mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2020/07/25 06:09:02
This commit is contained in:
parent
9ef913c7d2
commit
ef2f886c21
246 changed files with 2049 additions and 10625 deletions
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 108682441,
|
||||
"name": "cve-2010-4221",
|
||||
"full_name": "M31MOTH\/cve-2010-4221",
|
||||
"owner": {
|
||||
"login": "M31MOTH",
|
||||
"id": 10201432,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10201432?v=4",
|
||||
"html_url": "https:\/\/github.com\/M31MOTH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M31MOTH\/cve-2010-4221",
|
||||
"description": "This exploit was written to study some concepts, enjoy!",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-28T20:37:26Z",
|
||||
"updated_at": "2020-03-26T15:45:57Z",
|
||||
"pushed_at": "2017-10-22T19:46:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-24T04:51:07Z",
|
||||
"updated_at": "2020-07-24T18:58:09Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 522,
|
||||
"watchers_count": 522,
|
||||
"stargazers_count": 523,
|
||||
"watchers_count": 523,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 522,
|
||||
"watchers": 523,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-24T04:51:07Z",
|
||||
"updated_at": "2020-07-24T18:58:09Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 522,
|
||||
"watchers_count": 522,
|
||||
"stargazers_count": 523,
|
||||
"watchers_count": 523,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 522,
|
||||
"watchers": 523,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-24T04:51:07Z",
|
||||
"updated_at": "2020-07-24T18:58:09Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 522,
|
||||
"watchers_count": 522,
|
||||
"stargazers_count": 523,
|
||||
"watchers_count": 523,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 522,
|
||||
"watchers": 523,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2020-07-15T11:56:44Z",
|
||||
"updated_at": "2020-07-24T17:56:51Z",
|
||||
"pushed_at": "2020-05-23T12:33:39Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 120782386,
|
||||
"name": "ciscoasa_honeypot",
|
||||
"full_name": "Cymmetria\/ciscoasa_honeypot",
|
||||
"owner": {
|
||||
"login": "Cymmetria",
|
||||
"id": 19413345,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19413345?v=4",
|
||||
"html_url": "https:\/\/github.com\/Cymmetria"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Cymmetria\/ciscoasa_honeypot",
|
||||
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-08T15:52:50Z",
|
||||
"updated_at": "2020-07-02T08:06:41Z",
|
||||
"pushed_at": "2018-11-23T11:47:10Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 138142987,
|
||||
"name": "CVE-2018-0296",
|
||||
"full_name": "milo2012\/CVE-2018-0296",
|
||||
"owner": {
|
||||
"login": "milo2012",
|
||||
"id": 905335,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/905335?v=4",
|
||||
"html_url": "https:\/\/github.com\/milo2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/milo2012\/CVE-2018-0296",
|
||||
"description": "Test CVE-2018-0296 and extract usernames",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T08:36:34Z",
|
||||
"updated_at": "2020-06-23T00:17:43Z",
|
||||
"pushed_at": "2018-12-09T11:57:20Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138190891,
|
||||
"name": "CVE-2018-0296",
|
||||
|
@ -45,29 +22,6 @@
|
|||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 138348696,
|
||||
"name": "CVE-2018-0296",
|
||||
"full_name": "bhenner1\/CVE-2018-0296",
|
||||
"owner": {
|
||||
"login": "bhenner1",
|
||||
"id": 24857952,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24857952?v=4",
|
||||
"html_url": "https:\/\/github.com\/bhenner1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bhenner1\/CVE-2018-0296",
|
||||
"description": "Cisco ASA - CVE-2018-0296 | Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-22T21:12:58Z",
|
||||
"updated_at": "2019-01-03T02:33:10Z",
|
||||
"pushed_at": "2018-06-26T13:44:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 139199476,
|
||||
"name": "CVE-2018-0296",
|
||||
|
@ -90,28 +44,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162431036,
|
||||
"name": "CVE-2018-0296",
|
||||
"full_name": "qiantu88\/CVE-2018-0296",
|
||||
"owner": {
|
||||
"login": "qiantu88",
|
||||
"id": 35452263,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35452263?v=4",
|
||||
"html_url": "https:\/\/github.com\/qiantu88"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qiantu88\/CVE-2018-0296",
|
||||
"description": "https:\/\/github.com\/milo2012\/CVE-2018-0296.git",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-19T11:57:43Z",
|
||||
"updated_at": "2018-12-19T11:59:47Z",
|
||||
"pushed_at": "2018-12-19T11:59:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 137465316,
|
||||
"name": "UnmarshalPwn",
|
||||
"full_name": "codewhitesec\/UnmarshalPwn",
|
||||
"owner": {
|
||||
"login": "codewhitesec",
|
||||
"id": 8680262,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8680262?v=4",
|
||||
"html_url": "https:\/\/github.com\/codewhitesec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codewhitesec\/UnmarshalPwn",
|
||||
"description": "POC for CVE-2018-0824",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-15T08:59:37Z",
|
||||
"updated_at": "2020-06-11T02:48:45Z",
|
||||
"pushed_at": "2018-06-25T07:13:36Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 127755759,
|
||||
"name": "credssp",
|
||||
"full_name": "preempt\/credssp",
|
||||
"owner": {
|
||||
"login": "preempt",
|
||||
"id": 23032668,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23032668?v=4",
|
||||
"html_url": "https:\/\/github.com\/preempt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/preempt\/credssp",
|
||||
"description": "A code demonstrating CVE-2018-0886",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-02T12:52:07Z",
|
||||
"updated_at": "2020-06-30T10:01:51Z",
|
||||
"pushed_at": "2018-06-02T10:33:41Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 242,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 145615979,
|
||||
"name": "CVE-2018-0952-SystemCollector",
|
||||
"full_name": "atredispartners\/CVE-2018-0952-SystemCollector",
|
||||
"owner": {
|
||||
"login": "atredispartners",
|
||||
"id": 7254370,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7254370?v=4",
|
||||
"html_url": "https:\/\/github.com\/atredispartners"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/atredispartners\/CVE-2018-0952-SystemCollector",
|
||||
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T20:29:10Z",
|
||||
"updated_at": "2020-05-06T20:06:14Z",
|
||||
"pushed_at": "2018-08-21T20:30:24Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 136231159,
|
||||
"name": "CVE-2018-1000117-Exploit",
|
||||
"full_name": "1337r00t\/CVE-2018-1000117-Exploit",
|
||||
"owner": {
|
||||
"login": "1337r00t",
|
||||
"id": 21009276,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21009276?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337r00t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337r00t\/CVE-2018-1000117-Exploit",
|
||||
"description": "Buffer Overflow Vulnerability that can result ACE",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-05T20:28:29Z",
|
||||
"updated_at": "2020-06-30T04:18:59Z",
|
||||
"pushed_at": "2018-06-05T20:45:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 156499957,
|
||||
"name": "cve-2018-1000134",
|
||||
"full_name": "dragotime\/cve-2018-1000134",
|
||||
"owner": {
|
||||
"login": "dragotime",
|
||||
"id": 43851975,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43851975?v=4",
|
||||
"html_url": "https:\/\/github.com\/dragotime"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dragotime\/cve-2018-1000134",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-07T06:22:47Z",
|
||||
"updated_at": "2018-11-07T06:22:47Z",
|
||||
"pushed_at": "2018-11-07T06:22:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131973710,
|
||||
"name": "CVE-2018-1000199",
|
||||
"full_name": "dsfau\/CVE-2018-1000199",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/CVE-2018-1000199",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T09:37:56Z",
|
||||
"updated_at": "2018-05-03T09:41:20Z",
|
||||
"pushed_at": "2018-05-03T09:41:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 134336529,
|
||||
"name": "CVE-2018-1000529",
|
||||
"full_name": "martinfrancois\/CVE-2018-1000529",
|
||||
"owner": {
|
||||
"login": "martinfrancois",
|
||||
"id": 14319020,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/14319020?v=4",
|
||||
"html_url": "https:\/\/github.com\/martinfrancois"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/martinfrancois\/CVE-2018-1000529",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-21T23:43:18Z",
|
||||
"updated_at": "2018-06-28T20:43:19Z",
|
||||
"pushed_at": "2018-06-28T20:43:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 148814288,
|
||||
"name": "CVE-2018-1000802-PoC",
|
||||
"full_name": "tna0y\/CVE-2018-1000802-PoC",
|
||||
"owner": {
|
||||
"login": "tna0y",
|
||||
"id": 22504374,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22504374?v=4",
|
||||
"html_url": "https:\/\/github.com\/tna0y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tna0y\/CVE-2018-1000802-PoC",
|
||||
"description": "Python CVE-2018-1000802 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-14T16:22:12Z",
|
||||
"updated_at": "2020-05-29T07:36:51Z",
|
||||
"pushed_at": "2018-09-14T16:38:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,50 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 160451056,
|
||||
"name": "cve-2018-1002105",
|
||||
"full_name": "gravitational\/cve-2018-1002105",
|
||||
"owner": {
|
||||
"login": "gravitational",
|
||||
"id": 10781132,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/10781132?v=4",
|
||||
"html_url": "https:\/\/github.com\/gravitational"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gravitational\/cve-2018-1002105",
|
||||
"description": "Test utility for cve-2018-1002105",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-05T02:51:43Z",
|
||||
"updated_at": "2020-04-06T10:50:44Z",
|
||||
"pushed_at": "2018-12-13T16:56:28Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160665138,
|
||||
"name": "poc_CVE-2018-1002105",
|
||||
"full_name": "evict\/poc_CVE-2018-1002105",
|
||||
"owner": {
|
||||
"login": "evict",
|
||||
"id": 7238650,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7238650?v=4",
|
||||
"html_url": "https:\/\/github.com\/evict"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evict\/poc_CVE-2018-1002105",
|
||||
"description": "PoC for CVE-2018-1002105.",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-06T11:28:02Z",
|
||||
"updated_at": "2020-06-05T15:05:17Z",
|
||||
"pushed_at": "2018-12-21T14:34:04Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 216,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161109755,
|
||||
"name": "Kubernetes-1.12.3-all-auto-install",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 130343381,
|
||||
"name": "Detecting-the-patch-of-CVE-2018-1010",
|
||||
"full_name": "ymgh96\/Detecting-the-patch-of-CVE-2018-1010",
|
||||
"owner": {
|
||||
"login": "ymgh96",
|
||||
"id": 29282323,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29282323?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymgh96"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymgh96\/Detecting-the-patch-of-CVE-2018-1010",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-20T09:50:40Z",
|
||||
"updated_at": "2018-04-20T11:01:36Z",
|
||||
"pushed_at": "2018-04-20T11:01:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131403764,
|
||||
"name": "Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"full_name": "ymgh96\/Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"owner": {
|
||||
"login": "ymgh96",
|
||||
"id": 29282323,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29282323?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymgh96"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymgh96\/Detecting-the-CVE-2018-1026-and-its-patch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:28:11Z",
|
||||
"updated_at": "2018-04-28T11:32:03Z",
|
||||
"pushed_at": "2018-04-28T11:32:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 133036448,
|
||||
"name": "batchOverflow",
|
||||
"full_name": "phzietsman\/batchOverflow",
|
||||
"owner": {
|
||||
"login": "phzietsman",
|
||||
"id": 11902058,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11902058?v=4",
|
||||
"html_url": "https:\/\/github.com\/phzietsman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/phzietsman\/batchOverflow",
|
||||
"description": "A fix for the batchOverflow bug https:\/\/medium.com\/@peckshield\/alert-new-batchoverflow-bug-in-multiple-erc20-smart-contracts-cve-2018-10299-511067db6536",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-11T12:23:08Z",
|
||||
"updated_at": "2018-07-03T19:26:14Z",
|
||||
"pushed_at": "2018-07-03T19:26:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131241395,
|
||||
"name": "CVE-2018-10467",
|
||||
"full_name": "alt3kx\/CVE-2018-10467",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10467",
|
||||
"description": "CVE-2018-10467",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-27T03:35:47Z",
|
||||
"updated_at": "2018-05-04T02:07:18Z",
|
||||
"pushed_at": "2018-05-04T02:01:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 156886365,
|
||||
"name": "CVE-2018-10517",
|
||||
"full_name": "0x00-0x00\/CVE-2018-10517",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10517",
|
||||
"description": "CMS Made Simple 2.2.7 RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-09T16:09:39Z",
|
||||
"updated_at": "2020-06-07T11:21:05Z",
|
||||
"pushed_at": "2018-11-09T16:09:46Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131973382,
|
||||
"name": "CVE-2018-10546",
|
||||
"full_name": "dsfau\/CVE-2018-10546",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/CVE-2018-10546",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T09:35:27Z",
|
||||
"updated_at": "2018-05-03T09:36:53Z",
|
||||
"pushed_at": "2018-05-03T09:36:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132433462,
|
||||
"name": "Gpon-Routers",
|
||||
"full_name": "rotemkama\/Gpon-Routers",
|
||||
"owner": {
|
||||
"login": "rotemkama",
|
||||
"id": 7814256,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7814256?v=4",
|
||||
"html_url": "https:\/\/github.com\/rotemkama"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rotemkama\/Gpon-Routers",
|
||||
"description": "Authentication Bypass \/ Command Injection Exploit CVE-2018-1056",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T08:52:45Z",
|
||||
"updated_at": "2020-05-28T11:06:32Z",
|
||||
"pushed_at": "2018-05-04T06:52:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 142351408,
|
||||
"name": "GPON-home-routers-Exploit",
|
||||
"full_name": "vhackor\/GPON-home-routers-Exploit",
|
||||
"owner": {
|
||||
"login": "vhackor",
|
||||
"id": 33405796,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33405796?v=4",
|
||||
"html_url": "https:\/\/github.com\/vhackor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vhackor\/GPON-home-routers-Exploit",
|
||||
"description": "RCE on GPON home routers (CVE-2018-10561)",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-25T20:37:13Z",
|
||||
"updated_at": "2019-10-02T06:57:51Z",
|
||||
"pushed_at": "2018-07-25T23:44:39Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,117 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132445475,
|
||||
"name": "GPON",
|
||||
"full_name": "f3d0x0\/GPON",
|
||||
"owner": {
|
||||
"login": "f3d0x0",
|
||||
"id": 6794063,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6794063?v=4",
|
||||
"html_url": "https:\/\/github.com\/f3d0x0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/f3d0x0\/GPON",
|
||||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T10:34:10Z",
|
||||
"updated_at": "2020-07-16T05:45:10Z",
|
||||
"pushed_at": "2018-05-10T15:08:43Z",
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133550928,
|
||||
"name": "Pingpon-Exploit",
|
||||
"full_name": "649\/Pingpon-Exploit",
|
||||
"owner": {
|
||||
"login": "649",
|
||||
"id": 23534047,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23534047?v=4",
|
||||
"html_url": "https:\/\/github.com\/649"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/649\/Pingpon-Exploit",
|
||||
"description": "Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-15T17:31:21Z",
|
||||
"updated_at": "2020-01-05T18:02:50Z",
|
||||
"pushed_at": "2018-05-26T06:44:44Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133872939,
|
||||
"name": "GPON-LOADER",
|
||||
"full_name": "Choudai\/GPON-LOADER",
|
||||
"owner": {
|
||||
"login": "Choudai",
|
||||
"id": 28324694,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28324694?v=4",
|
||||
"html_url": "https:\/\/github.com\/Choudai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Choudai\/GPON-LOADER",
|
||||
"description": "Exploit loader for Remote Code Execution w\/ Payload on GPON Home Gateway devices (CVE-2018-10562) written in Python.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T22:03:47Z",
|
||||
"updated_at": "2020-06-27T20:05:00Z",
|
||||
"pushed_at": "2018-05-17T22:15:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 134941877,
|
||||
"name": "GPON_RCE",
|
||||
"full_name": "c0ld1\/GPON_RCE",
|
||||
"owner": {
|
||||
"login": "c0ld1",
|
||||
"id": 39249476,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39249476?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0ld1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0ld1\/GPON_RCE",
|
||||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-26T08:05:22Z",
|
||||
"updated_at": "2019-07-30T02:41:47Z",
|
||||
"pushed_at": "2018-05-26T08:07:37Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136307543,
|
||||
"name": "CVE-2018-10562",
|
||||
"full_name": "ATpiu\/CVE-2018-10562",
|
||||
"owner": {
|
||||
"login": "ATpiu",
|
||||
"id": 26686336,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26686336?v=4",
|
||||
"html_url": "https:\/\/github.com\/ATpiu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ATpiu\/CVE-2018-10562",
|
||||
"description": "Exploit for CVE-2018-10562",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-06T09:43:40Z",
|
||||
"updated_at": "2018-11-16T22:46:24Z",
|
||||
"pushed_at": "2018-06-07T02:55:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 131920571,
|
||||
"name": "CVE-2018-10583",
|
||||
"full_name": "TaharAmine\/CVE-2018-10583",
|
||||
"owner": {
|
||||
"login": "TaharAmine",
|
||||
"id": 35707349,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35707349?v=4",
|
||||
"html_url": "https:\/\/github.com\/TaharAmine"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TaharAmine\/CVE-2018-10583",
|
||||
"description": "An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by \"xlink:href=file:\/\/192.168.0.2\/test.jpg\" within an \"office:document-content\" element in a \".odt XML document\".",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-03T00:34:08Z",
|
||||
"updated_at": "2018-08-13T18:21:13Z",
|
||||
"pushed_at": "2018-05-03T00:38:56Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132069525,
|
||||
"name": "CVE-2018-10715",
|
||||
"full_name": "alt3kx\/CVE-2018-10715",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10715",
|
||||
"description": "CVE-2018-10715",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-04T01:33:22Z",
|
||||
"updated_at": "2018-05-04T02:17:30Z",
|
||||
"pushed_at": "2018-05-04T02:17:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132435515,
|
||||
"name": "CVE-2018-10732",
|
||||
"full_name": "alt3kx\/CVE-2018-10732",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-10732",
|
||||
"description": "Dataiku REST-API by default the software, allows anonymous access to functionality that allows an attacker to know valid users.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T09:07:58Z",
|
||||
"updated_at": "2018-06-05T11:51:00Z",
|
||||
"pushed_at": "2018-06-02T09:15:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 137230310,
|
||||
"name": "Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3",
|
||||
"full_name": "BalvinderSingh23\/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3",
|
||||
"owner": {
|
||||
"login": "BalvinderSingh23",
|
||||
"id": 38315927,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38315927?v=4",
|
||||
"html_url": "https:\/\/github.com\/BalvinderSingh23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BalvinderSingh23\/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3",
|
||||
"description": "BlackCat-CMS-Bundle-v1.3 Cross Site Scripting(XSS) Assigned CVE Number: CVE-2018-10821",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-13T14:52:34Z",
|
||||
"updated_at": "2018-06-13T15:06:31Z",
|
||||
"pushed_at": "2018-06-13T15:06:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 153427159,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "SoledaD208\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "SoledaD208",
|
||||
"id": 8731578,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8731578?v=4",
|
||||
"html_url": "https:\/\/github.com\/SoledaD208"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SoledaD208\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 very simple POC",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T09:01:44Z",
|
||||
"updated_at": "2020-04-08T19:40:08Z",
|
||||
"pushed_at": "2018-10-23T13:51:06Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 133,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153468806,
|
||||
"name": "CVE-2018-10933",
|
||||
|
@ -36,8 +13,8 @@
|
|||
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T14:14:12Z",
|
||||
"updated_at": "2020-07-21T22:45:37Z",
|
||||
"pushed_at": "2020-01-29T10:28:44Z",
|
||||
"updated_at": "2020-07-24T17:54:58Z",
|
||||
"pushed_at": "2020-07-24T17:54:54Z",
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"forks_count": 116,
|
||||
|
@ -45,328 +22,6 @@
|
|||
"watchers": 470,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153477523,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "hook-s3c\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "hook-s3c",
|
||||
"id": 31825993,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/31825993?v=4",
|
||||
"html_url": "https:\/\/github.com\/hook-s3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T15:09:41Z",
|
||||
"updated_at": "2018-10-17T15:09:44Z",
|
||||
"pushed_at": "2018-10-17T15:09:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153506738,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "kn6869610\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "kn6869610",
|
||||
"id": 6917744,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6917744?v=4",
|
||||
"html_url": "https:\/\/github.com\/kn6869610"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
|
||||
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T18:44:05Z",
|
||||
"updated_at": "2018-10-22T03:02:27Z",
|
||||
"pushed_at": "2018-10-17T18:45:30Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153534574,
|
||||
"name": "libssh-scanner",
|
||||
"full_name": "leapsecurity\/libssh-scanner",
|
||||
"owner": {
|
||||
"login": "leapsecurity",
|
||||
"id": 40601062,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40601062?v=4",
|
||||
"html_url": "https:\/\/github.com\/leapsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/leapsecurity\/libssh-scanner",
|
||||
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T23:05:10Z",
|
||||
"updated_at": "2020-05-02T18:32:31Z",
|
||||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 232,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153562229,
|
||||
"name": "CVE-2018-10933_ssh",
|
||||
"full_name": "denmilu\/CVE-2018-10933_ssh",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2018-10933_ssh",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T04:10:25Z",
|
||||
"updated_at": "2018-10-18T04:10:39Z",
|
||||
"pushed_at": "2018-10-18T04:10:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153562319,
|
||||
"name": "bpnd-libssh",
|
||||
"full_name": "trbpnd\/bpnd-libssh",
|
||||
"owner": {
|
||||
"login": "trbpnd",
|
||||
"id": 39193403,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39193403?v=4",
|
||||
"html_url": "https:\/\/github.com\/trbpnd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trbpnd\/bpnd-libssh",
|
||||
"description": "Multi-threaded, reliable scanner for CVE-2018-10933.",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T04:11:33Z",
|
||||
"updated_at": "2018-10-23T03:13:35Z",
|
||||
"pushed_at": "2018-10-22T16:44:13Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153598283,
|
||||
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"full_name": "denmilu\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T09:27:08Z",
|
||||
"updated_at": "2018-10-18T16:47:53Z",
|
||||
"pushed_at": "2018-10-18T09:27:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153643745,
|
||||
"name": "hunt-for-cve-2018-10933",
|
||||
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "marco-lancini",
|
||||
"id": 1472968,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1472968?v=4",
|
||||
"html_url": "https:\/\/github.com\/marco-lancini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T15:08:25Z",
|
||||
"updated_at": "2020-06-17T03:14:27Z",
|
||||
"pushed_at": "2018-10-18T15:11:35Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153675108,
|
||||
"name": "cve-2018-10933",
|
||||
"full_name": "hackerhouse-opensource\/cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "hackerhouse-opensource",
|
||||
"id": 43967630,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/43967630?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackerhouse-opensource"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2018-10933",
|
||||
"description": "cve-2018-10933 libssh authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T19:13:45Z",
|
||||
"updated_at": "2020-07-21T10:30:57Z",
|
||||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153681539,
|
||||
"name": "cve-2018-10933",
|
||||
"full_name": "cve-2018\/cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "cve-2018",
|
||||
"id": 44275695,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/44275695?v=4",
|
||||
"html_url": "https:\/\/github.com\/cve-2018"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cve-2018\/cve-2018-10933",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T20:11:22Z",
|
||||
"updated_at": "2018-10-23T03:22:26Z",
|
||||
"pushed_at": "2018-10-23T03:22:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153855090,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "jas502n\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
|
||||
"description": "libssh CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:24:04Z",
|
||||
"updated_at": "2019-07-31T09:33:04Z",
|
||||
"pushed_at": "2018-10-20T00:29:04Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153856713,
|
||||
"name": "cve-2018-10933_poc",
|
||||
"full_name": "ninp0\/cve-2018-10933_poc",
|
||||
"owner": {
|
||||
"login": "ninp0",
|
||||
"id": 1008583,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1008583?v=4",
|
||||
"html_url": "https:\/\/github.com\/ninp0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
|
||||
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:53:24Z",
|
||||
"updated_at": "2018-10-22T15:05:53Z",
|
||||
"pushed_at": "2018-10-20T01:53:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153878160,
|
||||
"name": "CVE-2018-10933_Scanner",
|
||||
"full_name": "pghook\/CVE-2018-10933_Scanner",
|
||||
"owner": {
|
||||
"login": "pghook",
|
||||
"id": 14160529,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14160529?v=4",
|
||||
"html_url": "https:\/\/github.com\/pghook"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T06:53:59Z",
|
||||
"updated_at": "2020-05-15T17:20:56Z",
|
||||
"pushed_at": "2018-10-20T04:54:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153920395,
|
||||
"name": "POC-CVE-2018-10933",
|
||||
"full_name": "Virgula0\/POC-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "Virgula0",
|
||||
"id": 16546435,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16546435?v=4",
|
||||
"html_url": "https:\/\/github.com\/Virgula0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Virgula0\/POC-CVE-2018-10933",
|
||||
"description": "LibSSH Authentication Bypass Exploit using RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T15:34:26Z",
|
||||
"updated_at": "2020-03-29T05:04:55Z",
|
||||
"pushed_at": "2018-10-25T18:23:52Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 153975086,
|
||||
"name": "pythonprojects-CVE-2018-10933",
|
||||
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "shifa123",
|
||||
"id": 18241082,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/18241082?v=4",
|
||||
"html_url": "https:\/\/github.com\/shifa123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-21T05:01:12Z",
|
||||
"updated_at": "2018-10-22T07:03:21Z",
|
||||
"pushed_at": "2018-10-21T05:13:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154050332,
|
||||
"name": "CVE-2018-10933",
|
||||
|
@ -390,190 +45,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154390432,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "Bifrozt\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "Bifrozt",
|
||||
"id": 8437560,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8437560?v=4",
|
||||
"html_url": "https:\/\/github.com\/Bifrozt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Bifrozt\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-23T20:11:35Z",
|
||||
"updated_at": "2018-10-23T20:14:53Z",
|
||||
"pushed_at": "2018-10-23T20:14:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154398082,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "r3dxpl0it\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "r3dxpl0it",
|
||||
"id": 43002597,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43002597?v=4",
|
||||
"html_url": "https:\/\/github.com\/r3dxpl0it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 POC (LIBSSH)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-23T21:17:52Z",
|
||||
"updated_at": "2020-04-06T19:25:11Z",
|
||||
"pushed_at": "2018-10-24T07:58:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154500673,
|
||||
"name": "libssh-scanner",
|
||||
"full_name": "ivanacostarubio\/libssh-scanner",
|
||||
"owner": {
|
||||
"login": "ivanacostarubio",
|
||||
"id": 16559,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16559?v=4",
|
||||
"html_url": "https:\/\/github.com\/ivanacostarubio"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ivanacostarubio\/libssh-scanner",
|
||||
"description": "A libssh CVE-2018-10933 scanner written in rust",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T12:52:09Z",
|
||||
"updated_at": "2019-02-24T23:51:07Z",
|
||||
"pushed_at": "2018-10-24T12:52:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154520949,
|
||||
"name": "precompiled-CVE-2018-10933",
|
||||
"full_name": "throwawayaccount12312312\/precompiled-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "throwawayaccount12312312",
|
||||
"id": 44440605,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44440605?v=4",
|
||||
"html_url": "https:\/\/github.com\/throwawayaccount12312312"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/throwawayaccount12312312\/precompiled-CVE-2018-10933",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T15:02:51Z",
|
||||
"updated_at": "2018-10-24T15:04:19Z",
|
||||
"pushed_at": "2018-10-24T15:04:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154621353,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "ensimag-security\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "ensimag-security",
|
||||
"id": 44459067,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/44459067?v=4",
|
||||
"html_url": "https:\/\/github.com\/ensimag-security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ensimag-security\/CVE-2018-10933",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-25T06:32:06Z",
|
||||
"updated_at": "2018-11-28T14:11:24Z",
|
||||
"pushed_at": "2018-11-28T14:14:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 157908147,
|
||||
"name": "libSSH-bypass",
|
||||
"full_name": "Ad1bDaw\/libSSH-bypass",
|
||||
"owner": {
|
||||
"login": "Ad1bDaw",
|
||||
"id": 35436703,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35436703?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ad1bDaw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ad1bDaw\/libSSH-bypass",
|
||||
"description": "Implementation of CVE-2018-10933 with CIDR block scanner ",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-16T18:46:28Z",
|
||||
"updated_at": "2018-11-16T19:00:29Z",
|
||||
"pushed_at": "2018-11-16T19:00:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158524069,
|
||||
"name": "CVE-2018-10933-POC",
|
||||
"full_name": "sambiyal\/CVE-2018-10933-POC",
|
||||
"owner": {
|
||||
"login": "sambiyal",
|
||||
"id": 25122043,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25122043?v=4",
|
||||
"html_url": "https:\/\/github.com\/sambiyal"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sambiyal\/CVE-2018-10933-POC",
|
||||
"description": "libSSH bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-21T09:34:12Z",
|
||||
"updated_at": "2018-11-21T09:57:11Z",
|
||||
"pushed_at": "2018-11-21T09:43:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162456991,
|
||||
"name": "LibSSH-Authentication-Bypass",
|
||||
"full_name": "nikhil1232\/LibSSH-Authentication-Bypass",
|
||||
"owner": {
|
||||
"login": "nikhil1232",
|
||||
"id": 39535219,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/39535219?v=4",
|
||||
"html_url": "https:\/\/github.com\/nikhil1232"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nikhil1232\/LibSSH-Authentication-Bypass",
|
||||
"description": "LibSSH Authentication Bypass CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-19T15:33:00Z",
|
||||
"updated_at": "2020-01-09T05:02:59Z",
|
||||
"pushed_at": "2018-12-19T15:46:37Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 169983604,
|
||||
"name": "LibSSH-exploit",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158224861,
|
||||
"name": "CVE-2018-10936",
|
||||
"full_name": "tafamace\/CVE-2018-10936",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-10936",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T13:09:47Z",
|
||||
"updated_at": "2018-11-19T13:13:10Z",
|
||||
"pushed_at": "2018-11-19T13:13:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 147528239,
|
||||
"name": "CVE-2018-10949",
|
||||
"full_name": "0x00-0x00\/CVE-2018-10949",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-10949",
|
||||
"description": "Zimbra Collaboration Suite Username Enumeration ",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-05T14:09:13Z",
|
||||
"updated_at": "2020-03-14T07:06:22Z",
|
||||
"pushed_at": "2018-09-05T14:10:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,48 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 133791805,
|
||||
"name": "CVE-2018-1111",
|
||||
"full_name": "knqyf263\/CVE-2018-1111",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1111",
|
||||
"description": "Environment for DynoRoot (CVE-2018-1111)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-17T09:37:19Z",
|
||||
"updated_at": "2020-06-05T14:56:50Z",
|
||||
"pushed_at": "2018-05-17T10:03:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 133957885,
|
||||
"name": "CVE-2018-1111",
|
||||
"full_name": "kkirsche\/CVE-2018-1111",
|
||||
"owner": {
|
||||
"login": "kkirsche",
|
||||
"id": 947110,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/947110?v=4",
|
||||
"html_url": "https:\/\/github.com\/kkirsche"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2018-1111",
|
||||
"description": "CVE-2018-1111 DynoRoot",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-18T13:27:43Z",
|
||||
"updated_at": "2019-11-19T04:37:35Z",
|
||||
"pushed_at": "2018-05-21T13:10:48Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,165 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 135505582,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "Rogdham\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "Rogdham",
|
||||
"id": 3994389,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3994389?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rogdham"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rogdham\/CVE-2018-11235",
|
||||
"description": "PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T22:56:29Z",
|
||||
"updated_at": "2020-07-15T05:59:17Z",
|
||||
"pushed_at": "2018-06-03T18:55:07Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135556339,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "vmotos\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "vmotos",
|
||||
"id": 22636953,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22636953?v=4",
|
||||
"html_url": "https:\/\/github.com\/vmotos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vmotos\/CVE-2018-11235",
|
||||
"description": "RCE vulnerability to exec \"git clone --recurse-submodule\" (CVE-2018-11235)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T08:38:17Z",
|
||||
"updated_at": "2018-05-31T09:11:10Z",
|
||||
"pushed_at": "2018-05-31T09:11:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135587582,
|
||||
"name": "cve-2018-11235",
|
||||
"full_name": "Choihosu\/cve-2018-11235",
|
||||
"owner": {
|
||||
"login": "Choihosu",
|
||||
"id": 18625744,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18625744?v=4",
|
||||
"html_url": "https:\/\/github.com\/Choihosu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Choihosu\/cve-2018-11235",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T13:29:06Z",
|
||||
"updated_at": "2018-05-31T13:29:06Z",
|
||||
"pushed_at": "2018-05-31T13:29:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 135652327,
|
||||
"name": "CVE-2018-11235-DEMO",
|
||||
"full_name": "CHYbeta\/CVE-2018-11235-DEMO",
|
||||
"owner": {
|
||||
"login": "CHYbeta",
|
||||
"id": 18642224,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18642224?v=4",
|
||||
"html_url": "https:\/\/github.com\/CHYbeta"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CHYbeta\/CVE-2018-11235-DEMO",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-06-01T01:26:19Z",
|
||||
"updated_at": "2020-07-05T15:28:14Z",
|
||||
"pushed_at": "2018-06-07T03:34:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136300278,
|
||||
"name": "CVE-2018-11235-poc",
|
||||
"full_name": "Kiss-sh0t\/CVE-2018-11235-poc",
|
||||
"owner": {
|
||||
"login": "Kiss-sh0t",
|
||||
"id": 16567682,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16567682?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kiss-sh0t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kiss-sh0t\/CVE-2018-11235-poc",
|
||||
"description": "for git v2.7.4",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-06T08:48:57Z",
|
||||
"updated_at": "2018-06-06T08:56:02Z",
|
||||
"pushed_at": "2018-06-06T08:54:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 136924699,
|
||||
"name": "clone_and_pwn",
|
||||
"full_name": "H0K5\/clone_and_pwn",
|
||||
"owner": {
|
||||
"login": "H0K5",
|
||||
"id": 8493152,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8493152?v=4",
|
||||
"html_url": "https:\/\/github.com\/H0K5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H0K5\/clone_and_pwn",
|
||||
"description": "Exploits CVE-2018-11235",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-11T12:41:34Z",
|
||||
"updated_at": "2020-05-25T14:25:16Z",
|
||||
"pushed_at": "2018-06-06T17:24:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 143149359,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "knqyf263\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11235",
|
||||
"description": "CVE-2018-11235 (Git)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-01T11:52:54Z",
|
||||
"updated_at": "2019-04-24T05:32:20Z",
|
||||
"pushed_at": "2018-11-23T14:34:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160238249,
|
||||
"name": "CVE-2018-11235",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 135661128,
|
||||
"name": "CVE-2018-11236",
|
||||
"full_name": "evilmiracle\/CVE-2018-11236",
|
||||
"owner": {
|
||||
"login": "evilmiracle",
|
||||
"id": 17810331,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17810331?v=4",
|
||||
"html_url": "https:\/\/github.com\/evilmiracle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evilmiracle\/CVE-2018-11236",
|
||||
"description": "Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-01T03:05:42Z",
|
||||
"updated_at": "2018-06-04T19:47:31Z",
|
||||
"pushed_at": "2018-05-31T07:32:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 134082464,
|
||||
"name": "mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password",
|
||||
"full_name": "EmreOvunc\/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password",
|
||||
"description": "CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-19T17:14:49Z",
|
||||
"updated_at": "2020-05-16T12:46:32Z",
|
||||
"pushed_at": "2018-07-02T14:26:13Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 138933947,
|
||||
"name": "Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability",
|
||||
"full_name": "LucvanDonk\/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability",
|
||||
"owner": {
|
||||
"login": "LucvanDonk",
|
||||
"id": 33685332,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33685332?v=4",
|
||||
"html_url": "https:\/\/github.com\/LucvanDonk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LucvanDonk\/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability",
|
||||
"description": "CVE-ID: CVE-2018-11450",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-27T21:16:57Z",
|
||||
"updated_at": "2019-02-10T04:58:12Z",
|
||||
"pushed_at": "2018-06-27T21:16:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 137818504,
|
||||
"name": "CVE-2018-11510",
|
||||
"full_name": "mefulton\/CVE-2018-11510",
|
||||
"owner": {
|
||||
"login": "mefulton",
|
||||
"id": 27797094,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27797094?v=4",
|
||||
"html_url": "https:\/\/github.com\/mefulton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mefulton\/CVE-2018-11510",
|
||||
"description": "Just a couple exploits for CVE-2018-11510",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-18T23:49:41Z",
|
||||
"updated_at": "2018-06-19T10:57:30Z",
|
||||
"pushed_at": "2018-06-19T10:57:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 134974554,
|
||||
"name": "mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"full_name": "EmreOvunc\/mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/mySCADA-myPRO-7-projectID-Disclosure",
|
||||
"description": "CVE-2018-11517 | mySCADA myPRO v7.0.46 has another vulnerability to discover all projects in the system.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-26T15:49:07Z",
|
||||
"updated_at": "2020-05-16T12:46:21Z",
|
||||
"pushed_at": "2018-05-28T21:51:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 135617105,
|
||||
"name": "bandexploit",
|
||||
"full_name": "xMagass\/bandexploit",
|
||||
"owner": {
|
||||
"login": "xMagass",
|
||||
"id": 17924254,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17924254?v=4",
|
||||
"html_url": "https:\/\/github.com\/xMagass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xMagass\/bandexploit",
|
||||
"description": "M1 Band Smart Watch Bluetooth Low Energy Exploit python script (CVE-2018-11631)",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-31T17:46:59Z",
|
||||
"updated_at": "2020-05-18T10:42:36Z",
|
||||
"pushed_at": "2018-07-27T10:28:43Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 155689679,
|
||||
"name": "CVE-2018-11759",
|
||||
"full_name": "immunIT\/CVE-2018-11759",
|
||||
"owner": {
|
||||
"login": "immunIT",
|
||||
"id": 17569882,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17569882?v=4",
|
||||
"html_url": "https:\/\/github.com\/immunIT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/immunIT\/CVE-2018-11759",
|
||||
"description": "Proof of concept showing how to exploit the CVE-2018-11759",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-01T09:11:07Z",
|
||||
"updated_at": "2020-07-13T15:43:59Z",
|
||||
"pushed_at": "2018-12-11T12:59:26Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160896534,
|
||||
"name": "Identificador-CVE-2018-11759",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 145897861,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "trbpnd\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "trbpnd",
|
||||
"id": 39193403,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39193403?v=4",
|
||||
"html_url": "https:\/\/github.com\/trbpnd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trbpnd\/CVE-2018-11776",
|
||||
"description": "Docker image for a vulnerable struts app",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-23T19:25:26Z",
|
||||
"updated_at": "2018-08-23T19:28:53Z",
|
||||
"pushed_at": "2018-08-23T19:28:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145901668,
|
||||
"name": "CVE-2018-11776",
|
||||
|
@ -45,236 +22,6 @@
|
|||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145935231,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "jiguangin\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "jiguangin",
|
||||
"id": 22545712,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22545712?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiguangin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiguangin\/CVE-2018-11776",
|
||||
"description": "CVE-2018-11776(S2-057) EXPLOIT CODE",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-24T03:01:29Z",
|
||||
"updated_at": "2019-06-18T01:56:08Z",
|
||||
"pushed_at": "2018-08-24T03:27:02Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145985371,
|
||||
"name": "CVE-2018-11776-Python-PoC",
|
||||
"full_name": "hook-s3c\/CVE-2018-11776-Python-PoC",
|
||||
"owner": {
|
||||
"login": "hook-s3c",
|
||||
"id": 31825993,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/31825993?v=4",
|
||||
"html_url": "https:\/\/github.com\/hook-s3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-11776-Python-PoC",
|
||||
"description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-24T11:53:02Z",
|
||||
"updated_at": "2020-05-14T19:08:54Z",
|
||||
"pushed_at": "2018-08-25T02:14:49Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146056002,
|
||||
"name": "struts-pwn_CVE-2018-11776",
|
||||
"full_name": "mazen160\/struts-pwn_CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "mazen160",
|
||||
"id": 8996052,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8996052?v=4",
|
||||
"html_url": "https:\/\/github.com\/mazen160"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2018-11776",
|
||||
"description": " An exploit for Apache Struts CVE-2018-11776",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T01:53:30Z",
|
||||
"updated_at": "2020-07-16T14:29:55Z",
|
||||
"pushed_at": "2018-08-26T02:31:39Z",
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 292,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146060181,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "bhdresh\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "bhdresh",
|
||||
"id": 8931885,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8931885?v=4",
|
||||
"html_url": "https:\/\/github.com\/bhdresh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2018-11776",
|
||||
"description": "Vulnerable docker container for CVE-2018-11776",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T03:06:30Z",
|
||||
"updated_at": "2020-01-06T22:41:00Z",
|
||||
"pushed_at": "2018-08-25T04:53:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146094544,
|
||||
"name": "CVE-2018-11776",
|
||||
"full_name": "knqyf263\/CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11776",
|
||||
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T12:45:15Z",
|
||||
"updated_at": "2020-04-06T19:13:36Z",
|
||||
"pushed_at": "2018-08-25T14:20:46Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146330536,
|
||||
"name": "Strutter",
|
||||
"full_name": "Ekultek\/Strutter",
|
||||
"owner": {
|
||||
"login": "Ekultek",
|
||||
"id": 14183473,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ekultek"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ekultek\/Strutter",
|
||||
"description": "Proof of Concept for CVE-2018-11776",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-27T17:22:16Z",
|
||||
"updated_at": "2019-07-08T12:23:26Z",
|
||||
"pushed_at": "2018-09-12T14:28:35Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146373342,
|
||||
"name": "cve-2018-11776-docker",
|
||||
"full_name": "tuxotron\/cve-2018-11776-docker",
|
||||
"owner": {
|
||||
"login": "tuxotron",
|
||||
"id": 937637,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/937637?v=4",
|
||||
"html_url": "https:\/\/github.com\/tuxotron"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tuxotron\/cve-2018-11776-docker",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T01:14:52Z",
|
||||
"updated_at": "2019-09-24T14:38:18Z",
|
||||
"pushed_at": "2018-08-29T17:58:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146519519,
|
||||
"name": "S2-057-CVE-2018-11776",
|
||||
"full_name": "brianwrf\/S2-057-CVE-2018-11776",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/S2-057-CVE-2018-11776",
|
||||
"description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T23:48:14Z",
|
||||
"updated_at": "2018-12-23T03:47:07Z",
|
||||
"pushed_at": "2018-08-29T00:03:56Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 146650579,
|
||||
"name": "Apache-Struts-Shodan-Exploit",
|
||||
"full_name": "649\/Apache-Struts-Shodan-Exploit",
|
||||
"owner": {
|
||||
"login": "649",
|
||||
"id": 23534047,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23534047?v=4",
|
||||
"html_url": "https:\/\/github.com\/649"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/649\/Apache-Struts-Shodan-Exploit",
|
||||
"description": "This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-29T19:50:26Z",
|
||||
"updated_at": "2020-07-12T20:51:26Z",
|
||||
"pushed_at": "2018-08-30T00:16:01Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 147746262,
|
||||
"name": "CVE-2018-11776-Python-PoC",
|
||||
"full_name": "jezzus\/CVE-2018-11776-Python-PoC",
|
||||
"owner": {
|
||||
"login": "jezzus",
|
||||
"id": 9899999,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9899999?v=4",
|
||||
"html_url": "https:\/\/github.com\/jezzus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jezzus\/CVE-2018-11776-Python-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-09-06T23:49:20Z",
|
||||
"updated_at": "2018-09-06T23:49:20Z",
|
||||
"pushed_at": "2018-09-06T23:49:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 164352202,
|
||||
"name": "cve-2018-11776",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 164298909,
|
||||
"name": "CVE-2018-11788",
|
||||
"full_name": "brianwrf\/CVE-2018-11788",
|
||||
"owner": {
|
||||
"login": "brianwrf",
|
||||
"id": 8141813,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
|
||||
"html_url": "https:\/\/github.com\/brianwrf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brianwrf\/CVE-2018-11788",
|
||||
"description": "Apache Karaf XXE Vulnerability (CVE-2018-11788)",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-06T11:01:39Z",
|
||||
"updated_at": "2020-03-29T02:47:45Z",
|
||||
"pushed_at": "2019-01-06T11:50:43Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 153770795,
|
||||
"name": "CVE-2018-12018",
|
||||
"full_name": "k3v142\/CVE-2018-12018",
|
||||
"owner": {
|
||||
"login": "k3v142",
|
||||
"id": 12337759,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12337759?v=4",
|
||||
"html_url": "https:\/\/github.com\/k3v142"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k3v142\/CVE-2018-12018",
|
||||
"description": "EPoD (Ethereum Packet of Death)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-19T11:11:01Z",
|
||||
"updated_at": "2019-12-14T15:32:33Z",
|
||||
"pushed_at": "2018-10-20T21:07:42Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 136349330,
|
||||
"name": "Eaton-Intelligent-Power-Manager-Local-File-Inclusion",
|
||||
"full_name": "EmreOvunc\/Eaton-Intelligent-Power-Manager-Local-File-Inclusion",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/Eaton-Intelligent-Power-Manager-Local-File-Inclusion",
|
||||
"description": "CVE-2018-12031 | LFI in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file, it can lead to sensitive information disclosure, denial of service and code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-06T15:31:29Z",
|
||||
"updated_at": "2020-05-16T12:46:43Z",
|
||||
"pushed_at": "2018-08-29T10:50:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 162155985,
|
||||
"name": "remote-bitlocker-encryption-report",
|
||||
"full_name": "gdraperi\/remote-bitlocker-encryption-report",
|
||||
"owner": {
|
||||
"login": "gdraperi",
|
||||
"id": 33750242,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33750242?v=4",
|
||||
"html_url": "https:\/\/github.com\/gdraperi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gdraperi\/remote-bitlocker-encryption-report",
|
||||
"description": "PowerShell script to mitigate CVE-2018-12038. The script takes a list of PC as input, gets their BitLocker encryption type remotely, and outputs a report as a CSV file",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-17T16:02:26Z",
|
||||
"updated_at": "2019-02-11T14:30:38Z",
|
||||
"pushed_at": "2018-12-07T20:11:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158208279,
|
||||
"name": "CVE-2018-12418",
|
||||
"full_name": "tafamace\/CVE-2018-12418",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12418",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:12:00Z",
|
||||
"updated_at": "2018-11-19T11:15:44Z",
|
||||
"pushed_at": "2018-11-19T11:15:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 140411928,
|
||||
"name": "CVE-2018-12463",
|
||||
"full_name": "alt3kx\/CVE-2018-12463",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12463",
|
||||
"description": "XML external entity (XXE) vulnerability in \/ssc\/fm-ws\/services in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 (0day CVE-2018-12463)",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-10T09:51:40Z",
|
||||
"updated_at": "2018-07-17T08:13:36Z",
|
||||
"pushed_at": "2018-07-17T08:13:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158209208,
|
||||
"name": "CVE-2018-12537",
|
||||
"full_name": "tafamace\/CVE-2018-12537",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12537",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:18:35Z",
|
||||
"updated_at": "2018-11-19T11:32:44Z",
|
||||
"pushed_at": "2018-11-19T11:32:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158212154,
|
||||
"name": "CVE-2018-12540",
|
||||
"full_name": "tafamace\/CVE-2018-12540",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-12540",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:41:16Z",
|
||||
"updated_at": "2018-11-19T11:46:57Z",
|
||||
"pushed_at": "2018-11-19T11:46:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158194793,
|
||||
"name": "CVE-2018-1259",
|
||||
"full_name": "tafamace\/CVE-2018-1259",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1259",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T09:25:32Z",
|
||||
"updated_at": "2018-11-19T09:32:46Z",
|
||||
"pushed_at": "2018-11-19T09:32:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 138130645,
|
||||
"name": "CVE-2018-12596",
|
||||
"full_name": "alt3kx\/CVE-2018-12596",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12596",
|
||||
"description": "Ektron Content Management System (CMS) 9.20 SP2, remote re-enabling users (CVE-2018–12596)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T06:47:05Z",
|
||||
"updated_at": "2018-10-11T00:25:47Z",
|
||||
"pushed_at": "2018-10-11T00:19:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 138131591,
|
||||
"name": "CVE-2018-12597",
|
||||
"full_name": "alt3kx\/CVE-2018-12597",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12597",
|
||||
"description": "CVE-2018-12597",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T06:55:39Z",
|
||||
"updated_at": "2018-06-21T07:03:41Z",
|
||||
"pushed_at": "2018-06-21T07:03:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 138132015,
|
||||
"name": "CVE-2018-12598",
|
||||
"full_name": "alt3kx\/CVE-2018-12598",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2018-12598",
|
||||
"description": "CVE-2018-12598",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T06:59:46Z",
|
||||
"updated_at": "2018-06-21T07:05:17Z",
|
||||
"pushed_at": "2018-06-21T07:05:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 156870746,
|
||||
"name": "CVE-2018-12613",
|
||||
"full_name": "0x00-0x00\/CVE-2018-12613",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-12613",
|
||||
"description": "PHPMyAdmin v4.8.0 and v.4.8.1 LFI exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-09T14:10:20Z",
|
||||
"updated_at": "2020-03-11T07:23:14Z",
|
||||
"pushed_at": "2018-11-09T14:42:23Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 208791479,
|
||||
"name": "CVE-2018-12613",
|
||||
|
|
|
@ -1,94 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 128482458,
|
||||
"name": "CVE-2018-1270",
|
||||
"full_name": "CaledoniaProject\/CVE-2018-1270",
|
||||
"owner": {
|
||||
"login": "CaledoniaProject",
|
||||
"id": 1357701,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1357701?v=4",
|
||||
"html_url": "https:\/\/github.com\/CaledoniaProject"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CaledoniaProject\/CVE-2018-1270",
|
||||
"description": "Spring messaging STOMP protocol RCE",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-07T00:14:33Z",
|
||||
"updated_at": "2020-06-06T02:33:44Z",
|
||||
"pushed_at": "2018-04-12T05:48:24Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129230393,
|
||||
"name": "CVE-2018-1270_EXP",
|
||||
"full_name": "genxor\/CVE-2018-1270_EXP",
|
||||
"owner": {
|
||||
"login": "genxor",
|
||||
"id": 3094713,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3094713?v=4",
|
||||
"html_url": "https:\/\/github.com\/genxor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/genxor\/CVE-2018-1270_EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T09:54:34Z",
|
||||
"updated_at": "2019-10-11T19:04:29Z",
|
||||
"pushed_at": "2018-04-12T10:00:45Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158213121,
|
||||
"name": "CVE-2018-1270",
|
||||
"full_name": "tafamace\/CVE-2018-1270",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1270",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T11:47:40Z",
|
||||
"updated_at": "2018-11-19T12:00:19Z",
|
||||
"pushed_at": "2018-11-19T12:00:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162062968,
|
||||
"name": "CVE-2018-1270",
|
||||
"full_name": "Venscor\/CVE-2018-1270",
|
||||
"owner": {
|
||||
"login": "Venscor",
|
||||
"id": 13192497,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13192497?v=4",
|
||||
"html_url": "https:\/\/github.com\/Venscor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Venscor\/CVE-2018-1270",
|
||||
"description": "CVE-2018-1270 表达式RCE环境",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-17T02:22:53Z",
|
||||
"updated_at": "2018-12-17T02:28:09Z",
|
||||
"pushed_at": "2018-12-17T02:28:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,73 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 129407531,
|
||||
"name": "CVE-2018-1273",
|
||||
"full_name": "knqyf263\/CVE-2018-1273",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-1273",
|
||||
"description": "Environment for CVE-2018-1273 (Spring Data Commons)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-13T13:41:02Z",
|
||||
"updated_at": "2019-04-24T05:33:19Z",
|
||||
"pushed_at": "2018-08-15T05:26:45Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 129910523,
|
||||
"name": "poc-cve-2018-1273",
|
||||
"full_name": "wearearima\/poc-cve-2018-1273",
|
||||
"owner": {
|
||||
"login": "wearearima",
|
||||
"id": 24791991,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24791991?v=4",
|
||||
"html_url": "https:\/\/github.com\/wearearima"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wearearima\/poc-cve-2018-1273",
|
||||
"description": "POC for CVE-2018-1273",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-17T13:41:00Z",
|
||||
"updated_at": "2020-07-03T09:49:03Z",
|
||||
"pushed_at": "2018-06-05T15:07:18Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 151734933,
|
||||
"name": "poc-cve-2018-1273",
|
||||
"full_name": "webr0ck\/poc-cve-2018-1273",
|
||||
"owner": {
|
||||
"login": "webr0ck",
|
||||
"id": 30629042,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/30629042?v=4",
|
||||
"html_url": "https:\/\/github.com\/webr0ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/webr0ck\/poc-cve-2018-1273",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-05T14:42:07Z",
|
||||
"updated_at": "2018-10-09T09:26:39Z",
|
||||
"pushed_at": "2018-10-05T14:42:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 166271014,
|
||||
"name": "cve-2018-1273",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 139890292,
|
||||
"name": "cve-2018-12895-hotfix",
|
||||
"full_name": "bloom-ux\/cve-2018-12895-hotfix",
|
||||
"owner": {
|
||||
"login": "bloom-ux",
|
||||
"id": 22582007,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22582007?v=4",
|
||||
"html_url": "https:\/\/github.com\/bloom-ux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bloom-ux\/cve-2018-12895-hotfix",
|
||||
"description": "Hotfix for file deletion to to code execution vulnerability in WordPress",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-05T19:09:17Z",
|
||||
"updated_at": "2018-07-05T19:48:44Z",
|
||||
"pushed_at": "2018-07-05T19:48:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 139261758,
|
||||
"name": "CVE-2018-12914",
|
||||
"full_name": "RealBearcat\/CVE-2018-12914",
|
||||
"owner": {
|
||||
"login": "RealBearcat",
|
||||
"id": 22558737,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22558737?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealBearcat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealBearcat\/CVE-2018-12914",
|
||||
"description": "Write a file to any directory",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-30T16:01:52Z",
|
||||
"updated_at": "2018-08-10T16:16:26Z",
|
||||
"pushed_at": "2018-06-30T16:13:44Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 124916199,
|
||||
"name": "CVE-2018-1305",
|
||||
"full_name": "RealBearcat\/CVE-2018-1305",
|
||||
"owner": {
|
||||
"login": "RealBearcat",
|
||||
"id": 22558737,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22558737?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealBearcat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealBearcat\/CVE-2018-1305",
|
||||
"description": "Apache Tomcat 安全绕过漏洞 Poc",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-12T16:09:46Z",
|
||||
"updated_at": "2020-06-29T00:55:42Z",
|
||||
"pushed_at": "2018-06-01T10:05:52Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158220324,
|
||||
"name": "CVE-2018-1313",
|
||||
"full_name": "tafamace\/CVE-2018-1313",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1313",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T12:38:21Z",
|
||||
"updated_at": "2018-11-19T12:48:53Z",
|
||||
"pushed_at": "2018-11-19T12:48:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158221452,
|
||||
"name": "CVE-2018-1324",
|
||||
"full_name": "tafamace\/CVE-2018-1324",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-1324",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T12:46:37Z",
|
||||
"updated_at": "2018-11-19T13:04:11Z",
|
||||
"pushed_at": "2018-11-19T13:04:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 132801823,
|
||||
"name": "S2-056-XStream",
|
||||
"full_name": "RealBearcat\/S2-056-XStream",
|
||||
"owner": {
|
||||
"login": "RealBearcat",
|
||||
"id": 22558737,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22558737?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealBearcat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealBearcat\/S2-056-XStream",
|
||||
"description": "S2-056 DoS CVE-2018-1327",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-09T19:09:08Z",
|
||||
"updated_at": "2019-05-13T07:49:38Z",
|
||||
"pushed_at": "2018-05-10T05:14:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 141165293,
|
||||
"name": "prestashop-exploits",
|
||||
"full_name": "ambionics\/prestashop-exploits",
|
||||
"owner": {
|
||||
"login": "ambionics",
|
||||
"id": 29630660,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29630660?v=4",
|
||||
"html_url": "https:\/\/github.com\/ambionics"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits",
|
||||
"description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-16T16:33:41Z",
|
||||
"updated_at": "2020-05-24T02:31:37Z",
|
||||
"pushed_at": "2018-07-17T09:02:34Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158196795,
|
||||
"name": "CVE-2018-13864",
|
||||
"full_name": "tafamace\/CVE-2018-13864",
|
||||
"owner": {
|
||||
"login": "tafamace",
|
||||
"id": 45160113,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45160113?v=4",
|
||||
"html_url": "https:\/\/github.com\/tafamace"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tafamace\/CVE-2018-13864",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-19T09:40:47Z",
|
||||
"updated_at": "2018-11-19T09:45:34Z",
|
||||
"pushed_at": "2018-11-19T09:45:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 144012223,
|
||||
"name": "legacySymfony",
|
||||
"full_name": "lckJack\/legacySymfony",
|
||||
"owner": {
|
||||
"login": "lckJack",
|
||||
"id": 38405856,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/38405856?v=4",
|
||||
"html_url": "https:\/\/github.com\/lckJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lckJack\/legacySymfony",
|
||||
"description": "Easy script to check if drupal 8.x-8.5.6 is vulnerable to CVE-2018-14.773",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T12:42:56Z",
|
||||
"updated_at": "2018-08-08T17:28:27Z",
|
||||
"pushed_at": "2018-08-08T12:46:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 142094467,
|
||||
"name": "CVE-2018-14083",
|
||||
"full_name": "pudding2\/CVE-2018-14083",
|
||||
"owner": {
|
||||
"login": "pudding2",
|
||||
"id": 28480779,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28480779?v=4",
|
||||
"html_url": "https:\/\/github.com\/pudding2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pudding2\/CVE-2018-14083",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-24T02:36:08Z",
|
||||
"updated_at": "2019-01-14T11:31:59Z",
|
||||
"pushed_at": "2018-07-24T02:56:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 163386526,
|
||||
"name": "CVE-2018-14442",
|
||||
"full_name": "payatu\/CVE-2018-14442",
|
||||
"owner": {
|
||||
"login": "payatu",
|
||||
"id": 16715624,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4",
|
||||
"html_url": "https:\/\/github.com\/payatu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/payatu\/CVE-2018-14442",
|
||||
"description": "PoC for Foxit Reader CVE-2018-14442",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-28T08:29:28Z",
|
||||
"updated_at": "2020-07-23T19:50:15Z",
|
||||
"pushed_at": "2018-12-28T09:46:29Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 215229045,
|
||||
"name": "PS-2018-002---CVE-2018-14442",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 152124947,
|
||||
"name": "cve-2018-14634",
|
||||
"full_name": "luan0ap\/cve-2018-14634",
|
||||
"owner": {
|
||||
"login": "luan0ap",
|
||||
"id": 26953960,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26953960?v=4",
|
||||
"html_url": "https:\/\/github.com\/luan0ap"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/luan0ap\/cve-2018-14634",
|
||||
"description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-08T18:12:03Z",
|
||||
"updated_at": "2020-03-29T03:02:36Z",
|
||||
"pushed_at": "2018-10-09T16:44:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 154950649,
|
||||
"name": "CVE-2018-14665",
|
||||
"full_name": "jas502n\/CVE-2018-14665",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14665",
|
||||
"description": "OpenBsd_CVE-2018-14665",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-27T10:12:05Z",
|
||||
"updated_at": "2019-06-29T02:52:18Z",
|
||||
"pushed_at": "2018-10-27T10:44:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155795794,
|
||||
"name": "CVE-2018-14665",
|
||||
|
|
|
@ -1,96 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 158057391,
|
||||
"name": "cve-2018-14667",
|
||||
"full_name": "nareshmail\/cve-2018-14667",
|
||||
"owner": {
|
||||
"login": "nareshmail",
|
||||
"id": 6008091,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6008091?v=4",
|
||||
"html_url": "https:\/\/github.com\/nareshmail"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nareshmail\/cve-2018-14667",
|
||||
"description": "cve-2018-14667 demo",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-18T06:43:46Z",
|
||||
"updated_at": "2020-04-01T03:46:35Z",
|
||||
"pushed_at": "2018-11-17T04:13:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 158791727,
|
||||
"name": "CVE-2018-14667",
|
||||
"full_name": "zeroto01\/CVE-2018-14667",
|
||||
"owner": {
|
||||
"login": "zeroto01",
|
||||
"id": 45281392,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/45281392?v=4",
|
||||
"html_url": "https:\/\/github.com\/zeroto01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zeroto01\/CVE-2018-14667",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-11-23T06:44:49Z",
|
||||
"updated_at": "2018-11-27T04:22:10Z",
|
||||
"pushed_at": "2018-11-23T06:50:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 159462372,
|
||||
"name": "CVE-2018-14667",
|
||||
"full_name": "r00t4dm\/CVE-2018-14667",
|
||||
"owner": {
|
||||
"login": "r00t4dm",
|
||||
"id": 36941976,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/36941976?v=4",
|
||||
"html_url": "https:\/\/github.com\/r00t4dm"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r00t4dm\/CVE-2018-14667",
|
||||
"description": "about CVE-2018-14667 from RichFaces Framework 3.3.4",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-28T07:35:28Z",
|
||||
"updated_at": "2018-11-29T02:48:19Z",
|
||||
"pushed_at": "2018-11-29T02:48:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 159766854,
|
||||
"name": "CVE-2018-14667",
|
||||
"full_name": "syriusbughunt\/CVE-2018-14667",
|
||||
"owner": {
|
||||
"login": "syriusbughunt",
|
||||
"id": 45476916,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/45476916?v=4",
|
||||
"html_url": "https:\/\/github.com\/syriusbughunt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syriusbughunt\/CVE-2018-14667",
|
||||
"description": "All about CVE-2018-14667; From what it is to how to successfully exploit it.",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-30T04:06:08Z",
|
||||
"updated_at": "2020-07-17T11:58:52Z",
|
||||
"pushed_at": "2018-11-30T07:10:44Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 199370771,
|
||||
"name": "cve-2018-14667",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 146291248,
|
||||
"name": "CVE-2018-14729",
|
||||
"full_name": "FoolMitAh\/CVE-2018-14729",
|
||||
"owner": {
|
||||
"login": "FoolMitAh",
|
||||
"id": 23001766,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23001766?v=4",
|
||||
"html_url": "https:\/\/github.com\/FoolMitAh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FoolMitAh\/CVE-2018-14729",
|
||||
"description": "Discuz backend getshell",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-27T11:58:49Z",
|
||||
"updated_at": "2020-06-30T08:50:01Z",
|
||||
"pushed_at": "2018-12-15T10:30:34Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 148241935,
|
||||
"name": "CVE-2018-14772",
|
||||
"full_name": "spencerdodd\/CVE-2018-14772",
|
||||
"owner": {
|
||||
"login": "spencerdodd",
|
||||
"id": 9969454,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/9969454?v=4",
|
||||
"html_url": "https:\/\/github.com\/spencerdodd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/spencerdodd\/CVE-2018-14772",
|
||||
"description": "RCE exploit for CVE-2018-14772",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-11T01:24:21Z",
|
||||
"updated_at": "2019-11-15T05:24:10Z",
|
||||
"pushed_at": "2018-11-01T01:47:17Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,75 +22,6 @@
|
|||
"watchers": 364,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 148370201,
|
||||
"name": "WinboxExploit",
|
||||
"full_name": "msterusky\/WinboxExploit",
|
||||
"owner": {
|
||||
"login": "msterusky",
|
||||
"id": 29436829,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29436829?v=4",
|
||||
"html_url": "https:\/\/github.com\/msterusky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
|
||||
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-11T19:36:49Z",
|
||||
"updated_at": "2020-01-10T14:58:08Z",
|
||||
"pushed_at": "2018-09-11T20:12:25Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 152906288,
|
||||
"name": "MikroRoot",
|
||||
"full_name": "syrex1013\/MikroRoot",
|
||||
"owner": {
|
||||
"login": "syrex1013",
|
||||
"id": 31669127,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/31669127?v=4",
|
||||
"html_url": "https:\/\/github.com\/syrex1013"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
|
||||
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-13T19:17:42Z",
|
||||
"updated_at": "2020-07-22T07:07:28Z",
|
||||
"pushed_at": "2018-10-14T08:39:24Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161894724,
|
||||
"name": "CVE-2018-14847",
|
||||
"full_name": "jas502n\/CVE-2018-14847",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
|
||||
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-15T10:38:26Z",
|
||||
"updated_at": "2019-12-04T18:02:05Z",
|
||||
"pushed_at": "2018-12-16T04:15:01Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 178807607,
|
||||
"name": "winboxPOC",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 147528539,
|
||||
"name": "CVE-2018-15131",
|
||||
"full_name": "0x00-0x00\/CVE-2018-15131",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2018-15131",
|
||||
"description": "Zimbra Collaboration Suite Username Enumeration ",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-05T14:11:16Z",
|
||||
"updated_at": "2018-10-28T04:05:13Z",
|
||||
"pushed_at": "2018-09-05T14:11:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 144760095,
|
||||
"name": "laravel-poc-CVE-2018-15133",
|
||||
"full_name": "kozmic\/laravel-poc-CVE-2018-15133",
|
||||
"owner": {
|
||||
"login": "kozmic",
|
||||
"id": 6666,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6666?v=4",
|
||||
"html_url": "https:\/\/github.com\/kozmic"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kozmic\/laravel-poc-CVE-2018-15133",
|
||||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2020-07-14T06:23:18Z",
|
||||
"pushed_at": "2018-09-27T07:32:19Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 243072477,
|
||||
"name": "Laravel-CVE-2018-15133",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 150475298,
|
||||
"name": "CVE-2018-15365",
|
||||
"full_name": "nixwizard\/CVE-2018-15365",
|
||||
"owner": {
|
||||
"login": "nixwizard",
|
||||
"id": 3982790,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3982790?v=4",
|
||||
"html_url": "https:\/\/github.com\/nixwizard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nixwizard\/CVE-2018-15365",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-09-26T18:56:41Z",
|
||||
"updated_at": "2018-09-27T07:31:12Z",
|
||||
"pushed_at": "2018-09-27T07:31:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,29 +22,6 @@
|
|||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145296891,
|
||||
"name": "opensshenum",
|
||||
"full_name": "gbonacini\/opensshenum",
|
||||
"owner": {
|
||||
"login": "gbonacini",
|
||||
"id": 5440458,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5440458?v=4",
|
||||
"html_url": "https:\/\/github.com\/gbonacini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gbonacini\/opensshenum",
|
||||
"description": "CVE-2018-15473 - Opensshenum is an user enumerator exploiting an OpenSsh bug",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-19T11:23:54Z",
|
||||
"updated_at": "2019-09-15T11:44:34Z",
|
||||
"pushed_at": "2018-10-17T12:27:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 145483388,
|
||||
"name": "CVE-2018-15473-Exploit",
|
||||
|
@ -114,75 +91,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 154573529,
|
||||
"name": "CVE-2018-15473",
|
||||
"full_name": "r3dxpl0it\/CVE-2018-15473",
|
||||
"owner": {
|
||||
"login": "r3dxpl0it",
|
||||
"id": 43002597,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43002597?v=4",
|
||||
"html_url": "https:\/\/github.com\/r3dxpl0it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r3dxpl0it\/CVE-2018-15473",
|
||||
"description": "OpenSSH 7.7 - Username Enumeration",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-24T21:48:07Z",
|
||||
"updated_at": "2020-05-01T20:47:59Z",
|
||||
"pushed_at": "2018-10-27T01:07:49Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155426753,
|
||||
"name": "CrappyCode",
|
||||
"full_name": "JoeBlackSecurity\/CrappyCode",
|
||||
"owner": {
|
||||
"login": "JoeBlackSecurity",
|
||||
"id": 44617164,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44617164?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity\/CrappyCode",
|
||||
"description": "Functional script for brute forcing SSH and trying credentials - CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-30T17:17:09Z",
|
||||
"updated_at": "2018-11-06T19:03:05Z",
|
||||
"pushed_at": "2018-11-06T19:03:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155492594,
|
||||
"name": "SSHUsernameBruter-SSHUB",
|
||||
"full_name": "JoeBlackSecurity\/SSHUsernameBruter-SSHUB",
|
||||
"owner": {
|
||||
"login": "JoeBlackSecurity",
|
||||
"id": 44617164,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44617164?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity\/SSHUsernameBruter-SSHUB",
|
||||
"description": "Fully functional script for brute forcing SSH and trying credentials - CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-31T03:23:46Z",
|
||||
"updated_at": "2020-04-23T05:36:20Z",
|
||||
"pushed_at": "2018-12-05T12:04:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 165318682,
|
||||
"name": "cve-2018-15473",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 145583266,
|
||||
"name": "CVE-2018-15499",
|
||||
"full_name": "DownWithUp\/CVE-2018-15499",
|
||||
"owner": {
|
||||
"login": "DownWithUp",
|
||||
"id": 16905064,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16905064?v=4",
|
||||
"html_url": "https:\/\/github.com\/DownWithUp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DownWithUp\/CVE-2018-15499",
|
||||
"description": "PoC code for CVE-2018-15499 (exploit race condition for BSoD)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T15:26:35Z",
|
||||
"updated_at": "2020-06-19T06:54:55Z",
|
||||
"pushed_at": "2018-08-23T12:55:23Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 146628899,
|
||||
"name": "grafana-CVE-2018-15727",
|
||||
"full_name": "u238\/grafana-CVE-2018-15727",
|
||||
"owner": {
|
||||
"login": "u238",
|
||||
"id": 2368573,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2368573?v=4",
|
||||
"html_url": "https:\/\/github.com\/u238"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/u238\/grafana-CVE-2018-15727",
|
||||
"description": "a small utility to generate a cookie in order to exploit a grafana vulnerability (CVE-2018-15727)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-29T16:35:22Z",
|
||||
"updated_at": "2020-04-05T16:34:49Z",
|
||||
"pushed_at": "2018-08-31T20:31:12Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 148423840,
|
||||
"name": "Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
|
||||
"full_name": "JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
|
||||
"owner": {
|
||||
"login": "JacksonKuo",
|
||||
"id": 5520730,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5520730?v=4",
|
||||
"html_url": "https:\/\/github.com\/JacksonKuo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JacksonKuo\/Ubisoft-Uplay-Desktop-Client-63.0.5699.0",
|
||||
"description": "CVE-2018-15832",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-12T04:59:11Z",
|
||||
"updated_at": "2018-09-12T05:05:37Z",
|
||||
"pushed_at": "2018-09-12T05:00:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 146484081,
|
||||
"name": "CVE-2018-15912-PoC",
|
||||
"full_name": "coderobe\/CVE-2018-15912-PoC",
|
||||
"owner": {
|
||||
"login": "coderobe",
|
||||
"id": 8442384,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8442384?v=4",
|
||||
"html_url": "https:\/\/github.com\/coderobe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/coderobe\/CVE-2018-15912-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-08-28T17:40:52Z",
|
||||
"updated_at": "2018-08-30T10:59:24Z",
|
||||
"pushed_at": "2018-08-28T17:54:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 160696698,
|
||||
"name": "CVE-2018-15961",
|
||||
"full_name": "vah13\/CVE-2018-15961",
|
||||
"owner": {
|
||||
"login": "vah13",
|
||||
"id": 7976421,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7976421?v=4",
|
||||
"html_url": "https:\/\/github.com\/vah13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vah13\/CVE-2018-15961",
|
||||
"description": "Unrestricted file upload in Adobe ColdFusion",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-06T15:47:57Z",
|
||||
"updated_at": "2019-10-21T04:12:24Z",
|
||||
"pushed_at": "2018-12-11T16:06:39Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 166859165,
|
||||
"name": "cve-2018-15961",
|
||||
|
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 160592463,
|
||||
"name": "CVE-2018-15982",
|
||||
"full_name": "FlatL1neAPT\/CVE-2018-15982",
|
||||
"owner": {
|
||||
"login": "FlatL1neAPT",
|
||||
"id": 33692082,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33692082?v=4",
|
||||
"html_url": "https:\/\/github.com\/FlatL1neAPT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FlatL1neAPT\/CVE-2018-15982",
|
||||
"description": "Flash sources for CVE-2018-15982 used by NK",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-05T23:41:37Z",
|
||||
"updated_at": "2020-03-30T04:44:32Z",
|
||||
"pushed_at": "2018-12-05T21:42:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 160650543,
|
||||
"name": "CVE-2018-15982_PoC",
|
||||
|
@ -45,29 +22,6 @@
|
|||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161118743,
|
||||
"name": "CVE-2018-15982_EXP",
|
||||
"full_name": "Ridter\/CVE-2018-15982_EXP",
|
||||
"owner": {
|
||||
"login": "Ridter",
|
||||
"id": 6007471,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6007471?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ridter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ridter\/CVE-2018-15982_EXP",
|
||||
"description": "exp of CVE-2018-15982",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-10T04:53:31Z",
|
||||
"updated_at": "2020-06-27T16:22:03Z",
|
||||
"pushed_at": "2019-01-04T09:29:01Z",
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 176,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161362902,
|
||||
"name": "adobe-flash-cve2018-15982",
|
||||
|
@ -91,29 +45,6 @@
|
|||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161422909,
|
||||
"name": "CVE-2018-15982_EXP_IE",
|
||||
"full_name": "jas502n\/CVE-2018-15982_EXP_IE",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-15982_EXP_IE",
|
||||
"description": "CVE-2018-15982_EXP_IE",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-12T02:41:31Z",
|
||||
"updated_at": "2020-04-06T10:50:19Z",
|
||||
"pushed_at": "2018-12-12T02:54:01Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161431093,
|
||||
"name": "CVE-2018-15982",
|
||||
|
@ -137,29 +68,6 @@
|
|||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 162516879,
|
||||
"name": "CVE-2018-15982",
|
||||
"full_name": "SyFi\/CVE-2018-15982",
|
||||
"owner": {
|
||||
"login": "SyFi",
|
||||
"id": 26314806,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
|
||||
"html_url": "https:\/\/github.com\/SyFi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SyFi\/CVE-2018-15982",
|
||||
"description": "Flash 2018-15982 UAF ",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-20T02:40:22Z",
|
||||
"updated_at": "2020-02-13T14:33:56Z",
|
||||
"pushed_at": "2018-12-20T11:14:56Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 219955315,
|
||||
"name": "CVE-2018-15982",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 161401564,
|
||||
"name": "CVE-2018-16156-Exploit",
|
||||
"full_name": "securifera\/CVE-2018-16156-Exploit",
|
||||
"owner": {
|
||||
"login": "securifera",
|
||||
"id": 12126525,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12126525?v=4",
|
||||
"html_url": "https:\/\/github.com\/securifera"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/securifera\/CVE-2018-16156-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-12-11T22:25:22Z",
|
||||
"updated_at": "2020-03-30T03:50:41Z",
|
||||
"pushed_at": "2018-12-11T22:29:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 147602690,
|
||||
"name": "CVE-2018-16370",
|
||||
"full_name": "snappyJack\/CVE-2018-16370",
|
||||
"owner": {
|
||||
"login": "snappyJack",
|
||||
"id": 16055573,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16055573?v=4",
|
||||
"html_url": "https:\/\/github.com\/snappyJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16370",
|
||||
"description": "In PESCMS Team 2.2.1, attackers may upload and execute arbitrary PHP code through \/Public\/?g=Team&m=Setting&a=upgrade by placing a .php file in a ZIP archive.",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-06T01:52:47Z",
|
||||
"updated_at": "2018-09-06T02:02:55Z",
|
||||
"pushed_at": "2018-09-06T02:02:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 147603389,
|
||||
"name": "CVE-2018-16373",
|
||||
"full_name": "snappyJack\/CVE-2018-16373",
|
||||
"owner": {
|
||||
"login": "snappyJack",
|
||||
"id": 16055573,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16055573?v=4",
|
||||
"html_url": "https:\/\/github.com\/snappyJack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/snappyJack\/CVE-2018-16373",
|
||||
"description": "Frog CMS 0.9.5 has an Upload > vulnerability that can create files via > \/admin\/?\/plugin\/file_manager\/save",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-06T02:00:24Z",
|
||||
"updated_at": "2018-09-06T02:01:33Z",
|
||||
"pushed_at": "2018-09-06T02:01:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,27 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 153072697,
|
||||
"name": "PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"full_name": "farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"owner": {
|
||||
"login": "farisv",
|
||||
"id": 44131180,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44131180?v=4",
|
||||
"html_url": "https:\/\/github.com\/farisv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
||||
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-15T07:44:43Z",
|
||||
"updated_at": "2020-07-19T19:44:52Z",
|
||||
"pushed_at": "2018-10-15T08:19:54Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 157982249,
|
||||
"name": "CVE-2018-16509",
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 150069748,
|
||||
"name": "CVE-2018-16624",
|
||||
"full_name": "security-breachlock\/CVE-2018-16624",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16624",
|
||||
"description": "Stored XSS Kirby CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-24T07:46:38Z",
|
||||
"updated_at": "2019-01-11T09:33:59Z",
|
||||
"pushed_at": "2019-01-11T09:33:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 150070453,
|
||||
"name": "CVE-2018-16625",
|
||||
"full_name": "security-breachlock\/CVE-2018-16625",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16625",
|
||||
"description": "XSS via svg fileupload in Typesetter CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-24T07:54:06Z",
|
||||
"updated_at": "2019-01-11T09:41:51Z",
|
||||
"pushed_at": "2019-01-11T09:41:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 150552082,
|
||||
"name": "CVE-2018-16626",
|
||||
"full_name": "security-breachlock\/CVE-2018-16626",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16626",
|
||||
"description": "Stored XSS in Typesetter CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-27T08:11:26Z",
|
||||
"updated_at": "2019-01-11T09:45:22Z",
|
||||
"pushed_at": "2019-01-11T09:45:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 150694820,
|
||||
"name": "CVE-2018-16627",
|
||||
"full_name": "security-breachlock\/CVE-2018-16627",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16627",
|
||||
"description": "HOST HEADER INJECTION in Kirby CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-28T06:21:28Z",
|
||||
"updated_at": "2019-01-11T09:56:34Z",
|
||||
"pushed_at": "2019-01-11T09:56:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 155963381,
|
||||
"name": "CVE-2018-16628",
|
||||
"full_name": "security-breachlock\/CVE-2018-16628",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16628",
|
||||
"description": "Stored XSS Kirby CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-03T08:11:05Z",
|
||||
"updated_at": "2019-01-11T10:31:29Z",
|
||||
"pushed_at": "2019-01-11T10:31:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 157352268,
|
||||
"name": "CVE-2018-16629",
|
||||
"full_name": "security-breachlock\/CVE-2018-16629",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16629",
|
||||
"description": "XSS via svg fileupload in subrion cms",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T09:14:55Z",
|
||||
"updated_at": "2019-01-11T10:15:11Z",
|
||||
"pushed_at": "2019-01-11T10:15:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 157355261,
|
||||
"name": "CVE-2018-16631",
|
||||
"full_name": "security-breachlock\/CVE-2018-16631",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16631",
|
||||
"description": "Stored XSS in Subrion CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T09:35:54Z",
|
||||
"updated_at": "2019-01-11T10:58:51Z",
|
||||
"pushed_at": "2019-01-11T10:58:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 158348552,
|
||||
"name": "CVE-2018-16632",
|
||||
"full_name": "security-breachlock\/CVE-2018-16632",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16632",
|
||||
"description": "Persistent Cross site Scripting in Mezzanine",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-20T07:31:52Z",
|
||||
"updated_at": "2019-01-11T11:02:55Z",
|
||||
"pushed_at": "2019-01-11T11:02:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 157356124,
|
||||
"name": "CVE-2018-16633",
|
||||
"full_name": "security-breachlock\/CVE-2018-16633",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16633",
|
||||
"description": "Stored XSS in Pluck CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T09:41:51Z",
|
||||
"updated_at": "2019-01-11T11:05:58Z",
|
||||
"pushed_at": "2019-01-11T11:05:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 157358191,
|
||||
"name": "CVE-2018-16634",
|
||||
"full_name": "security-breachlock\/CVE-2018-16634",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16634",
|
||||
"description": "CSRF in Pluck CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T09:57:20Z",
|
||||
"updated_at": "2019-01-11T11:09:17Z",
|
||||
"pushed_at": "2019-01-11T11:09:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 157364026,
|
||||
"name": "CVE-2018-16635",
|
||||
"full_name": "security-breachlock\/CVE-2018-16635",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16635",
|
||||
"description": "Stored XSS in Blackcat CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T10:43:08Z",
|
||||
"updated_at": "2019-01-11T11:24:19Z",
|
||||
"pushed_at": "2019-01-11T11:24:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 157376507,
|
||||
"name": "CVE-2018-16636",
|
||||
"full_name": "security-breachlock\/CVE-2018-16636",
|
||||
"owner": {
|
||||
"login": "security-breachlock",
|
||||
"id": 41563984,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/41563984?v=4",
|
||||
"html_url": "https:\/\/github.com\/security-breachlock"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/security-breachlock\/CVE-2018-16636",
|
||||
"description": "HTML Injection in Nucleus CMS",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T12:25:43Z",
|
||||
"updated_at": "2019-01-11T11:34:51Z",
|
||||
"pushed_at": "2019-01-11T11:34:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue