Auto Update 2022/12/28 00:32:24

This commit is contained in:
motikan2010-bot 2022-12-28 09:32:24 +09:00
parent 62424e23ce
commit f1d4154e21
2387 changed files with 51268 additions and 42038 deletions

31
2003/CVE-2003-0190.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746260,
"name": "CVE-2003-0190",
"full_name": "Live-Hack-CVE\/CVE-2003-0190",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2003-0190",
"description": "OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:51:02Z",
"updated_at": "2022-12-27T18:51:02Z",
"pushed_at": "2022-12-27T18:51:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2003/CVE-2003-1562.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746312,
"name": "CVE-2003-1562",
"full_name": "Live-Hack-CVE\/CVE-2003-1562",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2003-1562",
"description": "sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step au CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:51:13Z",
"updated_at": "2022-12-27T18:51:13Z",
"pushed_at": "2022-12-27T18:51:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2006/CVE-2006-3240.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582768814,
"name": "CVE-2006-3240",
"full_name": "Live-Hack-CVE\/CVE-2006-3240",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2006-3240",
"description": "Cross-site scripting (XSS) vulnerability in classes\/ui.class.php in dotProject 2.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the login parameter. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:19:19Z",
"updated_at": "2022-12-27T20:19:20Z",
"pushed_at": "2022-12-27T20:19:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2010/CVE-2010-1717.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582735937,
"name": "CVE-2010-1717",
"full_name": "Live-Hack-CVE\/CVE-2010-1717",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2010-1717",
"description": "Directory traversal vulnerability in the iF surfALERT (com_if_surfalert) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:13:20Z",
"updated_at": "2022-12-27T18:13:20Z",
"pushed_at": "2022-12-27T18:13:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2012/CVE-2012-1717.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582735314,
"name": "CVE-2012-1717",
"full_name": "Live-Hack-CVE\/CVE-2012-1717",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2012-1717",
"description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:11:05Z",
"updated_at": "2022-12-27T18:11:05Z",
"pushed_at": "2022-12-27T18:11:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2012/CVE-2012-3412.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582735295,
"name": "CVE-2012-3412",
"full_name": "Live-Hack-CVE\/CVE-2012-3412",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2012-3412",
"description": "The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:11:01Z",
"updated_at": "2022-12-27T18:11:01Z",
"pushed_at": "2022-12-27T18:11:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2012/CVE-2012-4244.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582759286,
"name": "CVE-2012-4244",
"full_name": "Live-Hack-CVE\/CVE-2012-4244",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2012-4244",
"description": "ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T19:41:34Z",
"updated_at": "2022-12-27T19:41:34Z",
"pushed_at": "2022-12-27T19:41:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2014/CVE-2014-8176.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736750,
"name": "CVE-2014-8176",
"full_name": "Live-Hack-CVE\/CVE-2014-8176",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-8176",
"description": "The dtls1_clear_queues function in ssl\/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memor CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:16Z",
"updated_at": "2022-12-27T18:16:16Z",
"pushed_at": "2022-12-27T18:16:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0207.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746237,
"name": "CVE-2015-0207",
"full_name": "Live-Hack-CVE\/CVE-2015-0207",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0207",
"description": "The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DTLS 1.0 traffic to a DTLS 1.2 server. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:58Z",
"updated_at": "2022-12-27T18:50:58Z",
"pushed_at": "2022-12-27T18:51:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0208.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737925,
"name": "CVE-2015-0208",
"full_name": "Live-Hack-CVE\/CVE-2015-0208",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0208",
"description": "The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto\/rsa\/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to an endpoint that uses the certificate-verificat CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:20:02Z",
"updated_at": "2022-12-27T18:20:02Z",
"pushed_at": "2022-12-27T18:20:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0209.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737909,
"name": "CVE-2015-0209",
"full_name": "Live-Hack-CVE\/CVE-2015-0209",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0209",
"description": "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto\/ec\/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:58Z",
"updated_at": "2022-12-27T18:19:58Z",
"pushed_at": "2022-12-27T18:20:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0285.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746181,
"name": "CVE-2015-0285",
"full_name": "Live-Hack-CVE\/CVE-2015-0285",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0285",
"description": "The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and then conducting a brute-force attack. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:47Z",
"updated_at": "2022-12-27T18:50:47Z",
"pushed_at": "2022-12-27T18:50:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0286.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746153,
"name": "CVE-2015-0286",
"full_name": "Live-Hack-CVE\/CVE-2015-0286",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0286",
"description": "The ASN1_TYPE_cmp function in crypto\/asn1\/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.50 CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:44Z",
"updated_at": "2022-12-27T18:50:44Z",
"pushed_at": "2022-12-27T18:50:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0287.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746221,
"name": "CVE-2015-0287",
"full_name": "Live-Hack-CVE\/CVE-2015-0287",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0287",
"description": "The ASN1_item_ex_d2i function in crypto\/asn1\/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveragin CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:54Z",
"updated_at": "2022-12-27T18:50:54Z",
"pushed_at": "2022-12-27T18:50:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0289.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746347,
"name": "CVE-2015-0289",
"full_name": "Live-Hack-CVE\/CVE-2015-0289",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0289",
"description": "The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes ar CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:51:19Z",
"updated_at": "2022-12-27T18:51:19Z",
"pushed_at": "2022-12-27T18:51:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0290.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746131,
"name": "CVE-2015-0290",
"full_name": "Live-Hack-CVE\/CVE-2015-0290",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0290",
"description": "The multi-block feature in the ssl3_write_bytes function in s3_pkt.c in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI support does not properly handle certain non-blocking I\/O cases, which allows remote attackers to cause a denial of service (pointer corruption and application crash) via unspecified v CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:40Z",
"updated_at": "2022-12-27T18:50:40Z",
"pushed_at": "2022-12-27T18:50:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0291.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737873,
"name": "CVE-2015-0291",
"full_name": "Live-Hack-CVE\/CVE-2015-0291",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0291",
"description": "The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) by using an invalid signature_algorithms extension in the ClientHello message during a renegotiation. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:48Z",
"updated_at": "2022-12-27T18:19:48Z",
"pushed_at": "2022-12-27T18:19:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0292.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746203,
"name": "CVE-2015-0292",
"full_name": "Live-Hack-CVE\/CVE-2015-0292",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0292",
"description": "Integer underflow in the EVP_DecodeUpdate function in crypto\/evp\/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 da CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:51Z",
"updated_at": "2022-12-27T18:50:51Z",
"pushed_at": "2022-12-27T18:50:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-0293.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746293,
"name": "CVE-2015-0293",
"full_name": "Live-Hack-CVE\/CVE-2015-0293",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-0293",
"description": "The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:51:09Z",
"updated_at": "2022-12-27T18:51:09Z",
"pushed_at": "2022-12-27T18:51:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-1787.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737500,
"name": "CVE-2015-1787",
"full_name": "Live-Hack-CVE\/CVE-2015-1787",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1787",
"description": "The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a ClientKeyExchange message with a length of zero. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:36Z",
"updated_at": "2022-12-27T18:18:36Z",
"pushed_at": "2022-12-27T18:18:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-1788.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737688,
"name": "CVE-2015-1788",
"full_name": "Live-Hack-CVE\/CVE-2015-1788",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1788",
"description": "The BN_GF2m_mod_inv function in crypto\/bn\/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (inf CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:11Z",
"updated_at": "2022-12-27T18:19:11Z",
"pushed_at": "2022-12-27T18:19:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-1789.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737725,
"name": "CVE-2015-1789",
"full_name": "Live-Hack-CVE\/CVE-2015-1789",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1789",
"description": "The X509_cmp_time function in crypto\/x509\/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack aga CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:19Z",
"updated_at": "2022-12-27T18:19:19Z",
"pushed_at": "2022-12-27T18:19:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-1790.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737625,
"name": "CVE-2015-1790",
"full_name": "Live-Hack-CVE\/CVE-2015-1790",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1790",
"description": "The PKCS7_dataDecodefunction in crypto\/pkcs7\/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedC CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:01Z",
"updated_at": "2022-12-27T18:19:01Z",
"pushed_at": "2022-12-27T18:19:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-1791.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737646,
"name": "CVE-2015-1791",
"full_name": "Live-Hack-CVE\/CVE-2015-1791",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1791",
"description": "Race condition in the ssl3_get_new_session_ticket function in ssl\/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:05Z",
"updated_at": "2022-12-27T18:19:05Z",
"pushed_at": "2022-12-27T18:19:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-1792.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737707,
"name": "CVE-2015-1792",
"full_name": "Live-Hack-CVE\/CVE-2015-1792",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1792",
"description": "The do_free_upto function in crypto\/cms\/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OI CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:15Z",
"updated_at": "2022-12-27T18:19:15Z",
"pushed_at": "2022-12-27T18:19:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-1794.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737667,
"name": "CVE-2015-1794",
"full_name": "Live-Hack-CVE\/CVE-2015-1794",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1794",
"description": "The ssl3_get_key_exchange function in ssl\/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:08Z",
"updated_at": "2022-12-27T18:19:08Z",
"pushed_at": "2022-12-27T18:19:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-3193.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737399,
"name": "CVE-2015-3193",
"full_name": "Live-Hack-CVE\/CVE-2015-3193",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-3193",
"description": "The Montgomery squaring implementation in crypto\/bn\/asm\/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an att CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:14Z",
"updated_at": "2022-12-27T18:18:14Z",
"pushed_at": "2022-12-27T18:18:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-3194.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737147,
"name": "CVE-2015-3194",
"full_name": "Live-Hack-CVE\/CVE-2015-3194",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-3194",
"description": "crypto\/rsa\/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:26Z",
"updated_at": "2022-12-27T18:17:26Z",
"pushed_at": "2022-12-27T18:17:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-3195.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737483,
"name": "CVE-2015-3195",
"full_name": "Live-Hack-CVE\/CVE-2015-3195",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-3195",
"description": "The ASN1_TFLG_COMBINE implementation in crypto\/asn1\/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decodin CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:32Z",
"updated_at": "2022-12-27T18:18:32Z",
"pushed_at": "2022-12-27T18:18:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-3196.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737343,
"name": "CVE-2015-3196",
"full_name": "Live-Hack-CVE\/CVE-2015-3196",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-3196",
"description": "ssl\/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange messag CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:04Z",
"updated_at": "2022-12-27T18:18:04Z",
"pushed_at": "2022-12-27T18:18:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-3197.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737425,
"name": "CVE-2015-3197",
"full_name": "Live-Hack-CVE\/CVE-2015-3197",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-3197",
"description": "ssl\/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functi CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:21Z",
"updated_at": "2022-12-27T18:18:21Z",
"pushed_at": "2022-12-27T18:18:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -37,5 +37,34 @@
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 582736913,
"name": "CVE-2015-4000",
"full_name": "Live-Hack-CVE\/CVE-2015-4000",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-4000",
"description": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHel CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:44Z",
"updated_at": "2022-12-27T18:16:44Z",
"pushed_at": "2022-12-27T18:16:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-4004.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582747295,
"name": "CVE-2015-4004",
"full_name": "Live-Hack-CVE\/CVE-2015-4004",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-4004",
"description": "The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:54:51Z",
"updated_at": "2022-12-27T18:54:51Z",
"pushed_at": "2022-12-27T18:54:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-5352.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737197,
"name": "CVE-2015-5352",
"full_name": "Live-Hack-CVE\/CVE-2015-5352",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-5352",
"description": "The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:36Z",
"updated_at": "2022-12-27T18:17:36Z",
"pushed_at": "2022-12-27T18:17:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-5600.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736932,
"name": "CVE-2015-5600",
"full_name": "Live-Hack-CVE\/CVE-2015-5600",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-5600",
"description": "The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and du CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:48Z",
"updated_at": "2022-12-27T18:16:48Z",
"pushed_at": "2022-12-27T18:16:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-6563.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736817,
"name": "CVE-2015-6563",
"full_name": "Live-Hack-CVE\/CVE-2015-6563",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-6563",
"description": "The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:26Z",
"updated_at": "2022-12-27T18:16:26Z",
"pushed_at": "2022-12-27T18:16:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-6564.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736834,
"name": "CVE-2015-6564",
"full_name": "Live-Hack-CVE\/CVE-2015-6564",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-6564",
"description": "Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:29Z",
"updated_at": "2022-12-27T18:16:29Z",
"pushed_at": "2022-12-27T18:16:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-6565.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736876,
"name": "CVE-2015-6565",
"full_name": "Live-Hack-CVE\/CVE-2015-6565",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-6565",
"description": "sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:36Z",
"updated_at": "2022-12-27T18:16:36Z",
"pushed_at": "2022-12-27T18:16:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-6574.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736890,
"name": "CVE-2015-6574",
"full_name": "Live-Hack-CVE\/CVE-2015-6574",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-6574",
"description": "The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:39Z",
"updated_at": "2022-12-27T18:16:39Z",
"pushed_at": "2022-12-27T18:16:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2015/CVE-2015-8325.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736797,
"name": "CVE-2015-8325",
"full_name": "Live-Hack-CVE\/CVE-2015-8325",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-8325",
"description": "The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the \/bin\/login program, as demonstrated by an LD_PREL CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:23Z",
"updated_at": "2022-12-27T18:16:23Z",
"pushed_at": "2022-12-27T18:16:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0371.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582747000,
"name": "CVE-2016-0371",
"full_name": "Live-Hack-CVE\/CVE-2016-0371",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0371",
"description": "The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:53:47Z",
"updated_at": "2022-12-27T18:53:47Z",
"pushed_at": "2022-12-27T18:53:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -27,5 +27,34 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 582746278,
"name": "CVE-2016-0701",
"full_name": "Live-Hack-CVE\/CVE-2016-0701",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0701",
"description": "The DH_check_pub_key function in crypto\/dh\/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:51:05Z",
"updated_at": "2022-12-27T18:51:05Z",
"pushed_at": "2022-12-27T18:51:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0702.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746093,
"name": "CVE-2016-0702",
"full_name": "Live-Hack-CVE\/CVE-2016-0702",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0702",
"description": "The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto\/bn\/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy B CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:33Z",
"updated_at": "2022-12-27T18:50:33Z",
"pushed_at": "2022-12-27T18:50:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0703.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746017,
"name": "CVE-2016-0703",
"full_name": "Live-Hack-CVE\/CVE-2016-0703",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0703",
"description": "The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KE CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:17Z",
"updated_at": "2022-12-27T18:50:17Z",
"pushed_at": "2022-12-27T18:50:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0704.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746324,
"name": "CVE-2016-0704",
"full_name": "Live-Hack-CVE\/CVE-2016-0704",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0704",
"description": "An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:51:16Z",
"updated_at": "2022-12-27T18:51:16Z",
"pushed_at": "2022-12-27T18:51:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0705.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746111,
"name": "CVE-2016-0705",
"full_name": "Live-Hack-CVE\/CVE-2016-0705",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0705",
"description": "Double free vulnerability in the dsa_priv_decode function in crypto\/dsa\/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:36Z",
"updated_at": "2022-12-27T18:50:36Z",
"pushed_at": "2022-12-27T18:50:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0777.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737846,
"name": "CVE-2016-0777",
"full_name": "Live-Hack-CVE\/CVE-2016-0777",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0777",
"description": "The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:41Z",
"updated_at": "2022-12-27T18:19:41Z",
"pushed_at": "2022-12-27T18:19:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0778.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737896,
"name": "CVE-2016-0778",
"full_name": "Live-Hack-CVE\/CVE-2016-0778",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0778",
"description": "The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:55Z",
"updated_at": "2022-12-27T18:19:55Z",
"pushed_at": "2022-12-27T18:19:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0797.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737886,
"name": "CVE-2016-0797",
"full_name": "Live-Hack-CVE\/CVE-2016-0797",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0797",
"description": "Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:52Z",
"updated_at": "2022-12-27T18:19:52Z",
"pushed_at": "2022-12-27T18:19:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0798.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582745984,
"name": "CVE-2016-0798",
"full_name": "Live-Hack-CVE\/CVE-2016-0798",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0798",
"description": "Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps\/s_server.c and crypto\/srp\/srp_vfy.c. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:10Z",
"updated_at": "2022-12-27T18:50:10Z",
"pushed_at": "2022-12-27T18:50:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0799.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582746006,
"name": "CVE-2016-0799",
"full_name": "Live-Hack-CVE\/CVE-2016-0799",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0799",
"description": "The fmtstr function in crypto\/bio\/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large am CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:13Z",
"updated_at": "2022-12-27T18:50:13Z",
"pushed_at": "2022-12-27T18:50:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -27,5 +27,34 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 582737770,
"name": "CVE-2016-0800",
"full_name": "Live-Hack-CVE\/CVE-2016-0800",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0800",
"description": "The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbach CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:26Z",
"updated_at": "2022-12-27T18:19:26Z",
"pushed_at": "2022-12-27T18:19:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-0985.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582768273,
"name": "CVE-2016-0985",
"full_name": "Live-Hack-CVE\/CVE-2016-0985",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-0985",
"description": "Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified \"type confusi CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:17:05Z",
"updated_at": "2022-12-27T20:17:06Z",
"pushed_at": "2022-12-27T20:17:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -38,5 +38,34 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 582788685,
"name": "CVE-2016-1000027",
"full_name": "Live-Hack-CVE\/CVE-2016-1000027",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-1000027",
"description": "Pivotal Spring Framework through 5.3.16 suffers from a potential remote code execution (RCE) issue if used for Java deserialization of untrusted data. Depending on how the library is implemented within a product, this issue may or not occur, and authentication may be required. NOTE: the vendor's position is that untrus CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T21:47:46Z",
"updated_at": "2022-12-27T21:47:46Z",
"pushed_at": "2022-12-27T21:47:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-10009.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582745970,
"name": "CVE-2016-10009",
"full_name": "Live-Hack-CVE\/CVE-2016-10009",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-10009",
"description": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:50:07Z",
"updated_at": "2022-12-27T18:50:07Z",
"pushed_at": "2022-12-27T18:50:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-10010.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737829,
"name": "CVE-2016-10010",
"full_name": "Live-Hack-CVE\/CVE-2016-10010",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-10010",
"description": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:38Z",
"updated_at": "2022-12-27T18:19:38Z",
"pushed_at": "2022-12-27T18:19:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-10011.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737854,
"name": "CVE-2016-10011",
"full_name": "Live-Hack-CVE\/CVE-2016-10011",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-10011",
"description": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:45Z",
"updated_at": "2022-12-27T18:19:45Z",
"pushed_at": "2022-12-27T18:19:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-10012.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737749,
"name": "CVE-2016-10012",
"full_name": "Live-Hack-CVE\/CVE-2016-10012",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-10012",
"description": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:19:23Z",
"updated_at": "2022-12-27T18:19:23Z",
"pushed_at": "2022-12-27T18:19:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-1907.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737381,
"name": "CVE-2016-1907",
"full_name": "Live-Hack-CVE\/CVE-2016-1907",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-1907",
"description": "The ssh_packet_read_poll2 function in packet.c in OpenSSH before 7.1p2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:11Z",
"updated_at": "2022-12-27T18:18:11Z",
"pushed_at": "2022-12-27T18:18:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-1908.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737256,
"name": "CVE-2016-1908",
"full_name": "Live-Hack-CVE\/CVE-2016-1908",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-1908",
"description": "The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:46Z",
"updated_at": "2022-12-27T18:17:46Z",
"pushed_at": "2022-12-27T18:17:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2105.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737466,
"name": "CVE-2016-2105",
"full_name": "Live-Hack-CVE\/CVE-2016-2105",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2105",
"description": "Integer overflow in the EVP_EncodeUpdate function in crypto\/evp\/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:29Z",
"updated_at": "2022-12-27T18:18:29Z",
"pushed_at": "2022-12-27T18:18:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2106.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737101,
"name": "CVE-2016-2106",
"full_name": "Live-Hack-CVE\/CVE-2016-2106",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2106",
"description": "Integer overflow in the EVP_EncryptUpdate function in crypto\/evp\/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:18Z",
"updated_at": "2022-12-27T18:17:18Z",
"pushed_at": "2022-12-27T18:17:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -56,5 +56,34 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 582737309,
"name": "CVE-2016-2107",
"full_name": "Live-Hack-CVE\/CVE-2016-2107",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2107",
"description": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an inc CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:57Z",
"updated_at": "2022-12-27T18:17:57Z",
"pushed_at": "2022-12-27T18:17:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2108.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737293,
"name": "CVE-2016-2108",
"full_name": "Live-Hack-CVE\/CVE-2016-2108",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2108",
"description": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:54Z",
"updated_at": "2022-12-27T18:17:54Z",
"pushed_at": "2022-12-27T18:17:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2109.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737232,
"name": "CVE-2016-2109",
"full_name": "Live-Hack-CVE\/CVE-2016-2109",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2109",
"description": "The asn1_d2i_read_bio function in crypto\/asn1\/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:43Z",
"updated_at": "2022-12-27T18:17:43Z",
"pushed_at": "2022-12-27T18:17:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2176.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737182,
"name": "CVE-2016-2176",
"full_name": "Live-Hack-CVE\/CVE-2016-2176",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2176",
"description": "The X509_NAME_oneline function in crypto\/x509\/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:33Z",
"updated_at": "2022-12-27T18:17:33Z",
"pushed_at": "2022-12-27T18:17:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2177.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737409,
"name": "CVE-2016-2177",
"full_name": "Live-Hack-CVE\/CVE-2016-2177",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2177",
"description": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:17Z",
"updated_at": "2022-12-27T18:18:17Z",
"pushed_at": "2022-12-27T18:18:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2178.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737362,
"name": "CVE-2016-2178",
"full_name": "Live-Hack-CVE\/CVE-2016-2178",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2178",
"description": "The dsa_sign_setup function in crypto\/dsa\/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:07Z",
"updated_at": "2022-12-27T18:18:07Z",
"pushed_at": "2022-12-27T18:18:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2179.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737167,
"name": "CVE-2016-2179",
"full_name": "Live-Hack-CVE\/CVE-2016-2179",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2179",
"description": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtl CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:29Z",
"updated_at": "2022-12-27T18:17:29Z",
"pushed_at": "2022-12-27T18:17:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2180.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737441,
"name": "CVE-2016-2180",
"full_name": "Live-Hack-CVE\/CVE-2016-2180",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2180",
"description": "The TS_OBJ_print_bio function in crypto\/ts\/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl t CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:24Z",
"updated_at": "2022-12-27T18:18:24Z",
"pushed_at": "2022-12-27T18:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2181.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737278,
"name": "CVE-2016-2181",
"full_name": "Live-Hack-CVE\/CVE-2016-2181",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2181",
"description": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:50Z",
"updated_at": "2022-12-27T18:17:50Z",
"pushed_at": "2022-12-27T18:17:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2182.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737325,
"name": "CVE-2016-2182",
"full_name": "Live-Hack-CVE\/CVE-2016-2182",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2182",
"description": "The BN_bn2dec function in crypto\/bn\/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:18:00Z",
"updated_at": "2022-12-27T18:18:00Z",
"pushed_at": "2022-12-27T18:18:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-2183.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582737089,
"name": "CVE-2016-2183",
"full_name": "Live-Hack-CVE\/CVE-2016-2183",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2183",
"description": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:17:15Z",
"updated_at": "2022-12-27T18:17:15Z",
"pushed_at": "2022-12-27T18:17:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-3709.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582795615,
"name": "CVE-2016-3709",
"full_name": "Live-Hack-CVE\/CVE-2016-3709",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-3709",
"description": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T22:21:13Z",
"updated_at": "2022-12-27T22:21:13Z",
"pushed_at": "2022-12-27T22:21:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-4432.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582795632,
"name": "CVE-2016-4432",
"full_name": "Live-Hack-CVE\/CVE-2016-4432",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4432",
"description": "The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T22:21:16Z",
"updated_at": "2022-12-27T22:21:16Z",
"pushed_at": "2022-12-27T22:21:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -27,5 +27,34 @@
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 582736672,
"name": "CVE-2016-6210",
"full_name": "Live-Hack-CVE\/CVE-2016-6210",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6210",
"description": "sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:02Z",
"updated_at": "2022-12-27T18:16:02Z",
"pushed_at": "2022-12-27T18:16:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-6302.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736630,
"name": "CVE-2016-6302",
"full_name": "Live-Hack-CVE\/CVE-2016-6302",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6302",
"description": "The tls_decrypt_ticket function in ssl\/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:15:53Z",
"updated_at": "2022-12-27T18:15:53Z",
"pushed_at": "2022-12-27T18:15:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-6303.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736734,
"name": "CVE-2016-6303",
"full_name": "Live-Hack-CVE\/CVE-2016-6303",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6303",
"description": "Integer overflow in the MDC2_Update function in crypto\/mdc2\/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:12Z",
"updated_at": "2022-12-27T18:16:12Z",
"pushed_at": "2022-12-27T18:16:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-6304.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736708,
"name": "CVE-2016-6304",
"full_name": "Live-Hack-CVE\/CVE-2016-6304",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6304",
"description": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:09Z",
"updated_at": "2022-12-27T18:16:09Z",
"pushed_at": "2022-12-27T18:16:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-6305.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736859,
"name": "CVE-2016-6305",
"full_name": "Live-Hack-CVE\/CVE-2016-6305",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6305",
"description": "The ssl3_read_bytes function in record\/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:33Z",
"updated_at": "2022-12-27T18:16:33Z",
"pushed_at": "2022-12-27T18:16:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-6306.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736691,
"name": "CVE-2016-6306",
"full_name": "Live-Hack-CVE\/CVE-2016-6306",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6306",
"description": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:16:05Z",
"updated_at": "2022-12-27T18:16:05Z",
"pushed_at": "2022-12-27T18:16:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-6307.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736646,
"name": "CVE-2016-6307",
"full_name": "Live-Hack-CVE\/CVE-2016-6307",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6307",
"description": "The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem\/statem.c and statem\/statem_lib.c. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:15:57Z",
"updated_at": "2022-12-27T18:15:57Z",
"pushed_at": "2022-12-27T18:16:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-6308.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582736619,
"name": "CVE-2016-6308",
"full_name": "Live-Hack-CVE\/CVE-2016-6308",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6308",
"description": "statem\/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:15:50Z",
"updated_at": "2022-12-27T18:15:50Z",
"pushed_at": "2022-12-27T18:15:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -91,5 +91,34 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 582736553,
"name": "CVE-2016-6515",
"full_name": "Live-Hack-CVE\/CVE-2016-6515",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6515",
"description": "The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:15:36Z",
"updated_at": "2022-12-27T18:15:36Z",
"pushed_at": "2022-12-27T18:15:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-7913.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582767649,
"name": "CVE-2016-7913",
"full_name": "Live-Hack-CVE\/CVE-2016-7913",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7913",
"description": "The xc2028_set_config function in drivers\/media\/tuners\/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:14:26Z",
"updated_at": "2022-12-27T20:14:26Z",
"pushed_at": "2022-12-27T20:14:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -27,5 +27,34 @@
"forks": 6,
"watchers": 4,
"score": 0
},
{
"id": 582736588,
"name": "CVE-2016-8858",
"full_name": "Live-Hack-CVE\/CVE-2016-8858",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-8858",
"description": "** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests. NOTE: a third party reports that \"OpenSSH upstream does not consider this as a security issue.\" CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T18:15:43Z",
"updated_at": "2022-12-27T18:15:43Z",
"pushed_at": "2022-12-27T18:15:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2016/CVE-2016-9313.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582767485,
"name": "CVE-2016-9313",
"full_name": "Live-Hack-CVE\/CVE-2016-9313",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-9313",
"description": "security\/keys\/big_key.c in the Linux kernel before 4.8.7 mishandles unsuccessful crypto registration in conjunction with successful key-type registration, which allows local users to cause a denial of service (NULL pointer dereference and panic) or possibly have unspecified other impact via a crafted application that u CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:13:46Z",
"updated_at": "2022-12-27T20:13:46Z",
"pushed_at": "2022-12-27T20:13:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12123.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778040,
"name": "CVE-2017-12123",
"full_name": "Live-Hack-CVE\/CVE-2017-12123",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-12123",
"description": "An exploitable clear text transmission of password vulnerability exists in the web server and telnet functionality of Moxa EDR-810 V4.1 build 17030317. An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to login as admin. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:20Z",
"updated_at": "2022-12-27T20:59:20Z",
"pushed_at": "2022-12-27T20:59:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12124.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778056,
"name": "CVE-2017-12124",
"full_name": "Live-Hack-CVE\/CVE-2017-12124",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-12124",
"description": "An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in the web server crashing. An attacker can send a crafted URI to trigger this vulnerability. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:24Z",
"updated_at": "2022-12-27T20:59:24Z",
"pushed_at": "2022-12-27T20:59:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12125.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778069,
"name": "CVE-2017-12125",
"full_name": "Live-Hack-CVE\/CVE-2017-12125",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-12125",
"description": "An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the CN= parm in the \"\/goform\/net_WebCSRGen\" uri to trigger this vulne CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:27Z",
"updated_at": "2022-12-27T20:59:27Z",
"pushed_at": "2022-12-27T20:59:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12126.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778078,
"name": "CVE-2017-12126",
"full_name": "Live-Hack-CVE\/CVE-2017-12126",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-12126",
"description": "An exploitable cross-site request forgery vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP packet can cause cross-site request forgery. An attacker can create malicious HTML to trigger this vulnerability. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:30Z",
"updated_at": "2022-12-27T20:59:30Z",
"pushed_at": "2022-12-27T20:59:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12127.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778092,
"name": "CVE-2017-12127",
"full_name": "Live-Hack-CVE\/CVE-2017-12127",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-12127",
"description": "A password storage vulnerability exists in the operating system functionality of Moxa EDR-810 V4.1 build 17030317. An attacker with shell access could extract passwords in clear text from the device. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:34Z",
"updated_at": "2022-12-27T20:59:34Z",
"pushed_at": "2022-12-27T20:59:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12128.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778160,
"name": "CVE-2017-12128",
"full_name": "Live-Hack-CVE\/CVE-2017-12128",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-12128",
"description": "An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:56Z",
"updated_at": "2022-12-27T20:59:56Z",
"pushed_at": "2022-12-27T20:59:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12129.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778155,
"name": "CVE-2017-12129",
"full_name": "Live-Hack-CVE\/CVE-2017-12129",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-12129",
"description": "An exploitable Weak Cryptography for Passwords vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. An attacker could intercept weakly encrypted passwords and could brute force them. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:53Z",
"updated_at": "2022-12-27T20:59:53Z",
"pushed_at": "2022-12-27T20:59:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-12613.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582788583,
"name": "CVE-2021-35940",
"full_name": "Live-Hack-CVE\/CVE-2021-35940",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-35940",
"description": "An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T21:47:23Z",
"updated_at": "2022-12-27T21:47:23Z",
"pushed_at": "2022-12-27T21:47:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-14432.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778145,
"name": "CVE-2017-14432",
"full_name": "Live-Hack-CVE\/CVE-2017-14432",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-14432",
"description": "An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the openvpnServer0_tmp= parameter in the \"\/goform\/net\\_Web\\_get_value CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:49Z",
"updated_at": "2022-12-27T20:59:49Z",
"pushed_at": "2022-12-27T20:59:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-14433.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582777925,
"name": "CVE-2017-14433",
"full_name": "Live-Hack-CVE\/CVE-2017-14433",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-14433",
"description": "An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the remoteNetwork0= parameter in the \"\/goform\/net\\_Web\\_get_value\" ur CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:58:45Z",
"updated_at": "2022-12-27T20:58:45Z",
"pushed_at": "2022-12-27T20:58:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-14434.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582777943,
"name": "CVE-2017-14434",
"full_name": "Live-Hack-CVE\/CVE-2017-14434",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-14434",
"description": "An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the remoteNetmask0= parameter in the \"\/goform\/net\\_Web\\_get_value\" ur CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:58:51Z",
"updated_at": "2022-12-27T20:58:51Z",
"pushed_at": "2022-12-27T20:58:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-14435.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582778106,
"name": "CVE-2017-14435",
"full_name": "Live-Hack-CVE\/CVE-2017-14435",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-14435",
"description": "An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to \"\/MOXA\\_CFG.ini\" without a cookie header to trigger this vuln CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:59:37Z",
"updated_at": "2022-12-27T20:59:37Z",
"pushed_at": "2022-12-27T20:59:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2017/CVE-2017-14436.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 582777953,
"name": "CVE-2017-14436",
"full_name": "Live-Hack-CVE\/CVE-2017-14436",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-14436",
"description": "An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to \"\/MOXA\\_CFG2.ini\" without a cookie header to trigger this vul CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-27T20:58:55Z",
"updated_at": "2022-12-27T20:58:55Z",
"pushed_at": "2022-12-27T20:58:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

Some files were not shown because too many files have changed in this diff Show more