02-21T23:03:48Z",
"updated_at": "2019-08-13T16:03:42Z",
"pushed_at": "2015-02-22T14:14:29Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 7,
"score": 0
}
]

94
2015/CVE-2015-0204.json Normal file
View file

@ -0,0 +1,94 @@
[
{
"id": 31661477,
"name": "FreakVulnChecker",
"full_name": "felmoltor\/FreakVulnChecker",
"owner": {
"login": "felmoltor",
"id": 846513,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/846513?v=4",
"html_url": "https:\/\/github.com\/felmoltor"
},
"html_url": "https:\/\/github.com\/felmoltor\/FreakVulnChecker",
"description": "This script check if your list of server is accepting Export cipher suites and could be vulnerable to CVE-2015-0204",
"fork": false,
"created_at": "2015-03-04T14:35:54Z",
"updated_at": "2015-03-04T17:58:24Z",
"pushed_at": "2015-03-04T14:47:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 31731578,
"name": "Freak-Scanner",
"full_name": "scottjpack\/Freak-Scanner",
"owner": {
"login": "scottjpack",
"id": 2293674,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2293674?v=4",
"html_url": "https:\/\/github.com\/scottjpack"
},
"html_url": "https:\/\/github.com\/scottjpack\/Freak-Scanner",
"description": "Multithreaded FREAK scanner, used to detect SSL EXP Ciphers, vulnerable to CVE-2015-0204",
"fork": false,
"created_at": "2015-03-05T19:21:50Z",
"updated_at": "2018-08-14T08:33:26Z",
"pushed_at": "2015-03-05T19:23:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 31762660,
"name": "FREAK-Attack-CVE-2015-0204-Testing-Script",
"full_name": "AbhishekGhosh\/FREAK-Attack-CVE-2015-0204-Testing-Script",
"owner": {
"login": "AbhishekGhosh",
"id": 879054,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/879054?v=4",
"html_url": "https:\/\/github.com\/AbhishekGhosh"
},
"html_url": "https:\/\/github.com\/AbhishekGhosh\/FREAK-Attack-CVE-2015-0204-Testing-Script",
"description": "Basic BASH Script to Automate OpenSSL based testing for FREAK Attack (CVE-2015-0204) as advised by Akamai.",
"fork": false,
"created_at": "2015-03-06T09:40:54Z",
"updated_at": "2018-08-10T09:10:52Z",
"pushed_at": "2015-03-06T10:00:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 32724854,
"name": "patch-openssl-CVE-2014-0291_CVE-2015-0204",
"full_name": "niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204",
"owner": {
"login": "niccoX",
"id": 10669660,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10669660?v=4",
"html_url": "https:\/\/github.com\/niccoX"
},
"html_url": "https:\/\/github.com\/niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204",
"description": null,
"fork": false,
"created_at": "2015-03-23T10:18:08Z",
"updated_at": "2018-08-10T09:10:45Z",
"pushed_at": "2015-03-23T13:04:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,211 @@
[
{
"id": 29925728,
"name": "ghost-checker",
"full_name": "fser\/ghost-checker",
"owner": {
"login": "fser",
"id": 774138,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/774138?v=4",
"html_url": "https:\/\/github.com\/fser"
},
"html_url": "https:\/\/github.com\/fser\/ghost-checker",
"description": "Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security",
"fork": false,
"created_at": "2015-01-27T17:31:33Z",
"updated_at": "2018-05-15T04:55:01Z",
"pushed_at": "2015-01-27T17:35:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 29933656,
"name": "CVE-2015-0235-cookbook",
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
"owner": {
"login": "mikesplain",
"id": 881965,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/881965?v=4",
"html_url": "https:\/\/github.com\/mikesplain"
},
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
"description": "A chef cookbook to test the GHOST vulnerability",
"fork": false,
"created_at": "2015-01-27T20:34:42Z",
"updated_at": "2017-09-29T11:32:54Z",
"pushed_at": "2015-01-27T21:41:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 29941036,
"name": "CVE-2015-0235-test",
"full_name": "aaronfay\/CVE-2015-0235-test",
"owner": {
"login": "aaronfay",
"id": 1033941,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1033941?v=4",
"html_url": "https:\/\/github.com\/aaronfay"
},
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-27T23:45:22Z",
"updated_at": "2016-08-31T16:50:49Z",
"pushed_at": "2015-01-29T03:33:29Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"score": 0
},
{
"id": 29942046,
"name": "ghost",
"full_name": "piyokango\/ghost",
"owner": {
"login": "piyokango",
"id": 10733273,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10733273?v=4",
"html_url": "https:\/\/github.com\/piyokango"
},
"html_url": "https:\/\/github.com\/piyokango\/ghost",
"description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list",
"fork": false,
"created_at": "2015-01-28T00:14:35Z",
"updated_at": "2015-08-13T21:27:35Z",
"pushed_at": "2015-01-28T14:29:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 29950345,
"name": "CVE-2015-0235_GHOST",
"full_name": "mholzinger\/CVE-2015-0235_GHOST",
"owner": {
"login": "mholzinger",
"id": 235958,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/235958?v=4",
"html_url": "https:\/\/github.com\/mholzinger"
},
"html_url": "https:\/\/github.com\/mholzinger\/CVE-2015-0235_GHOST",
"description": null,
"fork": false,
"created_at": "2015-01-28T04:22:05Z",
"updated_at": "2016-02-26T05:46:40Z",
"pushed_at": "2015-01-28T05:26:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 29988916,
"name": "ansible-CVE-2015-0235-GHOST",
"full_name": "adherzog\/ansible-CVE-2015-0235-GHOST",
"owner": {
"login": "adherzog",
"id": 1744181,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1744181?v=4",
"html_url": "https:\/\/github.com\/adherzog"
},
"html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST",
"description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability",
"fork": false,
"created_at": "2015-01-28T21:22:33Z",
"updated_at": "2015-01-28T21:23:35Z",
"pushed_at": "2015-01-28T21:23:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 29993101,
"name": "lenny-libc6",
"full_name": "favoretti\/lenny-libc6",
"owner": {
"login": "favoretti",
"id": 805046,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/805046?v=4",
"html_url": "https:\/\/github.com\/favoretti"
},
"html_url": "https:\/\/github.com\/favoretti\/lenny-libc6",
"description": "CVE-2015-0235 patches lenny libc6 packages for amd64",
"fork": false,
"created_at": "2015-01-28T23:09:13Z",
"updated_at": "2015-01-28T23:09:13Z",
"pushed_at": "2015-01-28T23:11:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 30004399,
"name": "cfengine-CVE_2015_0235",
"full_name": "nickanderson\/cfengine-CVE_2015_0235",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
"description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
"fork": false,
"created_at": "2015-01-29T04:58:54Z",
"updated_at": "2016-02-13T01:41:47Z",
"pushed_at": "2015-01-29T21:23:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 30008427,
"name": "cookbook-update-glibc",
"full_name": "koudaiii-archives\/cookbook-update-glibc",
"owner": {
"login": "koudaiii-archives",
"id": 51727289,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/51727289?v=4",
"html_url": "https:\/\/github.com\/koudaiii-archives"
},
"html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc",
"description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
"fork": false,
"created_at": "2015-01-29T07:14:17Z",
"updated_at": "2019-06-14T02:44:06Z",
"pushed_at": "2015-01-29T07:38:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 30019912,
"name": "ghostbusters15",
@ -22,6 +229,98 @@
"watchers": 0,
"score": 0
},
{
"id": 30059704,
"name": "ghosttester",
"full_name": "JustDenisYT\/ghosttester",
"owner": {
"login": "JustDenisYT",
"id": 9379272,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9379272?v=4",
"html_url": "https:\/\/github.com\/JustDenisYT"
},
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
"description": "Script to test vulnarability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-30T06:37:06Z",
"updated_at": "2015-02-04T08:03:37Z",
"pushed_at": "2015-02-04T08:03:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 30066365,
"name": "CVE-2015-0235",
"full_name": "tobyzxj\/CVE-2015-0235",
"owner": {
"login": "tobyzxj",
"id": 4661855,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4661855?v=4",
"html_url": "https:\/\/github.com\/tobyzxj"
},
"html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
"description": "glibc gethostbyname bug",
"fork": false,
"created_at": "2015-01-30T09:58:09Z",
"updated_at": "2020-10-17T20:24:46Z",
"pushed_at": "2015-01-30T10:02:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 30183649,
"name": "CVE-2015-0235-workaround",
"full_name": "makelinux\/CVE-2015-0235-workaround",
"owner": {
"login": "makelinux",
"id": 2335185,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2335185?v=4",
"html_url": "https:\/\/github.com\/makelinux"
},
"html_url": "https:\/\/github.com\/makelinux\/CVE-2015-0235-workaround",
"description": "A shared library wrapper with additional checks for vulnerable functions gethostbyname2_r gethostbyname_r (GHOST vulnerability)",
"fork": false,
"created_at": "2015-02-02T11:16:42Z",
"updated_at": "2016-02-17T21:52:40Z",
"pushed_at": "2015-02-04T19:41:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
},
{
"id": 33016863,
"name": "ghost_exploit",
"full_name": "arm13\/ghost_exploit",
"owner": {
"login": "arm13",
"id": 5557134,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5557134?v=4",
"html_url": "https:\/\/github.com\/arm13"
},
"html_url": "https:\/\/github.com\/arm13\/ghost_exploit",
"description": "CVE-2015-0235 EXIM ESTMP GHOST Glibc Gethostbyname() DoS Exploit\/PoC",
"fork": false,
"created_at": "2015-03-28T01:26:05Z",
"updated_at": "2020-04-07T07:55:19Z",
"pushed_at": "2015-03-17T19:48:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 52564080,
"name": "CVE-glibc",
@ -90,5 +389,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 258345295,
"name": "GHOSTCHECK-cve-2015-0235",
"full_name": "limkokhole\/GHOSTCHECK-cve-2015-0235",
"owner": {
"login": "limkokhole",
"id": 4859895,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4859895?v=4",
"html_url": "https:\/\/github.com\/limkokhole"
},
"html_url": "https:\/\/github.com\/limkokhole\/GHOSTCHECK-cve-2015-0235",
"description": null,
"fork": false,
"created_at": "2020-04-23T22:26:31Z",
"updated_at": "2020-10-13T19:53:57Z",
"pushed_at": "2015-01-28T15:10:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2015/CVE-2015-0313.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 32668134,
"name": "cve-2015-0313",
"full_name": "SecurityObscurity\/cve-2015-0313",
"owner": {
"login": "SecurityObscurity",
"id": 1792477,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1792477?v=4",
"html_url": "https:\/\/github.com\/SecurityObscurity"
},
"html_url": "https:\/\/github.com\/SecurityObscurity\/cve-2015-0313",
"description": null,
"fork": false,
"created_at": "2015-03-22T08:37:36Z",
"updated_at": "2019-12-08T12:35:07Z",
"pushed_at": "2015-03-24T21:42:06Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 12,
"forks": 12,
"watchers": 21,
"score": 0
}
]

25
2015/CVE-2015-0345.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 37254632,
"name": "coldfusion-10-11-xss",
"full_name": "BishopFox\/coldfusion-10-11-xss",
"owner": {
"login": "BishopFox",
"id": 4523757,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4523757?v=4",
"html_url": "https:\/\/github.com\/BishopFox"
},
"html_url": "https:\/\/github.com\/BishopFox\/coldfusion-10-11-xss",
"description": "Proof of Concept code for CVE-2015-0345 (APSB15-07)",
"fork": false,
"created_at": "2015-06-11T10:27:49Z",
"updated_at": "2020-10-09T14:33:24Z",
"pushed_at": "2015-06-12T04:54:51Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"score": 0
}
]

48
2015/CVE-2015-1130.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 33749778,
"name": "RootPipe-Demo",
"full_name": "Shmoopi\/RootPipe-Demo",
"owner": {
"login": "Shmoopi",
"id": 1914231,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1914231?v=4",
"html_url": "https:\/\/github.com\/Shmoopi"
},
"html_url": "https:\/\/github.com\/Shmoopi\/RootPipe-Demo",
"description": "Proof of Concept OS X Application for RootPipe Privilege Escalation Vulnerability (CVE-2015-1130)",
"fork": false,
"created_at": "2015-04-10T20:43:13Z",
"updated_at": "2016-02-19T01:53:47Z",
"pushed_at": "2015-04-10T21:03:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 34001254,
"name": "RootPipeTester",
"full_name": "sideeffect42\/RootPipeTester",
"owner": {
"login": "sideeffect42",
"id": 940027,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/940027?v=4",
"html_url": "https:\/\/github.com\/sideeffect42"
},
"html_url": "https:\/\/github.com\/sideeffect42\/RootPipeTester",
"description": "RootPipe (CVE-2015-1130) and Phoenix (CVE-2015-3673) vulnerability testing utility for Mac OS X 10.2.8 and later",
"fork": false,
"created_at": "2015-04-15T15:12:07Z",
"updated_at": "2019-09-25T16:16:14Z",
"pushed_at": "2015-07-25T12:11:29Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 8,
"forks": 8,
"watchers": 17,
"score": 0
}
]

25
2015/CVE-2015-1140.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 32299746,
"name": "vpwn",
"full_name": "kpwn\/vpwn",
"owner": {
"login": "kpwn",
"id": 1671686,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1671686?v=4",
"html_url": "https:\/\/github.com\/kpwn"
},
"html_url": "https:\/\/github.com\/kpwn\/vpwn",
"description": "xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo",
"fork": false,
"created_at": "2015-03-16T03:43:50Z",
"updated_at": "2020-08-26T15:33:04Z",
"pushed_at": "2015-03-20T15:57:00Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 26,
"forks": 26,
"watchers": 61,
"score": 0
}
]

25
2015/CVE-2015-1318.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 34139619,
"name": "CVE-2015-1318",
"full_name": "ScottyBauer\/CVE-2015-1318",
"owner": {
"login": "ScottyBauer",
"id": 5963339,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5963339?v=4",
"html_url": "https:\/\/github.com\/ScottyBauer"
},
"html_url": "https:\/\/github.com\/ScottyBauer\/CVE-2015-1318",
"description": "Exploit I used to claim 10% final-grade extra credit in Matthew Might's Compilers class.",
"fork": false,
"created_at": "2015-04-17T20:53:29Z",
"updated_at": "2017-11-27T13:40:26Z",
"pushed_at": "2015-04-17T21:00:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
}
]

25
2015/CVE-2015-1474.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 31779698,
"name": "CVE-2015-1474_poc",
"full_name": "p1gl3t\/CVE-2015-1474_poc",
"owner": {
"login": "p1gl3t",
"id": 1456530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1456530?v=4",
"html_url": "https:\/\/github.com\/p1gl3t"
},
"html_url": "https:\/\/github.com\/p1gl3t\/CVE-2015-1474_poc",
"description": null,
"fork": false,
"created_at": "2015-03-06T17:04:55Z",
"updated_at": "2018-06-01T14:25:02Z",
"pushed_at": "2015-03-06T17:23:11Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"forks": 6,
"watchers": 16,
"score": 0
}
]

25
2015/CVE-2015-1560.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 40009554,
"name": "Centreon-CVE-2015-1560_1561",
"full_name": "Iansus\/Centreon-CVE-2015-1560_1561",
"owner": {
"login": "Iansus",
"id": 1913897,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1913897?v=4",
"html_url": "https:\/\/github.com\/Iansus"
},
"html_url": "https:\/\/github.com\/Iansus\/Centreon-CVE-2015-1560_1561",
"description": "A little Python tool for exploiting CVE-2015-1560 and CVE-2015-1561. Quick'n'dirty. Real dirty.",
"fork": false,
"created_at": "2015-07-31T14:37:50Z",
"updated_at": "2016-06-25T07:30:20Z",
"pushed_at": "2015-07-31T14:43:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

25
2015/CVE-2015-1592.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 33738238,
"name": "cve-2015-1592",
"full_name": "lightsey\/cve-2015-1592",
"owner": {
"login": "lightsey",
"id": 1312249,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1312249?v=4",
"html_url": "https:\/\/github.com\/lightsey"
},
"html_url": "https:\/\/github.com\/lightsey\/cve-2015-1592",
"description": "Metasploit modules and payload generation files from my Houston Perl Mongers talk about this vulnerability.",
"fork": false,
"created_at": "2015-04-10T16:16:51Z",
"updated_at": "2019-05-08T13:11:28Z",
"pushed_at": "2015-04-19T18:46:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 34000836,
"name": "HTTPsys",
"full_name": "xPaw\/HTTPsys",
"owner": {
"login": "xPaw",
"id": 613331,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/613331?v=4",
"html_url": "https:\/\/github.com\/xPaw"
},
"html_url": "https:\/\/github.com\/xPaw\/HTTPsys",
"description": "🔥 A checker site for MS15-034 \/ CVE-2015-1635",
"fork": false,
"created_at": "2015-04-15T15:05:01Z",
"updated_at": "2020-02-13T15:38:56Z",
"pushed_at": "2015-05-31T10:16:34Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 14,
"forks": 14,
"watchers": 38,
"score": 0
},
{
"id": 34041082,
"name": "Project-CVE-2015-1635",
"full_name": "Zx7ffa4512-Python\/Project-CVE-2015-1635",
"owner": {
"login": "Zx7ffa4512-Python",
"id": 8359145,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8359145?v=4",
"html_url": "https:\/\/github.com\/Zx7ffa4512-Python"
},
"html_url": "https:\/\/github.com\/Zx7ffa4512-Python\/Project-CVE-2015-1635",
"description": "CVE-2015-1635,MS15-034",
"fork": false,
"created_at": "2015-04-16T07:31:47Z",
"updated_at": "2019-03-26T05:18:37Z",
"pushed_at": "2015-04-16T07:38:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 35026633,
"name": "erlvulnscan",

25
2015/CVE-2015-2208.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 33769425,
"name": "cve-2015-2208",
"full_name": "ptantiku\/cve-2015-2208",
"owner": {
"login": "ptantiku",
"id": 479656,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/479656?v=4",
"html_url": "https:\/\/github.com\/ptantiku"
},
"html_url": "https:\/\/github.com\/ptantiku\/cve-2015-2208",
"description": "Docker simulating cve-2015-2208 vulnerability",
"fork": false,
"created_at": "2015-04-11T09:02:47Z",
"updated_at": "2017-08-23T11:54:53Z",
"pushed_at": "2015-04-11T09:28:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2015/CVE-2015-2315.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 37091931,
"name": "cve-2015-2315-report",
"full_name": "weidongl74\/cve-2015-2315-report",
"owner": {
"login": "weidongl74",
"id": 6402180,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6402180?v=4",
"html_url": "https:\/\/github.com\/weidongl74"
},
"html_url": "https:\/\/github.com\/weidongl74\/cve-2015-2315-report",
"description": null,
"fork": false,
"created_at": "2015-06-08T20:48:10Z",
"updated_at": "2016-02-13T01:46:08Z",
"pushed_at": "2015-06-08T20:52:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2015/CVE-2015-2925.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 38323302,
"name": "docker_cve-2015-2925",
"full_name": "Kagami\/docker_cve-2015-2925",
"owner": {
"login": "Kagami",
"id": 533383,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/533383?v=4",
"html_url": "https:\/\/github.com\/Kagami"
},
"html_url": "https:\/\/github.com\/Kagami\/docker_cve-2015-2925",
"description": "Docker + CVE-2015-2925 = escaping from --volume",
"fork": false,
"created_at": "2015-06-30T17:32:51Z",
"updated_at": "2019-07-22T11:42:33Z",
"pushed_at": "2015-06-30T17:48:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
}
]

25
2015/CVE-2015-3043.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 35982893,
"name": "Exploit",
"full_name": "whitehairman\/Exploit",
"owner": {
"login": "whitehairman",
"id": 12509929,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12509929?v=4",
"html_url": "https:\/\/github.com\/whitehairman"
},
"html_url": "https:\/\/github.com\/whitehairman\/Exploit",
"description": "cve-2015-3043 flash exploit",
"fork": false,
"created_at": "2015-05-21T01:09:49Z",
"updated_at": "2015-05-21T01:09:49Z",
"pushed_at": "2015-05-21T01:09:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2015/CVE-2015-3152.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 33449450,
"name": "mysslstrip",
"full_name": "duo-labs\/mysslstrip",
"owner": {
"login": "duo-labs",
"id": 10833831,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10833831?v=4",
"html_url": "https:\/\/github.com\/duo-labs"
},
"html_url": "https:\/\/github.com\/duo-labs\/mysslstrip",
"description": "CVE-2015-3152 PoC",
"fork": false,
"created_at": "2015-04-05T17:48:12Z",
"updated_at": "2020-03-31T18:40:47Z",
"pushed_at": "2015-05-11T22:39:06Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"forks": 10,
"watchers": 42,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 34326695,
"name": "cpx_proftpd",
"full_name": "chcx\/cpx_proftpd",
"owner": {
"login": "chcx",
"id": 11925952,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11925952?v=4",
"html_url": "https:\/\/github.com\/chcx"
},
"html_url": "https:\/\/github.com\/chcx\/cpx_proftpd",
"description": "Tool for exploit CVE-2015-3306",
"fork": false,
"created_at": "2015-04-21T12:51:51Z",
"updated_at": "2020-04-07T07:54:29Z",
"pushed_at": "2015-04-22T12:54:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 34614441,
"name": "propane",
"full_name": "nootropics\/propane",
"owner": {
"login": "nootropics",
"id": 11942786,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11942786?v=4",
"html_url": "https:\/\/github.com\/nootropics"
},
"html_url": "https:\/\/github.com\/nootropics\/propane",
"description": "Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code execution",
"fork": false,
"created_at": "2015-04-26T14:14:34Z",
"updated_at": "2020-04-07T07:53:11Z",
"pushed_at": "2015-06-01T22:02:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 8,
"forks": 8,
"watchers": 3,
"score": 0
},
{
"id": 78347416,
"name": "exploit-CVE-2015-3306",

View file

@ -1,4 +1,27 @@
[
{
"id": 35781200,
"name": "cve-2015-3456",
"full_name": "vincentbernat\/cve-2015-3456",
"owner": {
"login": "vincentbernat",
"id": 631446,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/631446?v=4",
"html_url": "https:\/\/github.com\/vincentbernat"
},
"html_url": "https:\/\/github.com\/vincentbernat\/cve-2015-3456",
"description": "Experiments related to CVE-2015-3456",
"fork": false,
"created_at": "2015-05-17T20:14:47Z",
"updated_at": "2020-08-18T07:34:43Z",
"pushed_at": "2015-05-27T13:58:46Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"score": 0
},
{
"id": 160141762,
"name": "poisonfrog",

View file

@ -1,4 +1,27 @@
[
{
"id": 39679436,
"name": "cve-2015-3636_crash",
"full_name": "betalphafai\/cve-2015-3636_crash",
"owner": {
"login": "betalphafai",
"id": 2919697,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2919697?v=4",
"html_url": "https:\/\/github.com\/betalphafai"
},
"html_url": "https:\/\/github.com\/betalphafai\/cve-2015-3636_crash",
"description": null,
"fork": false,
"created_at": "2015-07-25T09:29:27Z",
"updated_at": "2017-05-17T17:57:48Z",
"pushed_at": "2015-07-25T09:56:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 41139678,
"name": "libping_unhash_exploit_POC",

View file

@ -22,6 +22,29 @@
"watchers": 61,
"score": 0
},
{
"id": 40041859,
"name": "tkeypoc",
"full_name": "elceef\/tkeypoc",
"owner": {
"login": "elceef",
"id": 8627380,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8627380?v=4",
"html_url": "https:\/\/github.com\/elceef"
},
"html_url": "https:\/\/github.com\/elceef\/tkeypoc",
"description": "PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability",
"fork": false,
"created_at": "2015-08-01T09:27:23Z",
"updated_at": "2020-07-09T18:51:14Z",
"pushed_at": "2015-08-01T09:34:50Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 9,
"forks": 9,
"watchers": 14,
"score": 0
},
{
"id": 40209347,
"name": "vaas-cve-2015-5477",

View file

@ -13,13 +13,13 @@
"description": "MS16-032(CVE-2016-0099) for SERVICE ONLY",
"fork": false,
"created_at": "2017-03-15T17:16:55Z",
"updated_at": "2020-11-13T03:48:07Z",
"updated_at": "2020-12-26T02:40:10Z",
"pushed_at": "2017-03-15T17:24:59Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 45,
"forks": 45,
"watchers": 76,
"watchers": 77,
"score": 0
}
]

25
2017/CVE-2017-0038.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 85834314,
"name": "CVE-2017-0038-EXP-C-JS",
"full_name": "k0keoyo\/CVE-2017-0038-EXP-C-JS",
"owner": {
"login": "k0keoyo",
"id": 13257929,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13257929?v=4",
"html_url": "https:\/\/github.com\/k0keoyo"
},
"html_url": "https:\/\/github.com\/k0keoyo\/CVE-2017-0038-EXP-C-JS",
"description": null,
"fork": false,
"created_at": "2017-03-22T13:59:48Z",
"updated_at": "2019-09-13T11:40:59Z",
"pushed_at": "2017-03-23T14:07:37Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 8,
"forks": 8,
"watchers": 6,
"score": 0
}
]

25
2017/CVE-2017-0065.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 85072866,
"name": "cve-2017-0065",
"full_name": "Dankirk\/cve-2017-0065",
"owner": {
"login": "Dankirk",
"id": 10588760,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10588760?v=4",
"html_url": "https:\/\/github.com\/Dankirk"
},
"html_url": "https:\/\/github.com\/Dankirk\/cve-2017-0065",
"description": "Exploiting Edge's read:\/\/ urlhandler",
"fork": false,
"created_at": "2017-03-15T13:01:29Z",
"updated_at": "2019-10-26T13:38:33Z",
"pushed_at": "2020-10-01T04:14:25Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 15,
"forks": 15,
"watchers": 15,
"score": 0
}
]

25
2017/CVE-2017-0106.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 88117539,
"name": "CVE-2017-0106",
"full_name": "ryhanson\/CVE-2017-0106",
"owner": {
"login": "ryhanson",
"id": 3486433,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
"html_url": "https:\/\/github.com\/ryhanson"
},
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0106",
"description": null,
"fork": false,
"created_at": "2017-04-13T02:42:08Z",
"updated_at": "2017-04-13T02:42:08Z",
"pushed_at": "2017-04-13T02:42:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-0108.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 88317204,
"name": "CVE-2017-0108",
"full_name": "homjxi0e\/CVE-2017-0108",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-0108",
"description": null,
"fork": false,
"created_at": "2017-04-15T02:10:16Z",
"updated_at": "2017-12-04T20:08:18Z",
"pushed_at": "2017-04-15T02:16:09Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 91496993,
"name": "wannafind",
"full_name": "valarauco\/wannafind",
"owner": {
"login": "valarauco",
"id": 434898,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/434898?v=4",
"html_url": "https:\/\/github.com\/valarauco"
},
"html_url": "https:\/\/github.com\/valarauco\/wannafind",
"description": "Simple script using nmap to detect CVE-2017-0143 MS17-010 in your network",
"fork": false,
"created_at": "2017-05-16T19:34:38Z",
"updated_at": "2017-12-06T14:25:10Z",
"pushed_at": "2017-05-26T17:28:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 301944849,
"name": "Etern-blue-Windows-7-Checker",

25
2017/CVE-2017-0145.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 91811261,
"name": "chef_tissues",
"full_name": "MelonSmasher\/chef_tissues",
"owner": {
"login": "MelonSmasher",
"id": 1491053,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1491053?v=4",
"html_url": "https:\/\/github.com\/MelonSmasher"
},
"html_url": "https:\/\/github.com\/MelonSmasher\/chef_tissues",
"description": "Install patch for CVE-2017-0145 AKA WannaCry.",
"fork": false,
"created_at": "2017-05-19T13:55:06Z",
"updated_at": "2018-04-04T01:07:21Z",
"pushed_at": "2017-05-19T16:49:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 88117490,
"name": "CVE-2017-0199",
"full_name": "ryhanson\/CVE-2017-0199",
"owner": {
"login": "ryhanson",
"id": 3486433,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
"html_url": "https:\/\/github.com\/ryhanson"
},
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-04-13T02:41:36Z",
"updated_at": "2017-04-13T02:41:36Z",
"pushed_at": "2017-04-13T02:41:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 88185964,
"name": "cve-2017-0199",
"full_name": "SyFi\/cve-2017-0199",
"owner": {
"login": "SyFi",
"id": 26314806,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
"html_url": "https:\/\/github.com\/SyFi"
},
"html_url": "https:\/\/github.com\/SyFi\/cve-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-04-13T16:40:27Z",
"updated_at": "2019-12-06T00:55:16Z",
"pushed_at": "2017-04-13T16:45:10Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"forks": 7,
"watchers": 12,
"score": 0
},
{
"id": 88486475,
"name": "CVE-2017-0199",
@ -22,6 +68,213 @@
"watchers": 636,
"score": 0
},
{
"id": 88590374,
"name": "CVE-2017-0199-Fix",
"full_name": "NotAwful\/CVE-2017-0199-Fix",
"owner": {
"login": "NotAwful",
"id": 25178947,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25178947?v=4",
"html_url": "https:\/\/github.com\/NotAwful"
},
"html_url": "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix",
"description": "Quick and dirty fix to OLE2 executing code via .hta",
"fork": false,
"created_at": "2017-04-18T06:33:45Z",
"updated_at": "2018-03-18T10:23:47Z",
"pushed_at": "2017-04-24T20:48:36Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 1,
"forks": 1,
"watchers": 14,
"score": 0
},
{
"id": 88700030,
"name": "CVE-2017-0199-master",
"full_name": "haibara3839\/CVE-2017-0199-master",
"owner": {
"login": "haibara3839",
"id": 17246565,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17246565?v=4",
"html_url": "https:\/\/github.com\/haibara3839"
},
"html_url": "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master",
"description": "CVE-2017-0199",
"fork": false,
"created_at": "2017-04-19T04:15:54Z",
"updated_at": "2020-08-13T13:59:18Z",
"pushed_at": "2017-04-19T04:25:47Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 11,
"forks": 11,
"watchers": 16,
"score": 0
},
{
"id": 89043209,
"name": "CVE-2017-0199",
"full_name": "Exploit-install\/CVE-2017-0199",
"owner": {
"login": "Exploit-install",
"id": 13824191,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/13824191?v=4",
"html_url": "https:\/\/github.com\/Exploit-install"
},
"html_url": "https:\/\/github.com\/Exploit-install\/CVE-2017-0199",
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-22T04:01:38Z",
"updated_at": "2020-04-07T06:30:43Z",
"pushed_at": "2017-04-22T04:01:54Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 11,
"forks": 11,
"watchers": 7,
"score": 0
},
{
"id": 89065031,
"name": "PoC-CVE-2017-0199",
"full_name": "zakybstrd21215\/PoC-CVE-2017-0199",
"owner": {
"login": "zakybstrd21215",
"id": 22362343,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4",
"html_url": "https:\/\/github.com\/zakybstrd21215"
},
"html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-0199",
"description": "Exploit toolkit for vulnerability RCE Microsoft RTF",
"fork": false,
"created_at": "2017-04-22T11:32:39Z",
"updated_at": "2019-02-02T15:31:28Z",
"pushed_at": "2017-04-22T11:35:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 89145802,
"name": "CVE-2017-0199",
"full_name": "n1shant-sinha\/CVE-2017-0199",
"owner": {
"login": "n1shant-sinha",
"id": 8848453,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8848453?v=4",
"html_url": "https:\/\/github.com\/n1shant-sinha"
},
"html_url": "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199",
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-23T13:58:30Z",
"updated_at": "2018-10-18T14:32:17Z",
"pushed_at": "2017-04-23T14:05:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 89296859,
"name": "htattack",
"full_name": "kn0wm4d\/htattack",
"owner": {
"login": "kn0wm4d",
"id": 15344287,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15344287?v=4",
"html_url": "https:\/\/github.com\/kn0wm4d"
},
"html_url": "https:\/\/github.com\/kn0wm4d\/htattack",
"description": "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)",
"fork": false,
"created_at": "2017-04-24T23:44:31Z",
"updated_at": "2020-08-29T04:54:33Z",
"pushed_at": "2017-04-24T23:45:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 89314149,
"name": "Cve-2017-0199",
"full_name": "joke998\/Cve-2017-0199",
"owner": {
"login": "joke998",
"id": 25948923,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
"html_url": "https:\/\/github.com\/joke998"
},
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-04-25T03:38:15Z",
"updated_at": "2017-04-25T03:38:15Z",
"pushed_at": "2017-04-25T03:38:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 89314954,
"name": "Cve-2017-0199-",
"full_name": "joke998\/Cve-2017-0199-",
"owner": {
"login": "joke998",
"id": 25948923,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
"html_url": "https:\/\/github.com\/joke998"
},
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199-",
"description": "Cve-2017-0199",
"fork": false,
"created_at": "2017-04-25T03:48:53Z",
"updated_at": "2017-04-25T03:48:53Z",
"pushed_at": "2017-04-25T03:48:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 95870771,
"name": "Microsoft-Word-CVE-2017-0199-",
"full_name": "sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:08:40Z",
"updated_at": "2020-03-26T07:51:03Z",
"pushed_at": "2017-06-30T09:11:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 104072875,
"name": "CVE-2017-0199",

25
2017/CVE-2017-0204.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 88117558,
"name": "CVE-2017-0204",
"full_name": "ryhanson\/CVE-2017-0204",
"owner": {
"login": "ryhanson",
"id": 3486433,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
"html_url": "https:\/\/github.com\/ryhanson"
},
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0204",
"description": null,
"fork": false,
"created_at": "2017-04-13T02:42:24Z",
"updated_at": "2017-04-13T03:12:29Z",
"pushed_at": "2017-04-13T02:42:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 95809289,
"name": "CVE-2017-0213-",
"full_name": "shaheemirza\/CVE-2017-0213-",
"owner": {
"login": "shaheemirza",
"id": 4853436,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4853436?v=4",
"html_url": "https:\/\/github.com\/shaheemirza"
},
"html_url": "https:\/\/github.com\/shaheemirza\/CVE-2017-0213-",
"description": null,
"fork": false,
"created_at": "2017-06-29T18:49:44Z",
"updated_at": "2020-11-25T23:12:09Z",
"pushed_at": "2017-06-07T17:09:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 6,
"forks": 6,
"watchers": 1,
"score": 0
},
{
"id": 95974378,
"name": "CVE-2017-0213",
"full_name": "zcgonvh\/CVE-2017-0213",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
"description": "CVE-2017-0213 for command line",
"fork": false,
"created_at": "2017-07-01T16:07:04Z",
"updated_at": "2020-10-21T22:15:15Z",
"pushed_at": "2017-07-01T16:19:12Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 25,
"forks": 25,
"watchers": 55,
"score": 0
},
{
"id": 105444160,
"name": "CVE-2017-0213",

25
2017/CVE-2017-0290.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 90935850,
"name": "CVE-2017-0290-",
"full_name": "homjxi0e\/CVE-2017-0290-",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-0290-",
"description": null,
"fork": false,
"created_at": "2017-05-11T04:01:51Z",
"updated_at": "2017-05-11T04:01:51Z",
"pushed_at": "2017-05-11T05:24:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 85445247,
"name": "CVE-2017-0478",
"full_name": "JiounDai\/CVE-2017-0478",
"owner": {
"login": "JiounDai",
"id": 4220640,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4",
"html_url": "https:\/\/github.com\/JiounDai"
},
"html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0478",
"description": "poc of CVE-2017-0478",
"fork": false,
"created_at": "2017-03-19T02:18:37Z",
"updated_at": "2020-08-11T04:38:14Z",
"pushed_at": "2017-03-19T02:43:19Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
},
{
"id": 141312944,
"name": "CVE-2017-0478",

View file

@ -1,4 +1,27 @@
[
{
"id": 87639690,
"name": "CVE-2017-0541",
"full_name": "JiounDai\/CVE-2017-0541",
"owner": {
"login": "JiounDai",
"id": 4220640,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4220640?v=4",
"html_url": "https:\/\/github.com\/JiounDai"
},
"html_url": "https:\/\/github.com\/JiounDai\/CVE-2017-0541",
"description": "poc and vulnerability analysis of CVE-2017-0541",
"fork": false,
"created_at": "2017-04-08T14:28:22Z",
"updated_at": "2018-11-26T08:18:04Z",
"pushed_at": "2017-04-08T14:45:44Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 11,
"forks": 11,
"watchers": 19,
"score": 0
},
{
"id": 141312906,
"name": "CVE-2017-0541",

View file

@ -0,0 +1,25 @@
[
{
"id": 91563154,
"name": "DWF-CVE-2017-1000000",
"full_name": "smythtech\/DWF-CVE-2017-1000000",
"owner": {
"login": "smythtech",
"id": 9844564,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9844564?v=4",
"html_url": "https:\/\/github.com\/smythtech"
},
"html_url": "https:\/\/github.com\/smythtech\/DWF-CVE-2017-1000000",
"description": null,
"fork": false,
"created_at": "2017-05-17T10:14:54Z",
"updated_at": "2017-07-06T21:23:57Z",
"pushed_at": "2017-05-17T10:27:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,441 @@
[
{
"id": 100002532,
"name": "CVE-2017-1000117",
"full_name": "timwr\/CVE-2017-1000117",
"owner": {
"login": "timwr",
"id": 684924,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/684924?v=4",
"html_url": "https:\/\/github.com\/timwr"
},
"html_url": "https:\/\/github.com\/timwr\/CVE-2017-1000117",
"description": "Proof of concept of CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-11T07:03:23Z",
"updated_at": "2019-01-23T02:32:39Z",
"pushed_at": "2017-08-11T08:27:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 16,
"forks": 16,
"watchers": 6,
"score": 0
},
{
"id": 100058519,
"name": "test-git-vuln_CVE-2017-1000117",
"full_name": "GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
"owner": {
"login": "GrahamMThomas",
"id": 14031456,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/14031456?v=4",
"html_url": "https:\/\/github.com\/GrahamMThomas"
},
"html_url": "https:\/\/github.com\/GrahamMThomas\/test-git-vuln_CVE-2017-1000117",
"description": "Repo to test the new git vulnerability",
"fork": false,
"created_at": "2017-08-11T18:05:01Z",
"updated_at": "2017-09-26T17:09:13Z",
"pushed_at": "2017-08-11T20:15:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 100069051,
"name": "CVE-2017-1000117",
"full_name": "Manouchehri\/CVE-2017-1000117",
"owner": {
"login": "Manouchehri",
"id": 7232674,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7232674?v=4",
"html_url": "https:\/\/github.com\/Manouchehri"
},
"html_url": "https:\/\/github.com\/Manouchehri\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-11T20:47:53Z",
"updated_at": "2018-04-19T04:23:54Z",
"pushed_at": "2017-08-11T21:26:33Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 14,
"forks": 14,
"watchers": 16,
"score": 0
},
{
"id": 100080640,
"name": "CVE-2017-1000117",
"full_name": "thelastbyte\/CVE-2017-1000117",
"owner": {
"login": "thelastbyte",
"id": 7829097,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7829097?v=4",
"html_url": "https:\/\/github.com\/thelastbyte"
},
"html_url": "https:\/\/github.com\/thelastbyte\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-12T01:10:49Z",
"updated_at": "2017-09-01T22:06:02Z",
"pushed_at": "2017-09-01T22:08:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100116587,
"name": "CVE-2017-1000117",
"full_name": "alilangtest\/CVE-2017-1000117",
"owner": {
"login": "alilangtest",
"id": 20162983,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20162983?v=4",
"html_url": "https:\/\/github.com\/alilangtest"
},
"html_url": "https:\/\/github.com\/alilangtest\/CVE-2017-1000117",
"description": "test",
"fork": false,
"created_at": "2017-08-12T14:14:55Z",
"updated_at": "2019-05-09T09:27:01Z",
"pushed_at": "2017-08-12T14:25:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100130122,
"name": "CVE-2017-1000117",
"full_name": "VulApps\/CVE-2017-1000117",
"owner": {
"login": "VulApps",
"id": 29811930,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29811930?v=4",
"html_url": "https:\/\/github.com\/VulApps"
},
"html_url": "https:\/\/github.com\/VulApps\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-12T18:20:02Z",
"updated_at": "2020-03-21T15:06:32Z",
"pushed_at": "2017-08-12T18:22:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 21,
"forks": 21,
"watchers": 4,
"score": 0
},
{
"id": 100280254,
"name": "CVE-2017-1000117",
"full_name": "greymd\/CVE-2017-1000117",
"owner": {
"login": "greymd",
"id": 3874767,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3874767?v=4",
"html_url": "https:\/\/github.com\/greymd"
},
"html_url": "https:\/\/github.com\/greymd\/CVE-2017-1000117",
"description": "Check Git's vulnerability CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-14T15:05:48Z",
"updated_at": "2020-06-01T01:41:41Z",
"pushed_at": "2017-08-16T15:39:15Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 25,
"forks": 25,
"watchers": 137,
"score": 0
},
{
"id": 100325886,
"name": "Fix-CVE-2017-1000117",
"full_name": "shogo82148\/Fix-CVE-2017-1000117",
"owner": {
"login": "shogo82148",
"id": 1157344,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1157344?v=4",
"html_url": "https:\/\/github.com\/shogo82148"
},
"html_url": "https:\/\/github.com\/shogo82148\/Fix-CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-15T01:40:18Z",
"updated_at": "2017-08-17T03:44:20Z",
"pushed_at": "2017-08-17T03:44:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100357293,
"name": "CVE-2017-1000117_wasawasa",
"full_name": "sasairc\/CVE-2017-1000117_wasawasa",
"owner": {
"login": "sasairc",
"id": 9349287,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9349287?v=4",
"html_url": "https:\/\/github.com\/sasairc"
},
"html_url": "https:\/\/github.com\/sasairc\/CVE-2017-1000117_wasawasa",
"description": null,
"fork": false,
"created_at": "2017-08-15T08:39:23Z",
"updated_at": "2017-08-15T09:39:16Z",
"pushed_at": "2017-08-15T08:43:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 100374790,
"name": "CVE-2017-1000117-test",
"full_name": "Shadow5523\/CVE-2017-1000117-test",
"owner": {
"login": "Shadow5523",
"id": 22784789,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22784789?v=4",
"html_url": "https:\/\/github.com\/Shadow5523"
},
"html_url": "https:\/\/github.com\/Shadow5523\/CVE-2017-1000117-test",
"description": "CVE-2017-1000117の検証",
"fork": false,
"created_at": "2017-08-15T12:24:57Z",
"updated_at": "2017-08-17T14:54:39Z",
"pushed_at": "2017-08-18T02:18:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100437085,
"name": "CVE-2017-1000117",
"full_name": "bells17\/CVE-2017-1000117",
"owner": {
"login": "bells17",
"id": 2158863,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2158863?v=4",
"html_url": "https:\/\/github.com\/bells17"
},
"html_url": "https:\/\/github.com\/bells17\/CVE-2017-1000117",
"description": "https:\/\/github.com\/greymd\/CVE-2017-1000117 の勉強用",
"fork": false,
"created_at": "2017-08-16T02:04:02Z",
"updated_at": "2017-10-13T17:48:19Z",
"pushed_at": "2017-08-16T09:35:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100437171,
"name": "CVE-2017-1000117",
"full_name": "ieee0824\/CVE-2017-1000117",
"owner": {
"login": "ieee0824",
"id": 5692475,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5692475?v=4",
"html_url": "https:\/\/github.com\/ieee0824"
},
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-16T02:05:08Z",
"updated_at": "2017-08-16T08:10:25Z",
"pushed_at": "2017-08-16T10:03:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 100445561,
"name": "CVE-2017-1000117",
"full_name": "rootclay\/CVE-2017-1000117",
"owner": {
"login": "rootclay",
"id": 29671471,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29671471?v=4",
"html_url": "https:\/\/github.com\/rootclay"
},
"html_url": "https:\/\/github.com\/rootclay\/CVE-2017-1000117",
"description": "CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-16T03:52:27Z",
"updated_at": "2017-08-16T04:00:53Z",
"pushed_at": "2017-08-16T06:14:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 100446125,
"name": "CVE-2017-1000117-sl",
"full_name": "ieee0824\/CVE-2017-1000117-sl",
"owner": {
"login": "ieee0824",
"id": 5692475,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5692475?v=4",
"html_url": "https:\/\/github.com\/ieee0824"
},
"html_url": "https:\/\/github.com\/ieee0824\/CVE-2017-1000117-sl",
"description": "Experiment of CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-16T04:01:08Z",
"updated_at": "2017-08-16T05:42:26Z",
"pushed_at": "2017-08-16T09:54:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100498924,
"name": "CVE-2017-1000117",
"full_name": "takehaya\/CVE-2017-1000117",
"owner": {
"login": "takehaya",
"id": 10973623,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10973623?v=4",
"html_url": "https:\/\/github.com\/takehaya"
},
"html_url": "https:\/\/github.com\/takehaya\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-16T14:34:37Z",
"updated_at": "2017-08-16T14:34:37Z",
"pushed_at": "2017-08-17T18:45:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 100544749,
"name": "CVE-2017-1000117",
"full_name": "ikmski\/CVE-2017-1000117",
"owner": {
"login": "ikmski",
"id": 6622579,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6622579?v=4",
"html_url": "https:\/\/github.com\/ikmski"
},
"html_url": "https:\/\/github.com\/ikmski\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-08-17T00:37:47Z",
"updated_at": "2017-08-17T00:37:47Z",
"pushed_at": "2017-08-17T00:57:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 100730507,
"name": "CVE-2017-1000117",
"full_name": "nkoneko\/CVE-2017-1000117",
"owner": {
"login": "nkoneko",
"id": 1922341,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1922341?v=4",
"html_url": "https:\/\/github.com\/nkoneko"
},
"html_url": "https:\/\/github.com\/nkoneko\/CVE-2017-1000117",
"description": "GitのCommand Injectionの脆弱性を利用してスクリプトを落として実行する例",
"fork": false,
"created_at": "2017-08-18T16:23:53Z",
"updated_at": "2018-06-27T07:59:10Z",
"pushed_at": "2017-08-18T16:30:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 100926724,
"name": "test",
"full_name": "chenzhuo0618\/test",
"owner": {
"login": "chenzhuo0618",
"id": 5562130,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5562130?v=4",
"html_url": "https:\/\/github.com\/chenzhuo0618"
},
"html_url": "https:\/\/github.com\/chenzhuo0618\/test",
"description": "test for CVE-2017-1000117",
"fork": false,
"created_at": "2017-08-21T07:46:16Z",
"updated_at": "2017-08-21T07:46:48Z",
"pushed_at": "2017-08-21T08:51:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 102318198,
"name": "CVE-2017-1000117",
"full_name": "siling2017\/CVE-2017-1000117",
"owner": {
"login": "siling2017",
"id": 27729343,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27729343?v=4",
"html_url": "https:\/\/github.com\/siling2017"
},
"html_url": "https:\/\/github.com\/siling2017\/CVE-2017-1000117",
"description": null,
"fork": false,
"created_at": "2017-09-04T04:18:19Z",
"updated_at": "2017-09-04T04:18:29Z",
"pushed_at": "2017-09-04T04:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 112913757,
"name": "CVE-2017-1000117",

View file

@ -0,0 +1,71 @@
[
{
"id": 92862379,
"name": "sudo-CVE-2017-1000367",
"full_name": "c0d3z3r0\/sudo-CVE-2017-1000367",
"owner": {
"login": "c0d3z3r0",
"id": 6205797,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6205797?v=4",
"html_url": "https:\/\/github.com\/c0d3z3r0"
},
"html_url": "https:\/\/github.com\/c0d3z3r0\/sudo-CVE-2017-1000367",
"description": null,
"fork": false,
"created_at": "2017-05-30T18:12:38Z",
"updated_at": "2020-12-12T08:21:34Z",
"pushed_at": "2017-06-05T19:53:35Z",
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 41,
"forks": 41,
"watchers": 114,
"score": 0
},
{
"id": 93312242,
"name": "CVE-2017-1000367",
"full_name": "homjxi0e\/CVE-2017-1000367",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-1000367",
"description": null,
"fork": false,
"created_at": "2017-06-04T12:31:59Z",
"updated_at": "2020-05-18T10:42:07Z",
"pushed_at": "2017-06-04T12:49:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 93726308,
"name": "sudo_exploit",
"full_name": "pucerpocok\/sudo_exploit",
"owner": {
"login": "pucerpocok",
"id": 25666150,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25666150?v=4",
"html_url": "https:\/\/github.com\/pucerpocok"
},
"html_url": "https:\/\/github.com\/pucerpocok\/sudo_exploit",
"description": "own implementation of the CVE-2017-1000367 sudo privilege escalation vulnerability in python",
"fork": false,
"created_at": "2017-06-08T08:37:38Z",
"updated_at": "2020-10-21T10:34:25Z",
"pushed_at": "2017-06-08T08:38:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-10661.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100021936,
"name": "CVE-2017-10661_POC",
"full_name": "GeneBlue\/CVE-2017-10661_POC",
"owner": {
"login": "GeneBlue",
"id": 10919709,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10919709?v=4",
"html_url": "https:\/\/github.com\/GeneBlue"
},
"html_url": "https:\/\/github.com\/GeneBlue\/CVE-2017-10661_POC",
"description": "poc for cve-2017-10661",
"fork": false,
"created_at": "2017-08-11T10:45:10Z",
"updated_at": "2020-12-17T10:26:55Z",
"pushed_at": "2017-08-11T10:45:56Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
}
]

25
2017/CVE-2017-11611.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 101361478,
"name": "Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"full_name": "faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"owner": {
"login": "faizzaidi",
"id": 12153050,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
"html_url": "https:\/\/github.com\/faizzaidi"
},
"html_url": "https:\/\/github.com\/faizzaidi\/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc",
"description": "WolfCMS-v0.8.3.1 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-11611",
"fork": false,
"created_at": "2017-08-25T03:19:05Z",
"updated_at": "2020-07-17T05:22:39Z",
"pushed_at": "2017-08-25T03:19:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-12426.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100264267,
"name": "CVE-2017-12426",
"full_name": "sm-paul-schuette\/CVE-2017-12426",
"owner": {
"login": "sm-paul-schuette",
"id": 29304646,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29304646?v=4",
"html_url": "https:\/\/github.com\/sm-paul-schuette"
},
"html_url": "https:\/\/github.com\/sm-paul-schuette\/CVE-2017-12426",
"description": null,
"fork": false,
"created_at": "2017-08-14T12:18:15Z",
"updated_at": "2017-08-14T12:18:15Z",
"pushed_at": "2017-08-14T12:19:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-12611.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102809812,
"name": "S2-053-CVE-2017-12611",
"full_name": "brianwrf\/S2-053-CVE-2017-12611",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/S2-053-CVE-2017-12611",
"description": "A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)",
"fork": false,
"created_at": "2017-09-08T02:50:37Z",
"updated_at": "2020-12-14T01:19:43Z",
"pushed_at": "2017-09-08T11:59:20Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 23,
"forks": 23,
"watchers": 38,
"score": 0
}
]

25
2017/CVE-2017-12792.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 107090388,
"name": "cve-2017-12792",
"full_name": "ZZS2017\/cve-2017-12792",
"owner": {
"login": "ZZS2017",
"id": 30464951,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30464951?v=4",
"html_url": "https:\/\/github.com\/ZZS2017"
},
"html_url": "https:\/\/github.com\/ZZS2017\/cve-2017-12792",
"description": "NexusPHP CSRF+XSS",
"fork": false,
"created_at": "2017-10-16T07:06:19Z",
"updated_at": "2019-11-21T10:28:20Z",
"pushed_at": "2017-08-21T09:38:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-14105.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102123441,
"name": "CVE-2017-14105",
"full_name": "theguly\/CVE-2017-14105",
"owner": {
"login": "theguly",
"id": 1745802,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1745802?v=4",
"html_url": "https:\/\/github.com\/theguly"
},
"html_url": "https:\/\/github.com\/theguly\/CVE-2017-14105",
"description": null,
"fork": false,
"created_at": "2017-09-01T14:51:31Z",
"updated_at": "2019-01-08T00:25:52Z",
"pushed_at": "2017-09-14T13:14:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-14262.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102810621,
"name": "CVE-2017-14262",
"full_name": "zzz66686\/CVE-2017-14262",
"owner": {
"login": "zzz66686",
"id": 14144972,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/14144972?v=4",
"html_url": "https:\/\/github.com\/zzz66686"
},
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14262",
"description": null,
"fork": false,
"created_at": "2017-09-08T02:59:21Z",
"updated_at": "2020-12-02T19:55:31Z",
"pushed_at": "2017-09-13T14:39:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
}
]

25
2017/CVE-2017-14263.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 102832029,
"name": "CVE-2017-14263",
"full_name": "zzz66686\/CVE-2017-14263",
"owner": {
"login": "zzz66686",
"id": 14144972,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/14144972?v=4",
"html_url": "https:\/\/github.com\/zzz66686"
},
"html_url": "https:\/\/github.com\/zzz66686\/CVE-2017-14263",
"description": null,
"fork": false,
"created_at": "2017-09-08T07:27:13Z",
"updated_at": "2020-05-18T10:42:14Z",
"pushed_at": "2017-09-13T14:40:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 6,
"forks": 6,
"watchers": 3,
"score": 0
}
]

25
2017/CVE-2017-2368.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100696664,
"name": "CVE-2017-2368",
"full_name": "vincedes3\/CVE-2017-2368",
"owner": {
"login": "vincedes3",
"id": 26314689,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26314689?v=4",
"html_url": "https:\/\/github.com\/vincedes3"
},
"html_url": "https:\/\/github.com\/vincedes3\/CVE-2017-2368",
"description": "CVE-2017-2368 VCF Message App Crash Bug",
"fork": false,
"created_at": "2017-08-18T09:33:57Z",
"updated_at": "2017-08-18T09:33:57Z",
"pushed_at": "2017-08-18T09:36:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,73 @@
[
{
"id": 80148945,
"name": "extra_recipe",
"full_name": "maximehip\/extra_recipe",
"owner": {
"login": "maximehip",
"id": 6273425,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6273425?v=4",
"html_url": "https:\/\/github.com\/maximehip"
},
"html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
"fork": false,
"created_at": "2017-01-26T19:47:43Z",
"updated_at": "2017-01-26T19:48:19Z",
"pushed_at": "2017-01-26T19:48:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 80717942,
"name": "extra_recipe",
"full_name": "JackBro\/extra_recipe",
"owner": {
"login": "JackBro",
"id": 21210712,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21210712?v=4",
"html_url": "https:\/\/github.com\/JackBro"
},
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
"fork": false,
"created_at": "2017-02-02T11:16:38Z",
"updated_at": "2017-10-14T08:34:32Z",
"pushed_at": "2017-01-27T17:44:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 81874110,
"name": "extra_recipe-iOS-10.2",
"full_name": "Rootkitsmm\/extra_recipe-iOS-10.2",
"owner": {
"login": "Rootkitsmm",
"id": 5567904,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5567904?v=4",
"html_url": "https:\/\/github.com\/Rootkitsmm"
},
"html_url": "https:\/\/github.com\/Rootkitsmm\/extra_recipe-iOS-10.2",
"description": "CVE-2017-2370",
"fork": false,
"created_at": "2017-02-13T21:32:40Z",
"updated_at": "2019-01-03T05:45:15Z",
"pushed_at": "2017-02-01T11:36:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 142854846,
"name": "CVE-2017-2370",

25
2017/CVE-2017-2388.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 99374230,
"name": "IOFireWireFamily-null-deref",
"full_name": "bazad\/IOFireWireFamily-null-deref",
"owner": {
"login": "bazad",
"id": 3111637,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3111637?v=4",
"html_url": "https:\/\/github.com\/bazad"
},
"html_url": "https:\/\/github.com\/bazad\/IOFireWireFamily-null-deref",
"description": "CVE-2017-2388: Null-pointer dereference in IOFireWireFamily.",
"fork": false,
"created_at": "2017-08-04T19:35:20Z",
"updated_at": "2018-09-24T18:54:13Z",
"pushed_at": "2017-08-16T20:16:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-2636.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 84497885,
"name": "cve-2017-2636-el",
"full_name": "alexzorin\/cve-2017-2636-el",
"owner": {
"login": "alexzorin",
"id": 311534,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/311534?v=4",
"html_url": "https:\/\/github.com\/alexzorin"
},
"html_url": "https:\/\/github.com\/alexzorin\/cve-2017-2636-el",
"description": "Ansible role for workaround for CVE-2017-2636 (Red Hat) - https:\/\/access.redhat.com\/security\/cve\/CVE-2017-2636",
"fork": false,
"created_at": "2017-03-09T23:20:42Z",
"updated_at": "2017-03-18T16:23:19Z",
"pushed_at": "2017-03-09T23:21:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-2671.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 93707325,
"name": "CVE-2017-2671",
"full_name": "homjxi0e\/CVE-2017-2671",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-2671",
"description": null,
"fork": false,
"created_at": "2017-06-08T04:28:31Z",
"updated_at": "2017-06-08T04:46:23Z",
"pushed_at": "2017-06-08T04:46:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-2793.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 95873037,
"name": "Detection-for-CVE-2017-2793",
"full_name": "sUbc0ol\/Detection-for-CVE-2017-2793",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Detection-for-CVE-2017-2793",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:32:42Z",
"updated_at": "2020-03-26T07:50:50Z",
"pushed_at": "2017-06-30T09:35:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-3078.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 95431299,
"name": "CVE-2017-3078",
"full_name": "homjxi0e\/CVE-2017-3078",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3078",
"description": null,
"fork": false,
"created_at": "2017-06-26T09:34:59Z",
"updated_at": "2017-06-26T09:34:59Z",
"pushed_at": "2017-06-26T09:49:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-3241.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 96219146,
"name": "CVE-2017-3241-POC",
"full_name": "xfei3\/CVE-2017-3241-POC",
"owner": {
"login": "xfei3",
"id": 29874084,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29874084?v=4",
"html_url": "https:\/\/github.com\/xfei3"
},
"html_url": "https:\/\/github.com\/xfei3\/CVE-2017-3241-POC",
"description": "POC for java RMI deserialization vulnerability",
"fork": false,
"created_at": "2017-07-04T13:05:46Z",
"updated_at": "2020-03-29T07:05:46Z",
"pushed_at": "2017-07-19T23:55:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-3599.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 88650555,
"name": "CVE-2017-3599",
"full_name": "SECFORCE\/CVE-2017-3599",
"owner": {
"login": "SECFORCE",
"id": 8157384,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8157384?v=4",
"html_url": "https:\/\/github.com\/SECFORCE"
},
"html_url": "https:\/\/github.com\/SECFORCE\/CVE-2017-3599",
"description": "Proof of concept exploit for CVE-2017-3599",
"fork": false,
"created_at": "2017-04-18T17:08:39Z",
"updated_at": "2020-08-03T19:51:16Z",
"pushed_at": "2017-04-18T17:10:18Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 18,
"forks": 18,
"watchers": 17,
"score": 0
}
]

48
2017/CVE-2017-3730.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 79682713,
"name": "CVE-2017-3730",
"full_name": "guidovranken\/CVE-2017-3730",
"owner": {
"login": "guidovranken",
"id": 6846644,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6846644?v=4",
"html_url": "https:\/\/github.com\/guidovranken"
},
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
"fork": false,
"created_at": "2017-01-22T00:40:34Z",
"updated_at": "2018-12-04T20:01:55Z",
"pushed_at": "2017-01-26T01:30:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
{
"id": 97466064,
"name": "OpenSSL-CVE-2017-3730",
"full_name": "ymmah\/OpenSSL-CVE-2017-3730",
"owner": {
"login": "ymmah",
"id": 22575313,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22575313?v=4",
"html_url": "https:\/\/github.com\/ymmah"
},
"html_url": "https:\/\/github.com\/ymmah\/OpenSSL-CVE-2017-3730",
"description": "挑戰 (U+8101): OpenSSL CVE-2017-3730 proof-of-concept",
"fork": false,
"created_at": "2017-07-17T10:51:09Z",
"updated_at": "2017-07-17T11:09:15Z",
"pushed_at": "2017-07-17T10:51:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,96 @@
[
{
"id": 87763747,
"name": "cisco-rce",
"full_name": "artkond\/cisco-rce",
"owner": {
"login": "artkond",
"id": 4436674,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4436674?v=4",
"html_url": "https:\/\/github.com\/artkond"
},
"html_url": "https:\/\/github.com\/artkond\/cisco-rce",
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2020-12-10T07:44:34Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 81,
"forks": 81,
"watchers": 172,
"score": 0
},
{
"id": 88804675,
"name": "CVE-2017-3881-exploit-cisco-",
"full_name": "homjxi0e\/CVE-2017-3881-exploit-cisco-",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3881-exploit-cisco-",
"description": null,
"fork": false,
"created_at": "2017-04-20T00:52:10Z",
"updated_at": "2020-04-07T06:31:35Z",
"pushed_at": "2017-04-20T00:52:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
},
{
"id": 90087111,
"name": "CVE-2017-3881-Cisco",
"full_name": "homjxi0e\/CVE-2017-3881-Cisco",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-3881-Cisco",
"description": null,
"fork": false,
"created_at": "2017-05-02T23:21:53Z",
"updated_at": "2017-05-02T23:28:05Z",
"pushed_at": "2017-05-02T23:28:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 90975256,
"name": "PoC-CVE-2017-3881",
"full_name": "zakybstrd21215\/PoC-CVE-2017-3881",
"owner": {
"login": "zakybstrd21215",
"id": 22362343,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4",
"html_url": "https:\/\/github.com\/zakybstrd21215"
},
"html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-3881",
"description": "Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-05-11T12:11:51Z",
"updated_at": "2017-05-11T12:16:43Z",
"pushed_at": "2017-05-11T13:52:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 115962692,
"name": "CVE-2017-3881",

48
2017/CVE-2017-4490.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 89991237,
"name": "CVE-2017-4490-",
"full_name": "homjxi0e\/CVE-2017-4490-",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-",
"description": null,
"fork": false,
"created_at": "2017-05-02T04:21:46Z",
"updated_at": "2017-08-23T09:25:02Z",
"pushed_at": "2017-07-10T23:37:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 96573883,
"name": "CVE-2017-4490-install-Script-Python-in-Terminal-",
"full_name": "homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-4490-install-Script-Python-in-Terminal-",
"description": null,
"fork": false,
"created_at": "2017-07-07T20:21:51Z",
"updated_at": "2017-08-23T09:24:55Z",
"pushed_at": "2017-07-11T15:36:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-5005.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 77828551,
"name": "QuickHeal",
"full_name": "payatu\/QuickHeal",
"owner": {
"login": "payatu",
"id": 16715624,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4",
"html_url": "https:\/\/github.com\/payatu"
},
"html_url": "https:\/\/github.com\/payatu\/QuickHeal",
"description": "CVE-2017-5005 for Quick Heal Antivirus",
"fork": false,
"created_at": "2017-01-02T11:21:00Z",
"updated_at": "2020-03-27T02:45:54Z",
"pushed_at": "2017-03-31T14:49:28Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 8,
"forks": 8,
"watchers": 16,
"score": 0
}
]

25
2017/CVE-2017-5415.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 88234209,
"name": "CVE-2017-5415",
"full_name": "649\/CVE-2017-5415",
"owner": {
"login": "649",
"id": 23534047,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23534047?v=4",
"html_url": "https:\/\/github.com\/649"
},
"html_url": "https:\/\/github.com\/649\/CVE-2017-5415",
"description": "Addressbar spoofing through blob URL (Firefox browser). An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by blob: as the protocol, leading to user confusion and further spoofing attacks.",
"fork": false,
"created_at": "2017-04-14T04:55:41Z",
"updated_at": "2020-07-12T20:54:15Z",
"pushed_at": "2017-04-14T04:55:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 7,
"forks": 7,
"watchers": 5,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 107852472,
"name": "wpUsersScan",
"full_name": "teambugsbunny\/wpUsersScan",
"owner": {
"login": "teambugsbunny",
"id": 32997799,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32997799?v=4",
"html_url": "https:\/\/github.com\/teambugsbunny"
},
"html_url": "https:\/\/github.com\/teambugsbunny\/wpUsersScan",
"description": "Wordpress Username Enumeration \/CVE-2017-5487,WordPress < 4.7.1 - ",
"fork": false,
"created_at": "2017-10-22T09:22:28Z",
"updated_at": "2020-04-06T12:23:41Z",
"pushed_at": "2017-06-11T16:47:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 121831599,
"name": "wpUsersScan",

25
2017/CVE-2017-5633.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 88568725,
"name": "Exploit-CVE-2017-5633",
"full_name": "cardangi\/Exploit-CVE-2017-5633",
"owner": {
"login": "cardangi",
"id": 22066466,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22066466?v=4",
"html_url": "https:\/\/github.com\/cardangi"
},
"html_url": "https:\/\/github.com\/cardangi\/Exploit-CVE-2017-5633",
"description": "Exploit developed by me for CVE-2017-5633.",
"fork": false,
"created_at": "2017-04-18T01:44:33Z",
"updated_at": "2020-04-07T06:34:50Z",
"pushed_at": "2017-04-18T02:54:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,303 @@
[
{
"id": 84158718,
"name": "S2-045",
"full_name": "PolarisLab\/S2-045",
"owner": {
"login": "PolarisLab",
"id": 25890110,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25890110?v=4",
"html_url": "https:\/\/github.com\/PolarisLab"
},
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
"description": "Struts2 S2-045CVE-2017-5638Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
"fork": false,
"created_at": "2017-03-07T05:30:30Z",
"updated_at": "2020-09-22T06:33:06Z",
"pushed_at": "2017-03-07T05:37:55Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 12,
"forks": 12,
"watchers": 23,
"score": 0
},
{
"id": 84186490,
"name": "Struts2-045-Exp",
"full_name": "Flyteas\/Struts2-045-Exp",
"owner": {
"login": "Flyteas",
"id": 15673913,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15673913?v=4",
"html_url": "https:\/\/github.com\/Flyteas"
},
"html_url": "https:\/\/github.com\/Flyteas\/Struts2-045-Exp",
"description": "Struts2 S2-045CVE-2017-5638Exp with GUI",
"fork": false,
"created_at": "2017-03-07T10:30:20Z",
"updated_at": "2020-09-11T23:13:21Z",
"pushed_at": "2017-03-13T06:30:41Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 29,
"forks": 29,
"watchers": 60,
"score": 0
},
{
"id": 84277596,
"name": "cve-2017-5638",
"full_name": "bongbongco\/cve-2017-5638",
"owner": {
"login": "bongbongco",
"id": 3170006,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3170006?v=4",
"html_url": "https:\/\/github.com\/bongbongco"
},
"html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-08T04:17:33Z",
"updated_at": "2017-03-08T04:31:28Z",
"pushed_at": "2017-03-08T04:31:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 84481525,
"name": "S2-045-EXP-POC-TOOLS",
"full_name": "jas502n\/S2-045-EXP-POC-TOOLS",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/S2-045-EXP-POC-TOOLS",
"description": "S2-045 漏洞 POC-TOOLS CVE-2017-5638",
"fork": false,
"created_at": "2017-03-09T19:40:47Z",
"updated_at": "2020-10-24T13:59:45Z",
"pushed_at": "2017-03-09T19:50:50Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 21,
"forks": 21,
"watchers": 21,
"score": 0
},
{
"id": 84518902,
"name": "strutszeiro",
"full_name": "mthbernardes\/strutszeiro",
"owner": {
"login": "mthbernardes",
"id": 12648924,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12648924?v=4",
"html_url": "https:\/\/github.com\/mthbernardes"
},
"html_url": "https:\/\/github.com\/mthbernardes\/strutszeiro",
"description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)",
"fork": false,
"created_at": "2017-03-10T04:23:41Z",
"updated_at": "2020-05-11T01:31:47Z",
"pushed_at": "2020-12-15T17:20:02Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 27,
"forks": 27,
"watchers": 38,
"score": 0
},
{
"id": 84581800,
"name": "cve-2017-5638",
"full_name": "xsscx\/cve-2017-5638",
"owner": {
"login": "xsscx",
"id": 10790582,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/10790582?v=4",
"html_url": "https:\/\/github.com\/xsscx"
},
"html_url": "https:\/\/github.com\/xsscx\/cve-2017-5638",
"description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ",
"fork": false,
"created_at": "2017-03-10T16:56:14Z",
"updated_at": "2020-12-25T10:03:50Z",
"pushed_at": "2017-03-12T15:43:27Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 21,
"forks": 21,
"watchers": 13,
"score": 0
},
{
"id": 84602394,
"name": "apache-struts2-CVE-2017-5638",
"full_name": "immunio\/apache-struts2-CVE-2017-5638",
"owner": {
"login": "immunio",
"id": 6700387,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6700387?v=4",
"html_url": "https:\/\/github.com\/immunio"
},
"html_url": "https:\/\/github.com\/immunio\/apache-struts2-CVE-2017-5638",
"description": "Demo Application and Exploit",
"fork": false,
"created_at": "2017-03-10T21:33:25Z",
"updated_at": "2020-11-24T15:40:19Z",
"pushed_at": "2017-03-13T15:03:32Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 36,
"forks": 36,
"watchers": 36,
"score": 0
},
{
"id": 84620334,
"name": "OgnlContentTypeRejectorValve",
"full_name": "Masahiro-Yamada\/OgnlContentTypeRejectorValve",
"owner": {
"login": "Masahiro-Yamada",
"id": 479387,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/479387?v=4",
"html_url": "https:\/\/github.com\/Masahiro-Yamada"
},
"html_url": "https:\/\/github.com\/Masahiro-Yamada\/OgnlContentTypeRejectorValve",
"description": "This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)",
"fork": false,
"created_at": "2017-03-11T03:18:12Z",
"updated_at": "2017-04-11T00:06:36Z",
"pushed_at": "2017-03-13T14:49:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 84639178,
"name": "CVE-2017-5638-Apache-Struts2",
"full_name": "aljazceru\/CVE-2017-5638-Apache-Struts2",
"owner": {
"login": "aljazceru",
"id": 4439523,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4439523?v=4",
"html_url": "https:\/\/github.com\/aljazceru"
},
"html_url": "https:\/\/github.com\/aljazceru\/CVE-2017-5638-Apache-Struts2",
"description": "Tweaking original PoC (https:\/\/github.com\/rapid7\/metasploit-framework\/issues\/8064) to work on self-signed certificates ",
"fork": false,
"created_at": "2017-03-11T09:39:09Z",
"updated_at": "2019-07-15T22:02:37Z",
"pushed_at": "2017-03-11T09:41:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 84640546,
"name": "test_struts2_vulnerability_CVE-2017-5638",
"full_name": "sjitech\/test_struts2_vulnerability_CVE-2017-5638",
"owner": {
"login": "sjitech",
"id": 5180638,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5180638?v=4",
"html_url": "https:\/\/github.com\/sjitech"
},
"html_url": "https:\/\/github.com\/sjitech\/test_struts2_vulnerability_CVE-2017-5638",
"description": "test struts2 vulnerability CVE-2017-5638 in Mac OS X",
"fork": false,
"created_at": "2017-03-11T10:03:54Z",
"updated_at": "2017-03-13T11:14:00Z",
"pushed_at": "2017-03-13T07:38:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 84642680,
"name": "CVE-2017-5638",
"full_name": "jrrombaldo\/CVE-2017-5638",
"owner": {
"login": "jrrombaldo",
"id": 121948,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/121948?v=4",
"html_url": "https:\/\/github.com\/jrrombaldo"
},
"html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-11T10:43:16Z",
"updated_at": "2017-03-11T13:07:57Z",
"pushed_at": "2017-03-24T19:12:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 84644857,
"name": "CVE-2017-5638",
"full_name": "random-robbie\/CVE-2017-5638",
"owner": {
"login": "random-robbie",
"id": 4902869,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4902869?v=4",
"html_url": "https:\/\/github.com\/random-robbie"
},
"html_url": "https:\/\/github.com\/random-robbie\/CVE-2017-5638",
"description": "CVE: 2017-5638 in different formats",
"fork": false,
"created_at": "2017-03-11T11:22:44Z",
"updated_at": "2017-03-11T11:28:58Z",
"pushed_at": "2017-03-16T11:26:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 84655941,
"name": "CVE-2017-5638_struts",
"full_name": "initconf\/CVE-2017-5638_struts",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf"
},
"html_url": "https:\/\/github.com\/initconf\/CVE-2017-5638_struts",
"description": "detection for Apache Struts recon and compromise ",
"fork": false,
"created_at": "2017-03-11T14:30:02Z",
"updated_at": "2020-04-13T02:20:20Z",
"pushed_at": "2017-09-15T22:34:00Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 84693026,
"name": "struts-pwn",
@ -22,6 +321,167 @@
"watchers": 380,
"score": 0
},
{
"id": 84705148,
"name": "Struts-Apache-ExploitPack",
"full_name": "ret2jazzy\/Struts-Apache-ExploitPack",
"owner": {
"login": "ret2jazzy",
"id": 20831187,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20831187?v=4",
"html_url": "https:\/\/github.com\/ret2jazzy"
},
"html_url": "https:\/\/github.com\/ret2jazzy\/Struts-Apache-ExploitPack",
"description": "These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)",
"fork": false,
"created_at": "2017-03-12T06:28:51Z",
"updated_at": "2020-12-09T00:15:03Z",
"pushed_at": "2017-03-12T07:26:03Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 13,
"forks": 13,
"watchers": 15,
"score": 0
},
{
"id": 84725982,
"name": "ExpStruts",
"full_name": "lolwaleet\/ExpStruts",
"owner": {
"login": "lolwaleet",
"id": 20018319,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20018319?v=4",
"html_url": "https:\/\/github.com\/lolwaleet"
},
"html_url": "https:\/\/github.com\/lolwaleet\/ExpStruts",
"description": "A php based exploiter for CVE-2017-5638.",
"fork": false,
"created_at": "2017-03-12T13:03:52Z",
"updated_at": "2020-03-15T16:58:21Z",
"pushed_at": "2017-03-12T13:04:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 84819853,
"name": "CVE-2017-5638-Apache-Struts2",
"full_name": "oktavianto\/CVE-2017-5638-Apache-Struts2",
"owner": {
"login": "oktavianto",
"id": 8210275,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8210275?v=4",
"html_url": "https:\/\/github.com\/oktavianto"
},
"html_url": "https:\/\/github.com\/oktavianto\/CVE-2017-5638-Apache-Struts2",
"description": "Example PHP Exploiter for CVE-2017-5638",
"fork": false,
"created_at": "2017-03-13T11:39:55Z",
"updated_at": "2020-04-07T06:38:46Z",
"pushed_at": "2017-03-20T19:40:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
},
{
"id": 85010282,
"name": "cve-2017-5638",
"full_name": "jrrdev\/cve-2017-5638",
"owner": {
"login": "jrrdev",
"id": 17674081,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17674081?v=4",
"html_url": "https:\/\/github.com\/jrrdev"
},
"html_url": "https:\/\/github.com\/jrrdev\/cve-2017-5638",
"description": "cve-2017-5638 Vulnerable site sample",
"fork": false,
"created_at": "2017-03-15T00:19:33Z",
"updated_at": "2020-05-19T19:36:03Z",
"pushed_at": "2017-04-04T19:57:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 9,
"forks": 9,
"watchers": 11,
"score": 0
},
{
"id": 85145901,
"name": "Strutshock",
"full_name": "opt9\/Strutshock",
"owner": {
"login": "opt9",
"id": 192655,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4",
"html_url": "https:\/\/github.com\/opt9"
},
"html_url": "https:\/\/github.com\/opt9\/Strutshock",
"description": "Struts2 RCE CVE-2017-5638 non-intrusive check shell script",
"fork": false,
"created_at": "2017-03-16T02:59:22Z",
"updated_at": "2017-05-04T20:58:47Z",
"pushed_at": "2017-03-16T04:02:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 85341283,
"name": "StrutsShell",
"full_name": "falcon-lnhg\/StrutsShell",
"owner": {
"login": "falcon-lnhg",
"id": 5199658,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5199658?v=4",
"html_url": "https:\/\/github.com\/falcon-lnhg"
},
"html_url": "https:\/\/github.com\/falcon-lnhg\/StrutsShell",
"description": "Apache Struts (CVE-2017-5638) Shell",
"fork": false,
"created_at": "2017-03-17T18:05:55Z",
"updated_at": "2017-08-31T21:27:12Z",
"pushed_at": "2017-04-04T16:11:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 85390529,
"name": "CVE-2017-5638",
"full_name": "bhagdave\/CVE-2017-5638",
"owner": {
"login": "bhagdave",
"id": 3230037,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3230037?v=4",
"html_url": "https:\/\/github.com\/bhagdave"
},
"html_url": "https:\/\/github.com\/bhagdave\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-18T09:39:59Z",
"updated_at": "2017-03-19T01:25:24Z",
"pushed_at": "2017-03-21T21:53:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 85664016,
"name": "st2-046-poc",
@ -45,6 +505,98 @@
"watchers": 21,
"score": 0
},
{
"id": 85733752,
"name": "S2-046_S2-045_POC",
"full_name": "KarzsGHR\/S2-046_S2-045_POC",
"owner": {
"login": "KarzsGHR",
"id": 12841587,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12841587?v=4",
"html_url": "https:\/\/github.com\/KarzsGHR"
},
"html_url": "https:\/\/github.com\/KarzsGHR\/S2-046_S2-045_POC",
"description": "S2-046|S2-045: Struts 2 Remote Code Execution vulnerabilityCVE-2017-5638",
"fork": false,
"created_at": "2017-03-21T17:36:40Z",
"updated_at": "2019-11-20T02:42:35Z",
"pushed_at": "2017-04-26T09:12:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 85926594,
"name": "S2-Reaper",
"full_name": "gsfish\/S2-Reaper",
"owner": {
"login": "gsfish",
"id": 15968154,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15968154?v=4",
"html_url": "https:\/\/github.com\/gsfish"
},
"html_url": "https:\/\/github.com\/gsfish\/S2-Reaper",
"description": "CVE-2017-5638",
"fork": false,
"created_at": "2017-03-23T08:44:10Z",
"updated_at": "2017-03-30T09:51:23Z",
"pushed_at": "2017-03-30T10:06:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 86200933,
"name": "cve-2017-5638",
"full_name": "mcassano\/cve-2017-5638",
"owner": {
"login": "mcassano",
"id": 2073030,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2073030?v=4",
"html_url": "https:\/\/github.com\/mcassano"
},
"html_url": "https:\/\/github.com\/mcassano\/cve-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-26T01:58:52Z",
"updated_at": "2017-03-26T02:00:58Z",
"pushed_at": "2017-04-01T04:20:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 86415022,
"name": "Strutscli",
"full_name": "opt9\/Strutscli",
"owner": {
"login": "opt9",
"id": 192655,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4",
"html_url": "https:\/\/github.com\/opt9"
},
"html_url": "https:\/\/github.com\/opt9\/Strutscli",
"description": "Struts2 RCE CVE-2017-5638 CLI shell",
"fork": false,
"created_at": "2017-03-28T04:31:44Z",
"updated_at": "2017-04-14T08:03:48Z",
"pushed_at": "2017-03-28T04:36:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 87695524,
"name": "strutsy",
@ -68,6 +620,52 @@
"watchers": 11,
"score": 0
},
{
"id": 90377429,
"name": "CVE-2017-5638",
"full_name": "payatu\/CVE-2017-5638",
"owner": {
"login": "payatu",
"id": 16715624,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4",
"html_url": "https:\/\/github.com\/payatu"
},
"html_url": "https:\/\/github.com\/payatu\/CVE-2017-5638",
"description": "Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header ",
"fork": false,
"created_at": "2017-05-05T13:17:37Z",
"updated_at": "2020-03-27T02:45:32Z",
"pushed_at": "2017-05-05T13:55:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 92562840,
"name": "Struts2-045-Exp",
"full_name": "Aasron\/Struts2-045-Exp",
"owner": {
"login": "Aasron",
"id": 17878407,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17878407?v=4",
"html_url": "https:\/\/github.com\/Aasron"
},
"html_url": "https:\/\/github.com\/Aasron\/Struts2-045-Exp",
"description": "CVE-2017-5638",
"fork": false,
"created_at": "2017-05-27T02:03:28Z",
"updated_at": "2017-05-27T02:33:31Z",
"pushed_at": "2017-06-01T09:53:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 92638419,
"name": "Stutsfi",
@ -91,6 +689,236 @@
"watchers": 0,
"score": 0
},
{
"id": 92644725,
"name": "Struts2Shell",
"full_name": "jpacora\/Struts2Shell",
"owner": {
"login": "jpacora",
"id": 2137673,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2137673?v=4",
"html_url": "https:\/\/github.com\/jpacora"
},
"html_url": "https:\/\/github.com\/jpacora\/Struts2Shell",
"description": "An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.",
"fork": false,
"created_at": "2017-05-28T06:44:13Z",
"updated_at": "2017-05-28T06:44:27Z",
"pushed_at": "2017-06-03T06:33:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 93442387,
"name": "CVE-2017-5638",
"full_name": "AndreasKl\/CVE-2017-5638",
"owner": {
"login": "AndreasKl",
"id": 1105899,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1105899?v=4",
"html_url": "https:\/\/github.com\/AndreasKl"
},
"html_url": "https:\/\/github.com\/AndreasKl\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-06-05T20:11:06Z",
"updated_at": "2020-10-14T14:40:32Z",
"pushed_at": "2017-06-05T21:43:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 93710291,
"name": "struts-rce-cve-2017-5638",
"full_name": "riyazwalikar\/struts-rce-cve-2017-5638",
"owner": {
"login": "riyazwalikar",
"id": 1900486,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1900486?v=4",
"html_url": "https:\/\/github.com\/riyazwalikar"
},
"html_url": "https:\/\/github.com\/riyazwalikar\/struts-rce-cve-2017-5638",
"description": "Struts-RCE CVE-2017-5638",
"fork": false,
"created_at": "2017-06-08T05:22:31Z",
"updated_at": "2017-06-08T08:18:51Z",
"pushed_at": "2017-06-08T05:25:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 93794473,
"name": "CVE-2017-5638",
"full_name": "homjxi0e\/CVE-2017-5638",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-06-08T21:47:11Z",
"updated_at": "2017-06-08T21:47:11Z",
"pushed_at": "2017-06-08T21:48:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 94180453,
"name": "CVE-2017-5638",
"full_name": "eeehit\/CVE-2017-5638",
"owner": {
"login": "eeehit",
"id": 22052276,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22052276?v=4",
"html_url": "https:\/\/github.com\/eeehit"
},
"html_url": "https:\/\/github.com\/eeehit\/CVE-2017-5638",
"description": "CVE-2017-5638 Test environment",
"fork": false,
"created_at": "2017-06-13T06:59:15Z",
"updated_at": "2017-06-13T07:07:06Z",
"pushed_at": "2017-06-13T07:00:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 95873695,
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"full_name": "sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:40:31Z",
"updated_at": "2020-03-26T07:50:37Z",
"pushed_at": "2017-06-30T09:41:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 95874930,
"name": "Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"full_name": "sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:55:41Z",
"updated_at": "2020-03-26T07:49:41Z",
"pushed_at": "2017-06-30T09:57:01Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"forks": 8,
"watchers": 14,
"score": 0
},
{
"id": 98150795,
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"owner": {
"login": "R4v3nBl4ck",
"id": 30399308,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30399308?v=4",
"html_url": "https:\/\/github.com\/R4v3nBl4ck"
},
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
"description": "Exploit created by: R4v3nBl4ck end Pacman",
"fork": false,
"created_at": "2017-07-24T05:05:28Z",
"updated_at": "2020-07-12T14:06:08Z",
"pushed_at": "2017-07-24T23:55:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"forks": 6,
"watchers": 4,
"score": 0
},
{
"id": 100141854,
"name": "CVE-2017-5638",
"full_name": "Xhendos\/CVE-2017-5638",
"owner": {
"login": "Xhendos",
"id": 16403693,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16403693?v=4",
"html_url": "https:\/\/github.com\/Xhendos"
},
"html_url": "https:\/\/github.com\/Xhendos\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-08-12T23:00:14Z",
"updated_at": "2017-08-12T23:04:13Z",
"pushed_at": "2017-08-26T17:32:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 101267457,
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"full_name": "TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"owner": {
"login": "TamiiLambrado",
"id": 23249848,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23249848?v=4",
"html_url": "https:\/\/github.com\/TamiiLambrado"
},
"html_url": "https:\/\/github.com\/TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"description": null,
"fork": false,
"created_at": "2017-08-24T07:36:14Z",
"updated_at": "2017-08-24T07:36:14Z",
"pushed_at": "2017-08-24T07:36:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 104686879,
"name": "strutser",
@ -137,6 +965,29 @@
"watchers": 0,
"score": 0
},
{
"id": 107489354,
"name": "Apache-Struts",
"full_name": "c002\/Apache-Struts",
"owner": {
"login": "c002",
"id": 26592580,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26592580?v=4",
"html_url": "https:\/\/github.com\/c002"
},
"html_url": "https:\/\/github.com\/c002\/Apache-Struts",
"description": " An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-10-19T02:40:45Z",
"updated_at": "2020-05-17T04:32:06Z",
"pushed_at": "2017-05-28T14:03:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 108805305,
"name": "Common-Vulnerability-and-Exploit",

View file

@ -1,4 +1,27 @@
[
{
"id": 90210170,
"name": "CVE-2017-5689",
"full_name": "CerberusSecurity\/CVE-2017-5689",
"owner": {
"login": "CerberusSecurity",
"id": 21088337,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21088337?v=4",
"html_url": "https:\/\/github.com\/CerberusSecurity"
},
"html_url": "https:\/\/github.com\/CerberusSecurity\/CVE-2017-5689",
"description": null,
"fork": false,
"created_at": "2017-05-04T01:51:26Z",
"updated_at": "2020-01-01T00:38:18Z",
"pushed_at": "2017-05-04T03:06:32Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 10,
"forks": 10,
"watchers": 39,
"score": 0
},
{
"id": 90472957,
"name": "amthoneypot",
@ -21,5 +44,51 @@
"forks": 5,
"watchers": 13,
"score": 0
},
{
"id": 90724328,
"name": "intel_amt_bypass",
"full_name": "Bijaye\/intel_amt_bypass",
"owner": {
"login": "Bijaye",
"id": 4318412,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4318412?v=4",
"html_url": "https:\/\/github.com\/Bijaye"
},
"html_url": "https:\/\/github.com\/Bijaye\/intel_amt_bypass",
"description": "simple python poc for CVE-2017-5689",
"fork": false,
"created_at": "2017-05-09T08:55:39Z",
"updated_at": "2020-07-05T02:24:05Z",
"pushed_at": "2017-05-09T00:42:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 7,
"forks": 7,
"watchers": 3,
"score": 0
},
{
"id": 98579784,
"name": "amt_auth_bypass_poc",
"full_name": "embedi\/amt_auth_bypass_poc",
"owner": {
"login": "embedi",
"id": 24190344,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24190344?v=4",
"html_url": "https:\/\/github.com\/embedi"
},
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
"description": "CVE-2017-5689 Proof-of-Concept exploit",
"fork": false,
"created_at": "2017-07-27T21:06:08Z",
"updated_at": "2020-05-17T13:44:14Z",
"pushed_at": "2017-07-27T21:08:49Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 16,
"forks": 16,
"watchers": 50,
"score": 0
}
]

25
2017/CVE-2017-6370.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 85539985,
"name": "TYPO3-v7.6.15-Unencrypted-Login-Request",
"full_name": "faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request",
"owner": {
"login": "faizzaidi",
"id": 12153050,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
"html_url": "https:\/\/github.com\/faizzaidi"
},
"html_url": "https:\/\/github.com\/faizzaidi\/TYPO3-v7.6.15-Unencrypted-Login-Request",
"description": "TYPO3 v7.6.15 Unencrypted Login Request Assigned CVE Number: CVE-2017-6370",
"fork": false,
"created_at": "2017-03-20T05:51:07Z",
"updated_at": "2020-07-17T05:22:53Z",
"pushed_at": "2017-03-20T05:51:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 87749039,
"name": "nfsen-exploit",
"full_name": "patrickfreed\/nfsen-exploit",
"owner": {
"login": "patrickfreed",
"id": 936020,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/936020?v=4",
"html_url": "https:\/\/github.com\/patrickfreed"
},
"html_url": "https:\/\/github.com\/patrickfreed\/nfsen-exploit",
"description": "Exploit for CVE-2017-6971 remote command execution in nfsen 1.3.7.",
"fork": false,
"created_at": "2017-04-10T00:13:24Z",
"updated_at": "2020-04-07T06:36:25Z",
"pushed_at": "2017-04-10T16:06:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 8,
"forks": 8,
"watchers": 4,
"score": 0
},
{
"id": 183134145,
"name": "nfsen_1.3.7_CVE-2017-6971",

48
2017/CVE-2017-7047.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 99396176,
"name": "Triple_Fetch-Kernel-Creds",
"full_name": "JosephShenton\/Triple_Fetch-Kernel-Creds",
"owner": {
"login": "JosephShenton",
"id": 12966231,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12966231?v=4",
"html_url": "https:\/\/github.com\/JosephShenton"
},
"html_url": "https:\/\/github.com\/JosephShenton\/Triple_Fetch-Kernel-Creds",
"description": "Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)",
"fork": false,
"created_at": "2017-08-05T03:23:13Z",
"updated_at": "2020-08-25T15:10:04Z",
"pushed_at": "2017-08-05T09:21:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"score": 0
},
{
"id": 99915573,
"name": "Triple_fetch",
"full_name": "q1f3\/Triple_fetch",
"owner": {
"login": "q1f3",
"id": 9603950,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9603950?v=4",
"html_url": "https:\/\/github.com\/q1f3"
},
"html_url": "https:\/\/github.com\/q1f3\/Triple_fetch",
"description": "This is an exploit for CVE-2017-7047, Works on 10.3.2 and below.",
"fork": false,
"created_at": "2017-08-10T11:24:47Z",
"updated_at": "2020-04-07T05:58:43Z",
"pushed_at": "2017-08-03T23:47:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-7188.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 87800336,
"name": "Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC",
"full_name": "faizzaidi\/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC",
"owner": {
"login": "faizzaidi",
"id": 12153050,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
"html_url": "https:\/\/github.com\/faizzaidi"
},
"html_url": "https:\/\/github.com\/faizzaidi\/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC",
"description": "Zurmo-Stable-3.1.1 Cross Site Scripting (XSS) Assigned CVE Number: CVE-2017-7188",
"fork": false,
"created_at": "2017-04-10T10:52:13Z",
"updated_at": "2020-07-17T05:22:49Z",
"pushed_at": "2017-04-10T10:52:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 86543900,
"name": "webdav_exploit",
"full_name": "eliuha\/webdav_exploit",
"owner": {
"login": "eliuha",
"id": 2240516,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2240516?v=4",
"html_url": "https:\/\/github.com\/eliuha"
},
"html_url": "https:\/\/github.com\/eliuha\/webdav_exploit",
"description": "An exploit for Microsoft IIS 6.0 CVE-2017-7269",
"fork": false,
"created_at": "2017-03-29T05:59:30Z",
"updated_at": "2020-07-12T14:05:27Z",
"pushed_at": "2017-03-29T07:26:41Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 16,
"forks": 16,
"watchers": 16,
"score": 0
},
{
"id": 86573461,
"name": "CVE-2017-7269-Echo-PoC",
@ -22,6 +45,236 @@
"watchers": 84,
"score": 0
},
{
"id": 86581754,
"name": "CVE-2017-7269-exploit",
"full_name": "caicai1355\/CVE-2017-7269-exploit",
"owner": {
"login": "caicai1355",
"id": 24385053,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24385053?v=4",
"html_url": "https:\/\/github.com\/caicai1355"
},
"html_url": "https:\/\/github.com\/caicai1355\/CVE-2017-7269-exploit",
"description": "exec 8 bytes command",
"fork": false,
"created_at": "2017-03-29T12:52:54Z",
"updated_at": "2020-04-07T06:37:12Z",
"pushed_at": "2017-03-29T13:08:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 7,
"forks": 7,
"watchers": 2,
"score": 0
},
{
"id": 86659284,
"name": "CVE-2017-7269",
"full_name": "M1a0rz\/CVE-2017-7269",
"owner": {
"login": "M1a0rz",
"id": 25101765,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25101765?v=4",
"html_url": "https:\/\/github.com\/M1a0rz"
},
"html_url": "https:\/\/github.com\/M1a0rz\/CVE-2017-7269",
"description": "Poc for iis6.0",
"fork": false,
"created_at": "2017-03-30T04:35:13Z",
"updated_at": "2017-03-30T04:35:13Z",
"pushed_at": "2017-03-30T04:35:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 86697845,
"name": "cve-2017-7269picture",
"full_name": "whiteHat001\/cve-2017-7269picture",
"owner": {
"login": "whiteHat001",
"id": 18191034,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18191034?v=4",
"html_url": "https:\/\/github.com\/whiteHat001"
},
"html_url": "https:\/\/github.com\/whiteHat001\/cve-2017-7269picture",
"description": null,
"fork": false,
"created_at": "2017-03-30T12:03:05Z",
"updated_at": "2017-03-30T12:03:05Z",
"pushed_at": "2017-03-30T12:11:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 86754251,
"name": "cve-2017-7269",
"full_name": "zcgonvh\/cve-2017-7269",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/cve-2017-7269",
"description": "fixed msf module for cve-2017-7269",
"fork": false,
"created_at": "2017-03-30T22:20:36Z",
"updated_at": "2020-11-20T13:23:42Z",
"pushed_at": "2017-03-30T22:20:51Z",
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 61,
"forks": 61,
"watchers": 110,
"score": 0
},
{
"id": 87165305,
"name": "CVE-2017-7269",
"full_name": "jrrombaldo\/CVE-2017-7269",
"owner": {
"login": "jrrombaldo",
"id": 121948,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/121948?v=4",
"html_url": "https:\/\/github.com\/jrrombaldo"
},
"html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-7269",
"description": null,
"fork": false,
"created_at": "2017-04-04T08:47:22Z",
"updated_at": "2018-01-08T16:52:30Z",
"pushed_at": "2017-04-04T17:20:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 87365181,
"name": "iis6-exploit-2017-CVE-2017-7269",
"full_name": "g0rx\/iis6-exploit-2017-CVE-2017-7269",
"owner": {
"login": "g0rx",
"id": 10961397,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10961397?v=4",
"html_url": "https:\/\/github.com\/g0rx"
},
"html_url": "https:\/\/github.com\/g0rx\/iis6-exploit-2017-CVE-2017-7269",
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2020-11-11T11:19:06Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 28,
"forks": 28,
"watchers": 30,
"score": 0
},
{
"id": 87432387,
"name": "IIS_6.0_WebDAV_Ruby",
"full_name": "slimpagey\/IIS_6.0_WebDAV_Ruby",
"owner": {
"login": "slimpagey",
"id": 10183644,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10183644?v=4",
"html_url": "https:\/\/github.com\/slimpagey"
},
"html_url": "https:\/\/github.com\/slimpagey\/IIS_6.0_WebDAV_Ruby",
"description": "Ruby Exploit for IIS 6.0 Buffer Overflow (CVE-2017-7269)",
"fork": false,
"created_at": "2017-04-06T13:27:20Z",
"updated_at": "2019-02-27T06:05:06Z",
"pushed_at": "2017-04-06T13:47:49Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"score": 0
},
{
"id": 88148249,
"name": "cve-2017-7269",
"full_name": "homjxi0e\/cve-2017-7269",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/cve-2017-7269",
"description": null,
"fork": false,
"created_at": "2017-04-13T09:27:01Z",
"updated_at": "2017-04-13T09:27:01Z",
"pushed_at": "2017-04-13T12:33:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 89217126,
"name": "CVE-2017-7269",
"full_name": "xiaovpn\/CVE-2017-7269",
"owner": {
"login": "xiaovpn",
"id": 22736797,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22736797?v=4",
"html_url": "https:\/\/github.com\/xiaovpn"
},
"html_url": "https:\/\/github.com\/xiaovpn\/CVE-2017-7269",
"description": "CVE-2017-7269",
"fork": false,
"created_at": "2017-04-24T08:42:59Z",
"updated_at": "2017-04-24T08:42:59Z",
"pushed_at": "2017-04-24T08:43:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 91493002,
"name": "cve-2017-7269-tool",
"full_name": "zcgonvh\/cve-2017-7269-tool",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/cve-2017-7269-tool",
"description": "CVE-2017-7269 to webshell or shellcode loader",
"fork": false,
"created_at": "2017-05-16T18:47:45Z",
"updated_at": "2020-09-14T21:00:11Z",
"pushed_at": "2017-05-16T18:48:15Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 32,
"forks": 32,
"watchers": 84,
"score": 0
},
{
"id": 118708741,
"name": "CVE-2017-7269",

25
2017/CVE-2017-7472.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 93704978,
"name": "CVE-2017-7472",
"full_name": "homjxi0e\/CVE-2017-7472",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7472",
"description": null,
"fork": false,
"created_at": "2017-06-08T03:47:57Z",
"updated_at": "2017-06-08T03:52:03Z",
"pushed_at": "2017-06-08T03:52:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 92405414,
"name": "cve-2017-7494",
"full_name": "betab0t\/cve-2017-7494",
"owner": {
"login": "betab0t",
"id": 40000473,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40000473?v=4",
"html_url": "https:\/\/github.com\/betab0t"
},
"html_url": "https:\/\/github.com\/betab0t\/cve-2017-7494",
"description": "Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)",
"fork": false,
"created_at": "2017-05-25T13:20:56Z",
"updated_at": "2020-12-15T10:23:56Z",
"pushed_at": "2017-07-26T13:07:51Z",
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 61,
"forks": 61,
"watchers": 175,
"score": 0
},
{
"id": 92410132,
"name": "CVE-2017-7494",
"full_name": "homjxi0e\/CVE-2017-7494",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7494",
"description": null,
"fork": false,
"created_at": "2017-05-25T14:13:10Z",
"updated_at": "2017-05-26T08:46:45Z",
"pushed_at": "2017-05-26T08:46:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 92457464,
"name": "exploit-CVE-2017-7494",
@ -22,6 +68,52 @@
"watchers": 258,
"score": 0
},
{
"id": 92484269,
"name": "SambaCry",
"full_name": "Waffles-2\/SambaCry",
"owner": {
"login": "Waffles-2",
"id": 21175535,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21175535?v=4",
"html_url": "https:\/\/github.com\/Waffles-2"
},
"html_url": "https:\/\/github.com\/Waffles-2\/SambaCry",
"description": "CVE-2017-7494 - Detection Scripts",
"fork": false,
"created_at": "2017-05-26T07:28:26Z",
"updated_at": "2020-08-27T17:36:56Z",
"pushed_at": "2017-05-26T07:43:02Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 24,
"forks": 24,
"watchers": 61,
"score": 0
},
{
"id": 92845566,
"name": "SambaHunter",
"full_name": "brianwrf\/SambaHunter",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/SambaHunter",
"description": "It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).",
"fork": false,
"created_at": "2017-05-30T15:08:32Z",
"updated_at": "2020-12-06T04:30:39Z",
"pushed_at": "2017-05-30T16:13:24Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 22,
"forks": 22,
"watchers": 39,
"score": 0
},
{
"id": 93424064,
"name": "CVE-2017-7494",

View file

@ -1,4 +1,27 @@
[
{
"id": 97701175,
"name": "CVE-2017-7529",
"full_name": "liusec\/CVE-2017-7529",
"owner": {
"login": "liusec",
"id": 13982415,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13982415?v=4",
"html_url": "https:\/\/github.com\/liusec"
},
"html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
"description": null,
"fork": false,
"created_at": "2017-07-19T09:55:42Z",
"updated_at": "2020-07-30T16:07:30Z",
"pushed_at": "2017-07-21T06:29:35Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"forks": 7,
"watchers": 10,
"score": 0
},
{
"id": 138050203,
"name": "CVE-2017-7529_PoC",

25
2017/CVE-2017-7648.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 87845394,
"name": "CVE-2017-7648.",
"full_name": "notmot\/CVE-2017-7648.",
"owner": {
"login": "notmot",
"id": 4649277,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4649277?v=4",
"html_url": "https:\/\/github.com\/notmot"
},
"html_url": "https:\/\/github.com\/notmot\/CVE-2017-7648.",
"description": "A writeup of CVE-2017-7648",
"fork": false,
"created_at": "2017-04-10T18:41:59Z",
"updated_at": "2017-04-10T18:47:31Z",
"pushed_at": "2017-04-10T18:42:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-7912.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 103750394,
"name": "CVE-2017-7912_Sneak",
"full_name": "homjxi0e\/CVE-2017-7912_Sneak",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7912_Sneak",
"description": null,
"fork": false,
"created_at": "2017-09-16T12:27:48Z",
"updated_at": "2017-09-16T12:27:48Z",
"pushed_at": "2017-09-16T12:27:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 90299927,
"name": "CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset",
"full_name": "homjxi0e\/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset",
"description": null,
"fork": false,
"created_at": "2017-05-04T19:05:12Z",
"updated_at": "2017-05-04T19:05:12Z",
"pushed_at": "2017-05-04T19:13:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 90396412,
"name": "wp-allowed-hosts",
"full_name": "alash3al\/wp-allowed-hosts",
"owner": {
"login": "alash3al",
"id": 3078292,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3078292?v=4",
"html_url": "https:\/\/github.com\/alash3al"
},
"html_url": "https:\/\/github.com\/alash3al\/wp-allowed-hosts",
"description": "a plugin that protects your wp site from the CVE-2017-8295 vulnerability",
"fork": false,
"created_at": "2017-05-05T16:34:17Z",
"updated_at": "2017-05-06T06:41:07Z",
"pushed_at": "2017-05-05T17:05:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 90453472,
"name": "CVE-2017-8295",

25
2017/CVE-2017-8382.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 91959764,
"name": "Admidio-3.2.8-CSRF-POC-by-Provensec-llc",
"full_name": "faizzaidi\/Admidio-3.2.8-CSRF-POC-by-Provensec-llc",
"owner": {
"login": "faizzaidi",
"id": 12153050,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
"html_url": "https:\/\/github.com\/faizzaidi"
},
"html_url": "https:\/\/github.com\/faizzaidi\/Admidio-3.2.8-CSRF-POC-by-Provensec-llc",
"description": "Admidio 3.2.8 Cross-Site Request Forgery Assigned CVE Number: CVE-2017-8382",
"fork": false,
"created_at": "2017-05-21T13:36:51Z",
"updated_at": "2020-07-17T05:22:45Z",
"pushed_at": "2017-05-21T13:38:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -45,6 +45,29 @@
"watchers": 66,
"score": 0
},
{
"id": 99573027,
"name": "CVE-2017-8464-exp-generator",
"full_name": "Securitykid\/CVE-2017-8464-exp-generator",
"owner": {
"login": "Securitykid",
"id": 30798606,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30798606?v=4",
"html_url": "https:\/\/github.com\/Securitykid"
},
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8464-exp-generator",
"description": "this tool can generate a exp for cve-2017-8486, it is developed by python",
"fork": false,
"created_at": "2017-08-07T11:56:11Z",
"updated_at": "2020-11-09T09:39:26Z",
"pushed_at": "2017-08-07T12:42:33Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 7,
"score": 0
},
{
"id": 105686692,
"name": "usbhijacking",

25
2017/CVE-2017-8543.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 94720681,
"name": "windows-security-cve-2017-8543",
"full_name": "americanhanko\/windows-security-cve-2017-8543",
"owner": {
"login": "americanhanko",
"id": 8458267,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8458267?v=4",
"html_url": "https:\/\/github.com\/americanhanko"
},
"html_url": "https:\/\/github.com\/americanhanko\/windows-security-cve-2017-8543",
"description": "InSpec profile to verify a node is patched and compliant for CVE-2017-8543",
"fork": false,
"created_at": "2017-06-19T00:15:09Z",
"updated_at": "2017-06-19T00:16:02Z",
"pushed_at": "2017-06-19T02:07:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-8625.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100988934,
"name": "CVE-2017-8625_Bypass_UMCI",
"full_name": "homjxi0e\/CVE-2017-8625_Bypass_UMCI",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8625_Bypass_UMCI",
"description": "Bypass Feature UMCI in Internet Explorer",
"fork": false,
"created_at": "2017-08-21T20:14:07Z",
"updated_at": "2020-11-18T13:22:34Z",
"pushed_at": "2017-08-25T13:04:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

25
2017/CVE-2017-8641.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100988677,
"name": "CVE-2017-8641_chakra_Js_GlobalObject",
"full_name": "homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
"fork": false,
"created_at": "2017-08-21T20:11:11Z",
"updated_at": "2017-08-23T09:18:42Z",
"pushed_at": "2017-08-23T09:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -45,6 +45,75 @@
"watchers": 92,
"score": 0
},
{
"id": 103428172,
"name": "CVE-2017-8759",
"full_name": "vysecurity\/CVE-2017-8759",
"owner": {
"login": "vysecurity",
"id": 3596242,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3596242?v=4",
"html_url": "https:\/\/github.com\/vysecurity"
},
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759",
"description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.",
"fork": false,
"created_at": "2017-09-13T17:10:18Z",
"updated_at": "2020-11-20T09:09:06Z",
"pushed_at": "2017-09-14T10:18:40Z",
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 85,
"forks": 85,
"watchers": 173,
"score": 0
},
{
"id": 103447049,
"name": "CVE-2017-8759",
"full_name": "BasuCert\/CVE-2017-8759",
"owner": {
"login": "BasuCert",
"id": 29852431,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29852431?v=4",
"html_url": "https:\/\/github.com\/BasuCert"
},
"html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759",
"description": "CVE-2017-8759 Research",
"fork": false,
"created_at": "2017-09-13T20:27:29Z",
"updated_at": "2020-05-18T10:42:14Z",
"pushed_at": "2017-09-15T13:14:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 103447404,
"name": "CVE-2017-8759-Exploit-sample2",
"full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2",
"owner": {
"login": "tahisaad6",
"id": 21042116,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/21042116?v=4",
"html_url": "https:\/\/github.com\/tahisaad6"
},
"html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2",
"description": null,
"fork": false,
"created_at": "2017-09-13T20:31:43Z",
"updated_at": "2017-09-13T20:31:43Z",
"pushed_at": "2017-09-13T20:31:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 103493845,
"name": "CVE-2017-8759_-SOAP_WSDL",
@ -114,6 +183,52 @@
"watchers": 83,
"score": 0
},
{
"id": 103865283,
"name": "CVE-2017-8759",
"full_name": "JonasUliana\/CVE-2017-8759",
"owner": {
"login": "JonasUliana",
"id": 29503841,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29503841?v=4",
"html_url": "https:\/\/github.com\/JonasUliana"
},
"html_url": "https:\/\/github.com\/JonasUliana\/CVE-2017-8759",
"description": "Simple C# implementation of CVE-2017-8759",
"fork": false,
"created_at": "2017-09-17T22:05:56Z",
"updated_at": "2018-11-16T12:24:03Z",
"pushed_at": "2017-09-17T22:20:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 103896322,
"name": "CVE-2017-8759",
"full_name": "Securitykid\/CVE-2017-8759",
"owner": {
"login": "Securitykid",
"id": 30798606,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30798606?v=4",
"html_url": "https:\/\/github.com\/Securitykid"
},
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8759",
"description": "CVE-2017-8759",
"fork": false,
"created_at": "2017-09-18T05:35:57Z",
"updated_at": "2017-09-18T05:35:57Z",
"pushed_at": "2017-09-18T05:35:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 104033989,
"name": "CVE-2017-8759-exploits",

25
2017/CVE-2017-8779.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 90798298,
"name": "GO-RPCBOMB",
"full_name": "drbothen\/GO-RPCBOMB",
"owner": {
"login": "drbothen",
"id": 6192325,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6192325?v=4",
"html_url": "https:\/\/github.com\/drbothen"
},
"html_url": "https:\/\/github.com\/drbothen\/GO-RPCBOMB",
"description": "CVE-2017-8779 aka RPCBomb",
"fork": false,
"created_at": "2017-05-09T22:43:10Z",
"updated_at": "2020-09-28T00:42:01Z",
"pushed_at": "2017-05-10T16:48:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 91819199,
"name": "Joomla3.7-SQLi-CVE-2017-8917",
"full_name": "brianwrf\/Joomla3.7-SQLi-CVE-2017-8917",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/Joomla3.7-SQLi-CVE-2017-8917",
"description": "Joomla 3.7 SQL injection (CVE-2017-8917)",
"fork": false,
"created_at": "2017-05-19T15:21:46Z",
"updated_at": "2020-10-03T06:01:00Z",
"pushed_at": "2017-05-19T15:30:18Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 8,
"score": 0
},
{
"id": 111313970,
"name": "Exploit-Joomla",

View file

@ -1,4 +1,27 @@
[
{
"id": 93714446,
"name": "CVE-2017-9430",
"full_name": "homjxi0e\/CVE-2017-9430",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9430",
"description": null,
"fork": false,
"created_at": "2017-06-08T06:22:37Z",
"updated_at": "2017-06-08T06:30:44Z",
"pushed_at": "2017-06-08T06:30:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 111662357,
"name": "Dnstracer-1.9-Fix",

25
2017/CVE-2017-9606.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 94288997,
"name": "CVE-2017-9606",
"full_name": "Houl777\/CVE-2017-9606",
"owner": {
"login": "Houl777",
"id": 29420363,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29420363?v=4",
"html_url": "https:\/\/github.com\/Houl777"
},
"html_url": "https:\/\/github.com\/Houl777\/CVE-2017-9606",
"description": null,
"fork": false,
"created_at": "2017-06-14T04:30:36Z",
"updated_at": "2017-06-14T04:30:36Z",
"pushed_at": "2017-06-14T08:15:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2017/CVE-2017-9609.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 94987347,
"name": "Blackcat-cms-v1.2-xss-POC-by-Provensec-llc",
"full_name": "faizzaidi\/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc",
"owner": {
"login": "faizzaidi",
"id": 12153050,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12153050?v=4",
"html_url": "https:\/\/github.com\/faizzaidi"
},
"html_url": "https:\/\/github.com\/faizzaidi\/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc",
"description": "BlackCat-CMS-Bundle-v1.2 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2017-9609",
"fork": false,
"created_at": "2017-06-21T09:30:58Z",
"updated_at": "2020-07-17T05:22:42Z",
"pushed_at": "2017-06-21T09:31:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2017/CVE-2017-9779.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 100739963,
"name": "CVE-2017-9779",
"full_name": "homjxi0e\/CVE-2017-9779",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-9779",
"description": "Automatic execution Payload From Windows By Path Users All Exploit Via File bashrc ",
"fork": false,
"created_at": "2017-08-18T18:30:42Z",
"updated_at": "2017-09-11T14:35:42Z",
"pushed_at": "2017-09-11T23:28:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,50 @@
[
{
"id": 96536969,
"name": "s2-048",
"full_name": "IanSmith123\/s2-048",
"owner": {
"login": "IanSmith123",
"id": 19611084,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19611084?v=4",
"html_url": "https:\/\/github.com\/IanSmith123"
},
"html_url": "https:\/\/github.com\/IanSmith123\/s2-048",
"description": "Apache struts struts 2 048, CVE-2017-9791.",
"fork": false,
"created_at": "2017-07-07T12:35:55Z",
"updated_at": "2017-07-07T14:05:07Z",
"pushed_at": "2017-07-07T17:10:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 96565902,
"name": "Struts2-048",
"full_name": "dragoneeg\/Struts2-048",
"owner": {
"login": "dragoneeg",
"id": 4232461,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4232461?v=4",
"html_url": "https:\/\/github.com\/dragoneeg"
},
"html_url": "https:\/\/github.com\/dragoneeg\/Struts2-048",
"description": "CVE-2017-9791",
"fork": false,
"created_at": "2017-07-07T18:27:31Z",
"updated_at": "2020-10-21T14:13:27Z",
"pushed_at": "2017-07-08T02:08:36Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 31,
"forks": 31,
"watchers": 26,
"score": 0
},
{
"id": 104592299,
"name": "CVE-2017-9791",

View file

@ -22,6 +22,29 @@
"watchers": 54,
"score": 0
},
{
"id": 102714061,
"name": "struts2-rce-cve-2017-9805-ruby",
"full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby",
"owner": {
"login": "hahwul",
"id": 13212227,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13212227?v=4",
"html_url": "https:\/\/github.com\/hahwul"
},
"html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby",
"description": "cve -2017-9805",
"fork": false,
"created_at": "2017-09-07T08:49:14Z",
"updated_at": "2020-11-22T14:11:43Z",
"pushed_at": "2017-09-07T08:55:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 102917821,
"name": "struts-pwn_CVE-2017-9805",
@ -45,6 +68,29 @@
"watchers": 237,
"score": 0
},
{
"id": 103005989,
"name": "apache-struts-pwn_CVE-2017-9805",
"full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"owner": {
"login": "Lone-Ranger",
"id": 15882470,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15882470?v=4",
"html_url": "https:\/\/github.com\/Lone-Ranger"
},
"html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-10T05:26:03Z",
"updated_at": "2020-11-24T23:21:26Z",
"pushed_at": "2017-09-10T05:28:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 9,
"forks": 9,
"watchers": 3,
"score": 0
},
{
"id": 111928630,
"name": "-CVE-2017-9805",

25
2017/CVE-2017-98505.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 103377643,
"name": "Struts2Vuln",
"full_name": "mike-williams\/Struts2Vuln",
"owner": {
"login": "mike-williams",
"id": 3205476,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3205476?v=4",
"html_url": "https:\/\/github.com\/mike-williams"
},
"html_url": "https:\/\/github.com\/mike-williams\/Struts2Vuln",
"description": "Struts 2 web app that is vulnerable to CVE-2017-98505 and CVE-2017-5638",
"fork": false,
"created_at": "2017-09-13T09:01:34Z",
"updated_at": "2018-08-05T19:22:28Z",
"pushed_at": "2017-09-15T14:39:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 120640426,
"name": "CVE-2018-0101-DOS-POC",
"full_name": "1337g\/CVE-2018-0101-DOS-POC",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2018-0101-DOS-POC",
"description": null,
"fork": false,
"created_at": "2018-02-07T16:25:59Z",
"updated_at": "2020-04-06T12:17:46Z",
"pushed_at": "2018-02-07T16:43:08Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 6,
"forks": 6,
"watchers": 14,
"score": 0
},
{
"id": 120782386,
"name": "ciscoasa_honeypot",

View file

@ -45,29 +45,6 @@
"watchers": 178,
"score": 0
},
{
"id": 138348696,
"name": "CVE-2018-0296",
"full_name": "bhenner1\/CVE-2018-0296",
"owner": {
"login": "bhenner1",
"id": 24857952,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24857952?v=4",
"html_url": "https:\/\/github.com\/bhenner1"
},
"html_url": "https:\/\/github.com\/bhenner1\/CVE-2018-0296",
"description": "Cisco ASA - CVE-2018-0296 | Exploit",
"fork": false,
"created_at": "2018-06-22T21:12:58Z",
"updated_at": "2019-01-03T02:33:10Z",
"pushed_at": "2018-06-26T13:44:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 162431036,
"name": "CVE-2018-0296",

View file

@ -1,96 +1,4 @@
[
{
"id": 117077311,
"name": "CVE-2018-0802_POC",
"full_name": "zldww2011\/CVE-2018-0802_POC",
"owner": {
"login": "zldww2011",
"id": 17902585,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17902585?v=4",
"html_url": "https:\/\/github.com\/zldww2011"
},
"html_url": "https:\/\/github.com\/zldww2011\/CVE-2018-0802_POC",
"description": "Exploit the vulnerability to execute the calculator",
"fork": false,
"created_at": "2018-01-11T09:16:32Z",
"updated_at": "2020-12-16T10:25:11Z",
"pushed_at": "2018-01-11T09:23:05Z",
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 35,
"forks": 35,
"watchers": 70,
"score": 0
},
{
"id": 117080574,
"name": "CVE-2018-0802",
"full_name": "rxwx\/CVE-2018-0802",
"owner": {
"login": "rxwx",
"id": 2202542,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/2202542?v=4",
"html_url": "https:\/\/github.com\/rxwx"
},
"html_url": "https:\/\/github.com\/rxwx\/CVE-2018-0802",
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2020-12-21T02:19:27Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 134,
"forks": 134,
"watchers": 266,
"score": 0
},
{
"id": 117234193,
"name": "RTF_11882_0802",
"full_name": "Ridter\/RTF_11882_0802",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/RTF_11882_0802",
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2020-12-16T09:38:06Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 64,
"forks": 64,
"watchers": 155,
"score": 0
},
{
"id": 117637270,
"name": "CVE-2018-0802_CVE-2017-11882",
"full_name": "likescam\/CVE-2018-0802_CVE-2017-11882",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-0802_CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2018-01-16T05:49:01Z",
"updated_at": "2020-11-26T04:09:34Z",
"pushed_at": "2018-01-16T05:49:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
},
{
"id": 313441734,
"name": "rtfkit",

View file

@ -1,25 +0,0 @@
[
{
"id": 137465316,
"name": "UnmarshalPwn",
"full_name": "codewhitesec\/UnmarshalPwn",
"owner": {
"login": "codewhitesec",
"id": 8680262,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8680262?v=4",
"html_url": "https:\/\/github.com\/codewhitesec"
},
"html_url": "https:\/\/github.com\/codewhitesec\/UnmarshalPwn",
"description": "POC for CVE-2018-0824",
"fork": false,
"created_at": "2018-06-15T08:59:37Z",
"updated_at": "2020-12-11T07:20:35Z",
"pushed_at": "2018-06-25T07:13:36Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 34,
"forks": 34,
"watchers": 73,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 145615979,
"name": "CVE-2018-0952-SystemCollector",
"full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
"owner": {
"login": "atredispartners",
"id": 7254370,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7254370?v=4",
"html_url": "https:\/\/github.com\/atredispartners"
},
"html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
"fork": false,
"created_at": "2018-08-21T20:29:10Z",
"updated_at": "2020-05-06T20:06:14Z",
"pushed_at": "2018-08-21T20:30:24Z",
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 36,
"forks": 36,
"watchers": 105,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 120648393,
"name": "CVE-2018-1000001",
"full_name": "0x00-0x00\/CVE-2018-1000001",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-1000001",
"description": "glibc getcwd() local privilege escalation compiled binaries",
"fork": false,
"created_at": "2018-02-07T17:34:24Z",
"updated_at": "2020-12-02T07:21:01Z",
"pushed_at": "2018-02-09T22:35:06Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 6,
"forks": 6,
"watchers": 31,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 118851943,
"name": "CVE-2018-1000006-DEMO",
"full_name": "CHYbeta\/CVE-2018-1000006-DEMO",
"owner": {
"login": "CHYbeta",
"id": 18642224,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18642224?v=4",
"html_url": "https:\/\/github.com\/CHYbeta"
},
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2018-1000006-DEMO",
"description": "The Demo for CVE-2018-1000006",
"fork": false,
"created_at": "2018-01-25T02:38:44Z",
"updated_at": "2020-07-13T15:22:09Z",
"pushed_at": "2018-01-25T03:29:30Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 8,
"forks": 8,
"watchers": 40,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 136231159,
"name": "CVE-2018-1000117-Exploit",
"full_name": "u0pattern\/CVE-2018-1000117-Exploit",
"owner": {
"login": "u0pattern",
"id": 21009276,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21009276?v=4",
"html_url": "https:\/\/github.com\/u0pattern"
},
"html_url": "https:\/\/github.com\/u0pattern\/CVE-2018-1000117-Exploit",
"description": "Buffer Overflow Vulnerability that can result ACE",
"fork": false,
"created_at": "2018-06-05T20:28:29Z",
"updated_at": "2020-06-30T04:18:59Z",
"pushed_at": "2018-06-05T20:45:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 131973710,
"name": "CVE-2018-1000199",
"full_name": "dsfau\/CVE-2018-1000199",
"owner": {
"login": "dsfau",
"id": 26786936,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26786936?v=4",
"html_url": "https:\/\/github.com\/dsfau"
},
"html_url": "https:\/\/github.com\/dsfau\/CVE-2018-1000199",
"description": null,
"fork": false,
"created_at": "2018-05-03T09:37:56Z",
"updated_at": "2018-05-03T09:41:20Z",
"pushed_at": "2018-05-03T09:41:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 134336529,
"name": "CVE-2018-1000529",
"full_name": "martinfrancois\/CVE-2018-1000529",
"owner": {
"login": "martinfrancois",
"id": 14319020,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/14319020?v=4",
"html_url": "https:\/\/github.com\/martinfrancois"
},
"html_url": "https:\/\/github.com\/martinfrancois\/CVE-2018-1000529",
"description": null,
"fork": false,
"created_at": "2018-05-21T23:43:18Z",
"updated_at": "2018-06-28T20:43:19Z",
"pushed_at": "2018-06-28T20:43:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

Some files were not shown because too many files have changed in this diff Show more