mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/07/19 18:09:31
This commit is contained in:
parent
954f8d48b3
commit
f90c0b633a
319 changed files with 17672 additions and 95 deletions
48
2010/CVE-2010-0426.json
Normal file
48
2010/CVE-2010-0426.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 114424141,
|
||||
"name": "privesc-CVE-2010-0426",
|
||||
"full_name": "t0kx\/privesc-CVE-2010-0426",
|
||||
"owner": {
|
||||
"login": "t0kx",
|
||||
"id": 24924517,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/24924517?v=4",
|
||||
"html_url": "https:\/\/github.com\/t0kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/t0kx\/privesc-CVE-2010-0426",
|
||||
"description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-12-16T01:16:44Z",
|
||||
"updated_at": "2020-04-20T12:29:23Z",
|
||||
"pushed_at": "2017-12-16T01:19:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 164330369,
|
||||
"name": "cve-2010-0426",
|
||||
"full_name": "cved-sources\/cve-2010-0426",
|
||||
"owner": {
|
||||
"login": "cved-sources",
|
||||
"id": 46423677,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
||||
"html_url": "https:\/\/github.com\/cved-sources"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2010-0426",
|
||||
"description": "cve-2010-0426",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-06T17:38:19Z",
|
||||
"updated_at": "2019-02-01T21:14:50Z",
|
||||
"pushed_at": "2019-02-01T21:14:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 29914821,
|
||||
"name": "jboss-autopwn",
|
||||
"full_name": "ChristianPapathanasiou\/jboss-autopwn",
|
||||
"owner": {
|
||||
"login": "ChristianPapathanasiou",
|
||||
"id": 5354349,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5354349?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChristianPapathanasiou\/jboss-autopwn",
|
||||
"description": "JBoss Autopwn as featured at BlackHat Europe 2010 - this version incorporates CVE-2010-0738 the JBoss authentication bypass VERB manipulation vulnerability as discovered by Minded Security",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T13:16:45Z",
|
||||
"updated_at": "2020-07-02T11:52:16Z",
|
||||
"pushed_at": "2015-01-27T13:23:18Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 62456741,
|
||||
"name": "jboss-autopwn",
|
||||
|
|
25
2010/CVE-2010-1205.json
Normal file
25
2010/CVE-2010-1205.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 911174,
|
||||
"name": "CVE-2010-1205",
|
||||
"full_name": "mk219533\/CVE-2010-1205",
|
||||
"owner": {
|
||||
"login": "mk219533",
|
||||
"id": 91629,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/91629?v=4",
|
||||
"html_url": "https:\/\/github.com\/mk219533"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mk219533\/CVE-2010-1205",
|
||||
"description": "sample exploit of buffer overflow in libpng ",
|
||||
"fork": false,
|
||||
"created_at": "2010-09-14T22:16:11Z",
|
||||
"updated_at": "2020-05-07T01:35:39Z",
|
||||
"pushed_at": "2010-10-03T14:06:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-1411.json
Normal file
25
2010/CVE-2010-1411.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 235009176,
|
||||
"name": "httpfuzz-robomiller",
|
||||
"full_name": "MAVProxyUser\/httpfuzz-robomiller",
|
||||
"owner": {
|
||||
"login": "MAVProxyUser",
|
||||
"id": 2904396,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/2904396?v=4",
|
||||
"html_url": "https:\/\/github.com\/MAVProxyUser"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MAVProxyUser\/httpfuzz-robomiller",
|
||||
"description": "Dumb Fuzzer used to find CVE-2010-1411 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T03:12:03Z",
|
||||
"updated_at": "2020-01-20T05:00:06Z",
|
||||
"pushed_at": "2020-01-20T05:00:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-3332.json
Normal file
25
2010/CVE-2010-3332.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 106621452,
|
||||
"name": "MS10-070",
|
||||
"full_name": "bongbongco\/MS10-070",
|
||||
"owner": {
|
||||
"login": "bongbongco",
|
||||
"id": 3170006,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3170006?v=4",
|
||||
"html_url": "https:\/\/github.com\/bongbongco"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bongbongco\/MS10-070",
|
||||
"description": "CVE-2010-3332 Oracle Padding Vulnerability in Microsoft ASP.NET",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-11T23:50:33Z",
|
||||
"updated_at": "2020-07-17T05:12:24Z",
|
||||
"pushed_at": "2017-10-11T23:50:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-3437.json
Normal file
25
2010/CVE-2010-3437.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 222810581,
|
||||
"name": "CVE-2010-3437",
|
||||
"full_name": "huang-emily\/CVE-2010-3437",
|
||||
"owner": {
|
||||
"login": "huang-emily",
|
||||
"id": 25013982,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25013982?v=4",
|
||||
"html_url": "https:\/\/github.com\/huang-emily"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huang-emily\/CVE-2010-3437",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T23:35:57Z",
|
||||
"updated_at": "2019-11-19T23:36:01Z",
|
||||
"pushed_at": "2019-11-19T23:35:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-3490.json
Normal file
25
2010/CVE-2010-3490.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 226908489,
|
||||
"name": "CVE-2010-3490",
|
||||
"full_name": "moayadalmalat\/CVE-2010-3490",
|
||||
"owner": {
|
||||
"login": "moayadalmalat",
|
||||
"id": 42471675,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42471675?v=4",
|
||||
"html_url": "https:\/\/github.com\/moayadalmalat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/moayadalmalat\/CVE-2010-3490",
|
||||
"description": "FreePBX exploit <= 2.8.0",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-09T15:49:21Z",
|
||||
"updated_at": "2019-12-09T15:57:52Z",
|
||||
"pushed_at": "2019-12-09T15:57:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-4221.json
Normal file
25
2010/CVE-2010-4221.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 108682441,
|
||||
"name": "cve-2010-4221",
|
||||
"full_name": "M31MOTH\/cve-2010-4221",
|
||||
"owner": {
|
||||
"login": "M31MOTH",
|
||||
"id": 10201432,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10201432?v=4",
|
||||
"html_url": "https:\/\/github.com\/M31MOTH"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M31MOTH\/cve-2010-4221",
|
||||
"description": "This exploit was written to study some concepts, enjoy!",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-28T20:37:26Z",
|
||||
"updated_at": "2020-03-26T15:45:57Z",
|
||||
"pushed_at": "2017-10-22T19:46:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2010/CVE-2010-4258.json
Normal file
25
2010/CVE-2010-4258.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 30897048,
|
||||
"name": "CVE-2010-4258",
|
||||
"full_name": "johnreginald\/CVE-2010-4258",
|
||||
"owner": {
|
||||
"login": "johnreginald",
|
||||
"id": 8102802,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8102802?v=4",
|
||||
"html_url": "https:\/\/github.com\/johnreginald"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/johnreginald\/CVE-2010-4258",
|
||||
"description": "Exploit based on a faulty clone(2) implementation in Linux < 2.6.36.2 that allows overwrite of arbitrary kernel word with NULL. Research and personal-security use only. Not malicious.",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-17T01:12:55Z",
|
||||
"updated_at": "2016-09-04T16:50:03Z",
|
||||
"pushed_at": "2012-07-12T18:58:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-18T02:31:28Z",
|
||||
"updated_at": "2020-07-19T08:03:38Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"stargazers_count": 511,
|
||||
"watchers_count": 511,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 508,
|
||||
"watchers": 511,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2020-07-13T17:21:06Z",
|
||||
"updated_at": "2020-07-19T07:51:45Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-18T02:31:28Z",
|
||||
"updated_at": "2020-07-19T08:03:38Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"stargazers_count": 511,
|
||||
"watchers_count": 511,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 508,
|
||||
"watchers": 511,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-18T02:31:28Z",
|
||||
"updated_at": "2020-07-19T08:03:38Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"stargazers_count": 511,
|
||||
"watchers_count": 511,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 508,
|
||||
"watchers": 511,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 137969508,
|
||||
"id": 137987555,
|
||||
"name": "HPE-iMC-7.3-RMI-Java-Deserialization",
|
||||
"full_name": "RealBearcat\/HPE-iMC-7.3-RMI-Java-Deserialization",
|
||||
"full_name": "scanfsec\/HPE-iMC-7.3-RMI-Java-Deserialization",
|
||||
"owner": {
|
||||
"login": "RealBearcat",
|
||||
"id": 22558737,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22558737?v=4",
|
||||
"html_url": "https:\/\/github.com\/RealBearcat"
|
||||
"login": "scanfsec",
|
||||
"id": 8190138,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8190138?v=4",
|
||||
"html_url": "https:\/\/github.com\/scanfsec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RealBearcat\/HPE-iMC-7.3-RMI-Java-Deserialization",
|
||||
"html_url": "https:\/\/github.com\/scanfsec\/HPE-iMC-7.3-RMI-Java-Deserialization",
|
||||
"description": "CVE-2017-5792",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-20T02:25:38Z",
|
||||
"updated_at": "2020-04-22T13:24:04Z",
|
||||
"created_at": "2018-06-20T06:08:47Z",
|
||||
"updated_at": "2020-07-19T09:02:14Z",
|
||||
"pushed_at": "2018-06-20T02:31:20Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-07-18T02:31:28Z",
|
||||
"updated_at": "2020-07-19T08:03:38Z",
|
||||
"pushed_at": "2020-07-05T12:59:42Z",
|
||||
"stargazers_count": 508,
|
||||
"watchers_count": 508,
|
||||
"stargazers_count": 511,
|
||||
"watchers_count": 511,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 508,
|
||||
"watchers": 511,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2018-2893-PoC",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-22T01:15:58Z",
|
||||
"updated_at": "2020-06-24T10:56:07Z",
|
||||
"updated_at": "2020-07-19T04:48:49Z",
|
||||
"pushed_at": "2018-10-27T01:42:20Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-21T17:28:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-10-26T17:54:54Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-27T01:41:18Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2020-07-13T15:00:09Z",
|
||||
"updated_at": "2020-07-19T09:04:21Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"stargazers_count": 400,
|
||||
"watchers_count": 400,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 399,
|
||||
"watchers": 400,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
48
2019/CVE-2019-0192.json
Normal file
48
2019/CVE-2019-0192.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 174814901,
|
||||
"name": "CVE-2019-0192",
|
||||
"full_name": "mpgn\/CVE-2019-0192",
|
||||
"owner": {
|
||||
"login": "mpgn",
|
||||
"id": 5891788,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
|
||||
"html_url": "https:\/\/github.com\/mpgn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-0192",
|
||||
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-10T11:35:26Z",
|
||||
"updated_at": "2020-06-27T16:16:13Z",
|
||||
"pushed_at": "2019-03-10T18:33:43Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 218993619,
|
||||
"name": "Solr-RCE-CVE-2019-0192",
|
||||
"full_name": "Rapidsafeguard\/Solr-RCE-CVE-2019-0192",
|
||||
"owner": {
|
||||
"login": "Rapidsafeguard",
|
||||
"id": 48471397,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48471397?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rapidsafeguard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rapidsafeguard\/Solr-RCE-CVE-2019-0192",
|
||||
"description": "Apache Solr remote code execution via dataImportHandler",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-01T13:46:37Z",
|
||||
"updated_at": "2019-12-08T02:19:33Z",
|
||||
"pushed_at": "2019-11-01T13:58:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 176290079,
|
||||
"name": "CVE-2019-0193",
|
||||
"full_name": "xConsoIe\/CVE-2019-0193",
|
||||
"owner": {
|
||||
"login": "xConsoIe",
|
||||
"id": 48456709,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48456709?v=4",
|
||||
"html_url": "https:\/\/github.com\/xConsoIe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-03-18T13:18:01Z",
|
||||
"updated_at": "2020-06-01T05:52:53Z",
|
||||
"pushed_at": "2019-03-18T13:22:48Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 201405406,
|
||||
"name": "CVE-2019-0193",
|
||||
"full_name": "jas502n\/CVE-2019-0193",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0193",
|
||||
"description": "Apache Solr DataImport Handler RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T06:27:39Z",
|
||||
"updated_at": "2020-06-14T22:58:54Z",
|
||||
"pushed_at": "2019-08-12T02:23:38Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 201878363,
|
||||
"name": "solr_exploit",
|
||||
|
@ -21,5 +67,28 @@
|
|||
"forks": 6,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 206173868,
|
||||
"name": "CVE-2019-0193-exp",
|
||||
"full_name": "jaychouzzk\/CVE-2019-0193-exp",
|
||||
"owner": {
|
||||
"login": "jaychouzzk",
|
||||
"id": 45549315,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45549315?v=4",
|
||||
"html_url": "https:\/\/github.com\/jaychouzzk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-0193-exp",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T21:16:24Z",
|
||||
"updated_at": "2019-10-02T11:54:13Z",
|
||||
"pushed_at": "2019-09-04T15:40:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0211.json
Normal file
25
2019/CVE-2019-0211.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 186238849,
|
||||
"name": "Apache-Exploit-2019",
|
||||
"full_name": "ozkanbilge\/Apache-Exploit-2019",
|
||||
"owner": {
|
||||
"login": "ozkanbilge",
|
||||
"id": 39211596,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/39211596?v=4",
|
||||
"html_url": "https:\/\/github.com\/ozkanbilge"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ozkanbilge\/Apache-Exploit-2019",
|
||||
"description": "CVE-2019-0211-apache & CVE-2019-6977-imagecolormatch",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-12T10:08:57Z",
|
||||
"updated_at": "2019-12-20T18:01:46Z",
|
||||
"pushed_at": "2019-05-12T10:09:35Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0227.json
Normal file
25
2019/CVE-2019-0227.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 217869109,
|
||||
"name": "cve-2019-0227",
|
||||
"full_name": "ianxtianxt\/cve-2019-0227",
|
||||
"owner": {
|
||||
"login": "ianxtianxt",
|
||||
"id": 45796484,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
|
||||
"html_url": "https:\/\/github.com\/ianxtianxt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ianxtianxt\/cve-2019-0227",
|
||||
"description": "apache axis1.4远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-27T14:42:54Z",
|
||||
"updated_at": "2019-10-27T14:51:23Z",
|
||||
"pushed_at": "2019-10-27T14:51:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
94
2019/CVE-2019-0232.json
Normal file
94
2019/CVE-2019-0232.json
Normal file
|
@ -0,0 +1,94 @@
|
|||
[
|
||||
{
|
||||
"id": 181439043,
|
||||
"name": "CVE-2019-0232",
|
||||
"full_name": "pyn3rd\/CVE-2019-0232",
|
||||
"owner": {
|
||||
"login": "pyn3rd",
|
||||
"id": 41412951,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/41412951?v=4",
|
||||
"html_url": "https:\/\/github.com\/pyn3rd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pyn3rd\/CVE-2019-0232",
|
||||
"description": "Apache Tomcat Remote Code Execution on Windows",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T07:54:25Z",
|
||||
"updated_at": "2020-07-18T16:04:46Z",
|
||||
"pushed_at": "2019-11-27T07:39:40Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 181706868,
|
||||
"name": "CVE-2019-0232",
|
||||
"full_name": "jas502n\/CVE-2019-0232",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0232",
|
||||
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-16T14:32:03Z",
|
||||
"updated_at": "2020-07-14T04:28:05Z",
|
||||
"pushed_at": "2019-04-17T02:42:03Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 188168912,
|
||||
"name": "CVE-2019-0232-EXP",
|
||||
"full_name": "CherishHair\/CVE-2019-0232-EXP",
|
||||
"owner": {
|
||||
"login": "CherishHair",
|
||||
"id": 16273668,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/16273668?v=4",
|
||||
"html_url": "https:\/\/github.com\/CherishHair"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CherishHair\/CVE-2019-0232-EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T05:44:29Z",
|
||||
"updated_at": "2019-11-27T11:05:38Z",
|
||||
"pushed_at": "2019-05-23T13:13:02Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 223192188,
|
||||
"name": "CVE-2019-0232",
|
||||
"full_name": "setrus\/CVE-2019-0232",
|
||||
"owner": {
|
||||
"login": "setrus",
|
||||
"id": 34648357,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/34648357?v=4",
|
||||
"html_url": "https:\/\/github.com\/setrus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/setrus\/CVE-2019-0232",
|
||||
"description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T14:25:39Z",
|
||||
"updated_at": "2020-05-21T21:39:43Z",
|
||||
"pushed_at": "2019-11-21T15:03:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0539.json
Normal file
25
2019/CVE-2019-0539.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 196580913,
|
||||
"name": "CVE-2019-0539",
|
||||
"full_name": "0x43434343\/CVE-2019-0539",
|
||||
"owner": {
|
||||
"login": "0x43434343",
|
||||
"id": 28482599,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28482599?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x43434343"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x43434343\/CVE-2019-0539",
|
||||
"description": "R\/W ",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-12T13:06:17Z",
|
||||
"updated_at": "2020-06-15T12:29:01Z",
|
||||
"pushed_at": "2019-07-12T13:18:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
117
2019/CVE-2019-0604.json
Normal file
117
2019/CVE-2019-0604.json
Normal file
|
@ -0,0 +1,117 @@
|
|||
[
|
||||
{
|
||||
"id": 177246255,
|
||||
"name": "CVE-2019-0604",
|
||||
"full_name": "linhlhq\/CVE-2019-0604",
|
||||
"owner": {
|
||||
"login": "linhlhq",
|
||||
"id": 28854132,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28854132?v=4",
|
||||
"html_url": "https:\/\/github.com\/linhlhq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
|
||||
"description": "CVE-2019-0604",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-23T05:01:54Z",
|
||||
"updated_at": "2020-07-13T18:10:36Z",
|
||||
"pushed_at": "2019-03-22T05:45:44Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 179413290,
|
||||
"name": "CVE-2019-0604_sharepoint_CVE",
|
||||
"full_name": "denmilu\/CVE-2019-0604_sharepoint_CVE",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-0604_sharepoint_CVE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-04T03:17:30Z",
|
||||
"updated_at": "2019-04-04T03:17:59Z",
|
||||
"pushed_at": "2019-04-04T03:17:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 193926769,
|
||||
"name": "CVE-2019-0604",
|
||||
"full_name": "k8gege\/CVE-2019-0604",
|
||||
"owner": {
|
||||
"login": "k8gege",
|
||||
"id": 42312878,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4",
|
||||
"html_url": "https:\/\/github.com\/k8gege"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k8gege\/CVE-2019-0604",
|
||||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-26T15:00:29Z",
|
||||
"updated_at": "2020-07-16T09:30:40Z",
|
||||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 208650796,
|
||||
"name": "CVE-2019-0604",
|
||||
"full_name": "m5050\/CVE-2019-0604",
|
||||
"owner": {
|
||||
"login": "m5050",
|
||||
"id": 18764171,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18764171?v=4",
|
||||
"html_url": "https:\/\/github.com\/m5050"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/m5050\/CVE-2019-0604",
|
||||
"description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-15T20:06:54Z",
|
||||
"updated_at": "2020-06-25T02:16:52Z",
|
||||
"pushed_at": "2019-09-17T19:40:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 227013447,
|
||||
"name": "CVE-2019-0604",
|
||||
"full_name": "boxhg\/CVE-2019-0604",
|
||||
"owner": {
|
||||
"login": "boxhg",
|
||||
"id": 40994449,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40994449?v=4",
|
||||
"html_url": "https:\/\/github.com\/boxhg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/boxhg\/CVE-2019-0604",
|
||||
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-10T02:39:57Z",
|
||||
"updated_at": "2020-05-31T02:28:08Z",
|
||||
"pushed_at": "2019-12-11T09:33:31Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0678.json
Normal file
25
2019/CVE-2019-0678.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 197764635,
|
||||
"name": "CVE-2019-0678",
|
||||
"full_name": "c0d3G33k\/CVE-2019-0678",
|
||||
"owner": {
|
||||
"login": "c0d3G33k",
|
||||
"id": 16446505,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16446505?v=4",
|
||||
"html_url": "https:\/\/github.com\/c0d3G33k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/c0d3G33k\/CVE-2019-0678",
|
||||
"description": "Microsoft Edge Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-19T11:55:32Z",
|
||||
"updated_at": "2019-07-19T12:15:21Z",
|
||||
"pushed_at": "2019-07-19T12:15:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because it is too large
Load diff
48
2019/CVE-2019-0709.json
Normal file
48
2019/CVE-2019-0709.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 189502228,
|
||||
"name": "CVE-2019-0709",
|
||||
"full_name": "YHZX2013\/CVE-2019-0709",
|
||||
"owner": {
|
||||
"login": "YHZX2013",
|
||||
"id": 17893549,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17893549?v=4",
|
||||
"html_url": "https:\/\/github.com\/YHZX2013"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/YHZX2013\/CVE-2019-0709",
|
||||
"description": "CVE-2019-0708 Exploit using Python",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:48:49Z",
|
||||
"updated_at": "2019-08-02T13:38:41Z",
|
||||
"pushed_at": "2019-05-30T22:52:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 189527128,
|
||||
"name": "CVE-2019-0709",
|
||||
"full_name": "qq431169079\/CVE-2019-0709",
|
||||
"owner": {
|
||||
"login": "qq431169079",
|
||||
"id": 42376039,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/42376039?v=4",
|
||||
"html_url": "https:\/\/github.com\/qq431169079"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/qq431169079\/CVE-2019-0709",
|
||||
"description": "Exploit In Progress",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T04:23:39Z",
|
||||
"updated_at": "2019-05-31T23:10:21Z",
|
||||
"pushed_at": "2019-05-26T15:25:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0768.json
Normal file
25
2019/CVE-2019-0768.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 188212551,
|
||||
"name": "ie11_vbscript_exploit",
|
||||
"full_name": "ruthlezs\/ie11_vbscript_exploit",
|
||||
"owner": {
|
||||
"login": "ruthlezs",
|
||||
"id": 15887791,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15887791?v=4",
|
||||
"html_url": "https:\/\/github.com\/ruthlezs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ruthlezs\/ie11_vbscript_exploit",
|
||||
"description": "Exploit Generator for CVE-2018-8174 & CVE-2019-0768 (RCE via VBScript Execution in IE11)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T10:28:40Z",
|
||||
"updated_at": "2020-06-06T05:40:44Z",
|
||||
"pushed_at": "2019-05-23T11:26:38Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0785.json
Normal file
25
2019/CVE-2019-0785.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 196208560,
|
||||
"name": "CVE-2019-0785",
|
||||
"full_name": "Jaky5155\/CVE-2019-0785",
|
||||
"owner": {
|
||||
"login": "Jaky5155",
|
||||
"id": 47801640,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47801640?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jaky5155"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jaky5155\/CVE-2019-0785",
|
||||
"description": "CVE-2019-0785",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-10T13:16:42Z",
|
||||
"updated_at": "2020-04-05T09:53:47Z",
|
||||
"pushed_at": "2019-07-10T13:18:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0803.json
Normal file
25
2019/CVE-2019-0803.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 187201710,
|
||||
"name": "CVE-2019-0803",
|
||||
"full_name": "ExpLife0011\/CVE-2019-0803",
|
||||
"owner": {
|
||||
"login": "ExpLife0011",
|
||||
"id": 37372761,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37372761?v=4",
|
||||
"html_url": "https:\/\/github.com\/ExpLife0011"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ExpLife0011\/CVE-2019-0803",
|
||||
"description": "Win32k Elevation of Privilege Poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-17T11:05:22Z",
|
||||
"updated_at": "2020-04-22T11:25:54Z",
|
||||
"pushed_at": "2019-05-17T10:53:29Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 177576776,
|
||||
"name": "cve-2019-0808-poc",
|
||||
"full_name": "ze0r\/cve-2019-0808-poc",
|
||||
"owner": {
|
||||
"login": "ze0r",
|
||||
"id": 43227253,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4",
|
||||
"html_url": "https:\/\/github.com\/ze0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ze0r\/cve-2019-0808-poc",
|
||||
"description": "cve-2019-0808-poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T11:53:35Z",
|
||||
"updated_at": "2020-06-07T11:49:31Z",
|
||||
"pushed_at": "2019-03-25T12:10:40Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 182577297,
|
||||
"name": "CVE-2019-0808",
|
||||
"full_name": "rakesh143\/CVE-2019-0808",
|
||||
"owner": {
|
||||
"login": "rakesh143",
|
||||
"id": 12870599,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12870599?v=4",
|
||||
"html_url": "https:\/\/github.com\/rakesh143"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rakesh143\/CVE-2019-0808",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-21T20:04:34Z",
|
||||
"updated_at": "2019-04-21T20:07:45Z",
|
||||
"pushed_at": "2019-04-21T20:07:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 187227372,
|
||||
"name": "CVE-2019-0808",
|
||||
"full_name": "exodusintel\/CVE-2019-0808",
|
||||
"owner": {
|
||||
"login": "exodusintel",
|
||||
"id": 16653014,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16653014?v=4",
|
||||
"html_url": "https:\/\/github.com\/exodusintel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exodusintel\/CVE-2019-0808",
|
||||
"description": "Win32k Exploit by Grant Willcox",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-17T14:08:01Z",
|
||||
"updated_at": "2020-07-14T15:58:42Z",
|
||||
"pushed_at": "2019-05-17T14:17:00Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 264669775,
|
||||
"name": "CVE-2019-0808-32-64-exp",
|
||||
|
|
71
2019/CVE-2019-0841.json
Normal file
71
2019/CVE-2019-0841.json
Normal file
|
@ -0,0 +1,71 @@
|
|||
[
|
||||
{
|
||||
"id": 179680988,
|
||||
"name": "CVE-2019-0841",
|
||||
"full_name": "rogue-kdc\/CVE-2019-0841",
|
||||
"owner": {
|
||||
"login": "rogue-kdc",
|
||||
"id": 49311295,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49311295?v=4",
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2019-0841",
|
||||
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-05T12:53:52Z",
|
||||
"updated_at": "2020-07-09T02:13:28Z",
|
||||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 219,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 180605162,
|
||||
"name": "CVE-2019-0841",
|
||||
"full_name": "denmilu\/CVE-2019-0841",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-0841",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T14:58:22Z",
|
||||
"updated_at": "2019-05-26T06:57:44Z",
|
||||
"pushed_at": "2019-04-10T14:58:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 191441504,
|
||||
"name": "CVE-2019-0841-BYPASS",
|
||||
"full_name": "0x00-0x00\/CVE-2019-0841-BYPASS",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2019-0841-BYPASS",
|
||||
"description": "A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-11T20:05:26Z",
|
||||
"updated_at": "2020-06-09T12:34:13Z",
|
||||
"pushed_at": "2019-06-11T20:49:42Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0888.json
Normal file
25
2019/CVE-2019-0888.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 193166704,
|
||||
"name": "CVE-2019-0888",
|
||||
"full_name": "sophoslabs\/CVE-2019-0888",
|
||||
"owner": {
|
||||
"login": "sophoslabs",
|
||||
"id": 40878494,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40878494?v=4",
|
||||
"html_url": "https:\/\/github.com\/sophoslabs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sophoslabs\/CVE-2019-0888",
|
||||
"description": "PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T22:26:52Z",
|
||||
"updated_at": "2020-03-21T18:23:15Z",
|
||||
"pushed_at": "2019-07-09T18:40:05Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-0986.json
Normal file
25
2019/CVE-2019-0986.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 176955881,
|
||||
"name": "CVE-2019-0986",
|
||||
"full_name": "padovah4ck\/CVE-2019-0986",
|
||||
"owner": {
|
||||
"login": "padovah4ck",
|
||||
"id": 13963076,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13963076?v=4",
|
||||
"html_url": "https:\/\/github.com\/padovah4ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/padovah4ck\/CVE-2019-0986",
|
||||
"description": "Security Research",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-21T13:58:25Z",
|
||||
"updated_at": "2020-05-07T22:56:23Z",
|
||||
"pushed_at": "2019-06-17T08:10:53Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10008.json
Normal file
25
2019/CVE-2019-10008.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 179552575,
|
||||
"name": "CVE-2019-10008",
|
||||
"full_name": "FlameOfIgnis\/CVE-2019-10008",
|
||||
"owner": {
|
||||
"login": "FlameOfIgnis",
|
||||
"id": 16636092,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/16636092?v=4",
|
||||
"html_url": "https:\/\/github.com\/FlameOfIgnis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FlameOfIgnis\/CVE-2019-10008",
|
||||
"description": "ManageEngine Service Desk Plus 10.0 Privilaged account Hijacking",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-04T18:20:23Z",
|
||||
"updated_at": "2020-05-04T08:50:11Z",
|
||||
"pushed_at": "2019-08-17T15:17:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-1002101.json
Normal file
25
2019/CVE-2019-1002101.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 179330253,
|
||||
"name": "CVE-2019-1002101-Helpers",
|
||||
"full_name": "brompwnie\/CVE-2019-1002101-Helpers",
|
||||
"owner": {
|
||||
"login": "brompwnie",
|
||||
"id": 8638589,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/8638589?v=4",
|
||||
"html_url": "https:\/\/github.com\/brompwnie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/brompwnie\/CVE-2019-1002101-Helpers",
|
||||
"description": "PoC helper scripts and Dockerfile for CVE-2019-1002101",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-03T16:36:58Z",
|
||||
"updated_at": "2020-07-14T14:11:03Z",
|
||||
"pushed_at": "2019-04-03T17:35:03Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,74 @@
|
|||
"forks": 28,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170809838,
|
||||
"name": "cve-2019-1003000-jenkins-rce-poc",
|
||||
"full_name": "adamyordan\/cve-2019-1003000-jenkins-rce-poc",
|
||||
"owner": {
|
||||
"login": "adamyordan",
|
||||
"id": 9531164,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9531164?v=4",
|
||||
"html_url": "https:\/\/github.com\/adamyordan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adamyordan\/cve-2019-1003000-jenkins-rce-poc",
|
||||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T05:59:24Z",
|
||||
"updated_at": "2020-07-03T03:04:36Z",
|
||||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 263,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 172198653,
|
||||
"name": "CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"full_name": "0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"owner": {
|
||||
"login": "0xtavian",
|
||||
"id": 21030907,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21030907?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xtavian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xtavian\/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins",
|
||||
"description": "Python CVE-2019-1003000 and CVE-2018-1999002 Pre-Auth RCE Jenkins ",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-23T10:00:03Z",
|
||||
"updated_at": "2020-04-20T00:16:50Z",
|
||||
"pushed_at": "2019-02-23T10:01:26Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 183322760,
|
||||
"name": "CVE-2019-1003000_RCE-DETECTION",
|
||||
"full_name": "1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
|
||||
"owner": {
|
||||
"login": "1NTheKut",
|
||||
"id": 26243759,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26243759?v=4",
|
||||
"html_url": "https:\/\/github.com\/1NTheKut"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1NTheKut\/CVE-2019-1003000_RCE-DETECTION",
|
||||
"description": "A C# module to detect if a Jenkins server is vulnerable to the RCE vulnerability found in CVE-2019-1003000 (chained with CVE-2018-1000861 for pre-auth RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-24T23:52:42Z",
|
||||
"updated_at": "2019-05-13T06:00:34Z",
|
||||
"pushed_at": "2019-05-01T07:11:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10086.json
Normal file
25
2019/CVE-2019-10086.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 218899327,
|
||||
"name": "CVE-2019-10086",
|
||||
"full_name": "evilangelplus\/CVE-2019-10086",
|
||||
"owner": {
|
||||
"login": "evilangelplus",
|
||||
"id": 56948123,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56948123?v=4",
|
||||
"html_url": "https:\/\/github.com\/evilangelplus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evilangelplus\/CVE-2019-10086",
|
||||
"description": "wait for exp.",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-01T02:36:17Z",
|
||||
"updated_at": "2019-11-01T02:36:17Z",
|
||||
"pushed_at": "2019-11-01T02:36:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10092.json
Normal file
25
2019/CVE-2019-10092.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 228854670,
|
||||
"name": "CVE-2019-10092_Docker",
|
||||
"full_name": "motikan2010\/CVE-2019-10092_Docker",
|
||||
"owner": {
|
||||
"login": "motikan2010",
|
||||
"id": 3177297,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3177297?v=4",
|
||||
"html_url": "https:\/\/github.com\/motikan2010"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2019-10092_Docker",
|
||||
"description": "CVE-2019-10092 Docker - Apache HTTP Server",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-18T14:15:13Z",
|
||||
"updated_at": "2020-05-18T10:43:29Z",
|
||||
"pushed_at": "2020-01-07T03:22:20Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-1010298.json
Normal file
25
2019/CVE-2019-1010298.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 201962859,
|
||||
"name": "CVE-2019-1010298",
|
||||
"full_name": "RKX1209\/CVE-2019-1010298",
|
||||
"owner": {
|
||||
"login": "RKX1209",
|
||||
"id": 964758,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/964758?v=4",
|
||||
"html_url": "https:\/\/github.com\/RKX1209"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RKX1209\/CVE-2019-1010298",
|
||||
"description": "Proof of Concept of TrustZone exploit ",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-12T15:58:06Z",
|
||||
"updated_at": "2020-05-17T11:41:51Z",
|
||||
"pushed_at": "2019-08-12T16:01:24Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,211 @@
|
|||
[
|
||||
{
|
||||
"id": 191233980,
|
||||
"name": "exim-rce-quickfix",
|
||||
"full_name": "bananaphones\/exim-rce-quickfix",
|
||||
"owner": {
|
||||
"login": "bananaphones",
|
||||
"id": 4877449,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4877449?v=4",
|
||||
"html_url": "https:\/\/github.com\/bananaphones"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bananaphones\/exim-rce-quickfix",
|
||||
"description": "quick fix for CVE-2019-10149, works on Debian\\Ubuntu\\Centos",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T19:37:05Z",
|
||||
"updated_at": "2020-06-28T05:13:41Z",
|
||||
"pushed_at": "2019-06-14T10:16:02Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 191493140,
|
||||
"name": "eximrce-CVE-2019-10149",
|
||||
"full_name": "cowbe0x004\/eximrce-CVE-2019-10149",
|
||||
"owner": {
|
||||
"login": "cowbe0x004",
|
||||
"id": 3072913,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3072913?v=4",
|
||||
"html_url": "https:\/\/github.com\/cowbe0x004"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cowbe0x004\/eximrce-CVE-2019-10149",
|
||||
"description": "simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in \/tmp\/eximrce.",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T03:47:16Z",
|
||||
"updated_at": "2020-06-10T21:55:54Z",
|
||||
"pushed_at": "2019-07-08T18:25:12Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 191845568,
|
||||
"name": "PoC--CVE-2019-10149_Exim",
|
||||
"full_name": "MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
|
||||
"owner": {
|
||||
"login": "MNEMO-CERT",
|
||||
"id": 51804856,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51804856?v=4",
|
||||
"html_url": "https:\/\/github.com\/MNEMO-CERT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
|
||||
"description": "PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-13T23:21:53Z",
|
||||
"updated_at": "2020-06-28T05:23:37Z",
|
||||
"pushed_at": "2019-06-18T14:57:22Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 191952969,
|
||||
"name": "CVE-2019-10149-quick",
|
||||
"full_name": "aishee\/CVE-2019-10149-quick",
|
||||
"owner": {
|
||||
"login": "aishee",
|
||||
"id": 8377283,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8377283?v=4",
|
||||
"html_url": "https:\/\/github.com\/aishee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aishee\/CVE-2019-10149-quick",
|
||||
"description": "Simple Bash shell quick fix CVE-2019-10149",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T14:02:43Z",
|
||||
"updated_at": "2019-06-14T14:03:33Z",
|
||||
"pushed_at": "2019-06-14T14:03:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 194002154,
|
||||
"name": "CVE-2019-10149-privilege-escalation",
|
||||
"full_name": "AzizMea\/CVE-2019-10149-privilege-escalation",
|
||||
"owner": {
|
||||
"login": "AzizMea",
|
||||
"id": 30970260,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30970260?v=4",
|
||||
"html_url": "https:\/\/github.com\/AzizMea"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AzizMea\/CVE-2019-10149-privilege-escalation",
|
||||
"description": "CVE-2019-10149 privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-27T01:34:41Z",
|
||||
"updated_at": "2020-05-30T20:35:51Z",
|
||||
"pushed_at": "2019-06-27T17:46:25Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 198729185,
|
||||
"name": "StickyExim",
|
||||
"full_name": "Brets0150\/StickyExim",
|
||||
"owner": {
|
||||
"login": "Brets0150",
|
||||
"id": 40045956,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40045956?v=4",
|
||||
"html_url": "https:\/\/github.com\/Brets0150"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Brets0150\/StickyExim",
|
||||
"description": "Exim Honey Pot for CVE-2019-10149 exploit attempts.",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-25T00:46:37Z",
|
||||
"updated_at": "2019-08-06T20:21:47Z",
|
||||
"pushed_at": "2019-08-06T20:21:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 206647936,
|
||||
"name": "exim.exp",
|
||||
"full_name": "ChrissHack\/exim.exp",
|
||||
"owner": {
|
||||
"login": "ChrissHack",
|
||||
"id": 36897897,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36897897?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChrissHack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChrissHack\/exim.exp",
|
||||
"description": "CVE-2019-10149",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-05T20:04:14Z",
|
||||
"updated_at": "2019-09-11T01:27:28Z",
|
||||
"pushed_at": "2019-09-05T20:34:18Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 216513053,
|
||||
"name": "CVE-2019-10149",
|
||||
"full_name": "darsigovrustam\/CVE-2019-10149",
|
||||
"owner": {
|
||||
"login": "darsigovrustam",
|
||||
"id": 36308333,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36308333?v=4",
|
||||
"html_url": "https:\/\/github.com\/darsigovrustam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/darsigovrustam\/CVE-2019-10149",
|
||||
"description": "Instructions for installing a vulnerable version of Exim and its expluatation",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T08:13:27Z",
|
||||
"updated_at": "2020-04-13T06:36:31Z",
|
||||
"pushed_at": "2019-10-24T07:19:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217788444,
|
||||
"name": "CVE-2019-10149",
|
||||
"full_name": "Diefunction\/CVE-2019-10149",
|
||||
"owner": {
|
||||
"login": "Diefunction",
|
||||
"id": 17242631,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17242631?v=4",
|
||||
"html_url": "https:\/\/github.com\/Diefunction"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Diefunction\/CVE-2019-10149",
|
||||
"description": "CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in \/src\/deliver.c may lead to remote command execution.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-27T01:03:11Z",
|
||||
"updated_at": "2020-06-03T08:06:04Z",
|
||||
"pushed_at": "2019-10-27T01:08:17Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263372042,
|
||||
"name": "CVE-2019-10149",
|
||||
|
|
25
2019/CVE-2019-10207.json
Normal file
25
2019/CVE-2019-10207.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 199611138,
|
||||
"name": "CVE-2019-10207",
|
||||
"full_name": "butterflyhack\/CVE-2019-10207",
|
||||
"owner": {
|
||||
"login": "butterflyhack",
|
||||
"id": 11525772,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11525772?v=4",
|
||||
"html_url": "https:\/\/github.com\/butterflyhack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/butterflyhack\/CVE-2019-10207",
|
||||
"description": "PoC for CVE-2019-10207",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-30T08:39:21Z",
|
||||
"updated_at": "2019-12-18T03:34:41Z",
|
||||
"pushed_at": "2019-07-30T08:50:32Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2019/CVE-2019-10392.json
Normal file
48
2019/CVE-2019-10392.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 211009198,
|
||||
"name": "CVE-2019-10392",
|
||||
"full_name": "jas502n\/CVE-2019-10392",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-10392",
|
||||
"description": "CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-26T05:45:00Z",
|
||||
"updated_at": "2019-10-16T07:34:14Z",
|
||||
"pushed_at": "2019-09-26T05:49:21Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 211651844,
|
||||
"name": "CVE-2019-10392_EXP",
|
||||
"full_name": "ftk-sostupid\/CVE-2019-10392_EXP",
|
||||
"owner": {
|
||||
"login": "ftk-sostupid",
|
||||
"id": 30171892,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30171892?v=4",
|
||||
"html_url": "https:\/\/github.com\/ftk-sostupid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ftk-sostupid\/CVE-2019-10392_EXP",
|
||||
"description": "Jenkins Git Client RCE CVE-2019-10392_Exp",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T11:22:41Z",
|
||||
"updated_at": "2019-10-27T17:19:37Z",
|
||||
"pushed_at": "2019-10-21T02:02:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,29 @@
|
|||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 192691928,
|
||||
"name": "UltraRealy_with_CVE-2019-1040",
|
||||
"full_name": "lazaars\/UltraRealy_with_CVE-2019-1040",
|
||||
"owner": {
|
||||
"login": "lazaars",
|
||||
"id": 36127186,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/36127186?v=4",
|
||||
"html_url": "https:\/\/github.com\/lazaars"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lazaars\/UltraRealy_with_CVE-2019-1040",
|
||||
"description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-19T08:32:31Z",
|
||||
"updated_at": "2020-06-15T02:28:16Z",
|
||||
"pushed_at": "2019-06-19T09:15:16Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 193532426,
|
||||
"name": "cve-2019-1040-scanner",
|
||||
|
@ -44,5 +67,28 @@
|
|||
"forks": 47,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 209096168,
|
||||
"name": "CVE-2019-1040",
|
||||
"full_name": "wzxmt\/CVE-2019-1040",
|
||||
"owner": {
|
||||
"login": "wzxmt",
|
||||
"id": 44249535,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/44249535?v=4",
|
||||
"html_url": "https:\/\/github.com\/wzxmt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wzxmt\/CVE-2019-1040",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-17T15:53:25Z",
|
||||
"updated_at": "2020-04-01T05:23:50Z",
|
||||
"pushed_at": "2019-09-17T15:53:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10475.json
Normal file
25
2019/CVE-2019-10475.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 220101094,
|
||||
"name": "CVE-2019-10475",
|
||||
"full_name": "vesche\/CVE-2019-10475",
|
||||
"owner": {
|
||||
"login": "vesche",
|
||||
"id": 8083281,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8083281?v=4",
|
||||
"html_url": "https:\/\/github.com\/vesche"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vesche\/CVE-2019-10475",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-11-06T22:19:01Z",
|
||||
"updated_at": "2020-03-02T00:23:05Z",
|
||||
"pushed_at": "2019-11-06T23:33:11Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
71
2019/CVE-2019-1064.json
Normal file
71
2019/CVE-2019-1064.json
Normal file
|
@ -0,0 +1,71 @@
|
|||
[
|
||||
{
|
||||
"id": 191548642,
|
||||
"name": "CVE-2019-1064",
|
||||
"full_name": "RythmStick\/CVE-2019-1064",
|
||||
"owner": {
|
||||
"login": "RythmStick",
|
||||
"id": 43847240,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43847240?v=4",
|
||||
"html_url": "https:\/\/github.com\/RythmStick"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RythmStick\/CVE-2019-1064",
|
||||
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T10:21:35Z",
|
||||
"updated_at": "2020-06-12T21:35:59Z",
|
||||
"pushed_at": "2019-06-13T09:55:07Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 191602145,
|
||||
"name": "CVE-2019-1064",
|
||||
"full_name": "0x00-0x00\/CVE-2019-1064",
|
||||
"owner": {
|
||||
"login": "0x00-0x00",
|
||||
"id": 23364530,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2019-1064",
|
||||
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T15:54:55Z",
|
||||
"updated_at": "2020-07-13T12:07:03Z",
|
||||
"pushed_at": "2019-06-12T12:25:42Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 192173000,
|
||||
"name": "CVE-2019-1064",
|
||||
"full_name": "attackgithub\/CVE-2019-1064",
|
||||
"owner": {
|
||||
"login": "attackgithub",
|
||||
"id": 45205753,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/45205753?v=4",
|
||||
"html_url": "https:\/\/github.com\/attackgithub"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/attackgithub\/CVE-2019-1064",
|
||||
"description": "CVE-2019-1064 - AppXSVC Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-16T09:31:11Z",
|
||||
"updated_at": "2019-06-18T21:49:16Z",
|
||||
"pushed_at": "2019-06-14T07:47:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10678.json
Normal file
25
2019/CVE-2019-10678.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 185265234,
|
||||
"name": "cve-2019-10678",
|
||||
"full_name": "cved-sources\/cve-2019-10678",
|
||||
"owner": {
|
||||
"login": "cved-sources",
|
||||
"id": 46423677,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
||||
"html_url": "https:\/\/github.com\/cved-sources"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-10678",
|
||||
"description": "cve-2019-10678",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T20:15:47Z",
|
||||
"updated_at": "2019-05-06T20:16:09Z",
|
||||
"pushed_at": "2019-05-06T20:16:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10685.json
Normal file
25
2019/CVE-2019-10685.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 179077030,
|
||||
"name": "CVE-2019-10685",
|
||||
"full_name": "alt3kx\/CVE-2019-10685",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2019-10685",
|
||||
"description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-02T12:50:46Z",
|
||||
"updated_at": "2019-05-11T02:51:22Z",
|
||||
"pushed_at": "2019-05-07T11:50:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-1069.json
Normal file
25
2019/CVE-2019-1069.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 189962146,
|
||||
"name": "SharpPolarBear",
|
||||
"full_name": "S3cur3Th1sSh1t\/SharpPolarBear",
|
||||
"owner": {
|
||||
"login": "S3cur3Th1sSh1t",
|
||||
"id": 27858067,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27858067?v=4",
|
||||
"html_url": "https:\/\/github.com\/S3cur3Th1sSh1t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/S3cur3Th1sSh1t\/SharpPolarBear",
|
||||
"description": "Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-03T08:07:32Z",
|
||||
"updated_at": "2020-07-09T13:30:56Z",
|
||||
"pushed_at": "2019-06-26T11:53:08Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10708.json
Normal file
25
2019/CVE-2019-10708.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 202295806,
|
||||
"name": "CVE-2019-10708",
|
||||
"full_name": "stavhaygn\/CVE-2019-10708",
|
||||
"owner": {
|
||||
"login": "stavhaygn",
|
||||
"id": 17663058,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17663058?v=4",
|
||||
"html_url": "https:\/\/github.com\/stavhaygn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stavhaygn\/CVE-2019-10708",
|
||||
"description": "CVE-2019-10708 SQL injection PoC",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-14T07:15:58Z",
|
||||
"updated_at": "2019-08-18T10:17:37Z",
|
||||
"pushed_at": "2019-08-18T10:17:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2019/CVE-2019-10758.json
Normal file
48
2019/CVE-2019-10758.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 230212773,
|
||||
"name": "CVE-2019-10758",
|
||||
"full_name": "masahiro331\/CVE-2019-10758",
|
||||
"owner": {
|
||||
"login": "masahiro331",
|
||||
"id": 20438853,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20438853?v=4",
|
||||
"html_url": "https:\/\/github.com\/masahiro331"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2019-10758",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2020-07-13T06:23:56Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 231926488,
|
||||
"name": "CVE-2019-10758",
|
||||
"full_name": "lp008\/CVE-2019-10758",
|
||||
"owner": {
|
||||
"login": "lp008",
|
||||
"id": 11436275,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11436275?v=4",
|
||||
"html_url": "https:\/\/github.com\/lp008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lp008\/CVE-2019-10758",
|
||||
"description": "CVE-2019-10758",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-05T14:05:56Z",
|
||||
"updated_at": "2020-04-08T09:00:56Z",
|
||||
"pushed_at": "2020-01-05T14:21:15Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10869.json
Normal file
25
2019/CVE-2019-10869.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 186229171,
|
||||
"name": "CVE-2019-10869",
|
||||
"full_name": "KTN1990\/CVE-2019-10869",
|
||||
"owner": {
|
||||
"login": "KTN1990",
|
||||
"id": 33407405,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33407405?v=4",
|
||||
"html_url": "https:\/\/github.com\/KTN1990"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KTN1990\/CVE-2019-10869",
|
||||
"description": "(Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-12T08:20:16Z",
|
||||
"updated_at": "2020-02-15T08:35:59Z",
|
||||
"pushed_at": "2019-05-17T10:41:43Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-10915.json
Normal file
25
2019/CVE-2019-10915.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 198133475,
|
||||
"name": "CVE-2019-10915",
|
||||
"full_name": "jiansiting\/CVE-2019-10915",
|
||||
"owner": {
|
||||
"login": "jiansiting",
|
||||
"id": 28823754,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28823754?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiansiting"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiansiting\/CVE-2019-10915",
|
||||
"description": "Siemens TIA administrator Tool RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-22T02:38:54Z",
|
||||
"updated_at": "2020-03-18T01:41:48Z",
|
||||
"pushed_at": "2019-07-22T11:48:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-1096.json
Normal file
25
2019/CVE-2019-1096.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 198776283,
|
||||
"name": "cve-2019-1096-poc",
|
||||
"full_name": "ze0r\/cve-2019-1096-poc",
|
||||
"owner": {
|
||||
"login": "ze0r",
|
||||
"id": 43227253,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4",
|
||||
"html_url": "https:\/\/github.com\/ze0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ze0r\/cve-2019-1096-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-25T07:01:45Z",
|
||||
"updated_at": "2020-06-07T11:48:48Z",
|
||||
"pushed_at": "2019-07-25T07:24:11Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 210457246,
|
||||
"name": "phuip-fpizdam",
|
||||
"full_name": "neex\/phuip-fpizdam",
|
||||
"owner": {
|
||||
"login": "neex",
|
||||
"id": 684237,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/684237?v=4",
|
||||
"html_url": "https:\/\/github.com\/neex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/neex\/phuip-fpizdam",
|
||||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2020-07-17T22:57:34Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1595,
|
||||
"watchers_count": 1595,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1595,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217065303,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "B1gd0g\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "B1gd0g",
|
||||
"id": 49259860,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49259860?v=4",
|
||||
"html_url": "https:\/\/github.com\/B1gd0g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/B1gd0g\/CVE-2019-11043",
|
||||
"description": "CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T13:32:14Z",
|
||||
"updated_at": "2019-10-23T13:35:49Z",
|
||||
"pushed_at": "2019-10-23T13:35:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217065801,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "tinker-li\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "tinker-li",
|
||||
"id": 41416976,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/41416976?v=4",
|
||||
"html_url": "https:\/\/github.com\/tinker-li"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tinker-li\/CVE-2019-11043",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T13:34:28Z",
|
||||
"updated_at": "2019-10-23T13:41:53Z",
|
||||
"pushed_at": "2019-10-23T13:41:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217171261,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "jas502n\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11043",
|
||||
"description": "php-fpm+Nginx RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T23:26:57Z",
|
||||
"updated_at": "2020-06-11T06:48:49Z",
|
||||
"pushed_at": "2019-10-29T02:02:34Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217218372,
|
||||
"name": "PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-",
|
||||
|
@ -22,6 +114,259 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217257852,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "ianxtianxt\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "ianxtianxt",
|
||||
"id": 45796484,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
|
||||
"html_url": "https:\/\/github.com\/ianxtianxt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-11043",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-24T09:09:01Z",
|
||||
"updated_at": "2019-10-24T09:12:19Z",
|
||||
"pushed_at": "2019-10-24T09:12:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217258558,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "fairyming\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "fairyming",
|
||||
"id": 44915879,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/44915879?v=4",
|
||||
"html_url": "https:\/\/github.com\/fairyming"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fairyming\/CVE-2019-11043",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-24T09:12:38Z",
|
||||
"updated_at": "2020-04-05T08:53:01Z",
|
||||
"pushed_at": "2019-10-24T10:04:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217294430,
|
||||
"name": "CVE-2019-11043-Docker",
|
||||
"full_name": "akamajoris\/CVE-2019-11043-Docker",
|
||||
"owner": {
|
||||
"login": "akamajoris",
|
||||
"id": 4648441,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4648441?v=4",
|
||||
"html_url": "https:\/\/github.com\/akamajoris"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/akamajoris\/CVE-2019-11043-Docker",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-24T12:32:02Z",
|
||||
"updated_at": "2019-11-17T16:02:45Z",
|
||||
"pushed_at": "2019-10-28T10:23:17Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 218028044,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "theMiddleBlue\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "theMiddleBlue",
|
||||
"id": 4454961,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4454961?v=4",
|
||||
"html_url": "https:\/\/github.com\/theMiddleBlue"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theMiddleBlue\/CVE-2019-11043",
|
||||
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T11:09:06Z",
|
||||
"updated_at": "2020-06-27T15:50:27Z",
|
||||
"pushed_at": "2019-10-29T15:47:02Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 218080163,
|
||||
"name": "cve-2019-11043",
|
||||
"full_name": "shadow-horse\/cve-2019-11043",
|
||||
"owner": {
|
||||
"login": "shadow-horse",
|
||||
"id": 5432330,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5432330?v=4",
|
||||
"html_url": "https:\/\/github.com\/shadow-horse"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shadow-horse\/cve-2019-11043",
|
||||
"description": "CVE-2019-11043 PHP远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T15:31:34Z",
|
||||
"updated_at": "2019-10-29T15:39:20Z",
|
||||
"pushed_at": "2019-10-29T15:39:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 218269194,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "huowen\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "huowen",
|
||||
"id": 31957041,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/31957041?v=4",
|
||||
"html_url": "https:\/\/github.com\/huowen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huowen\/CVE-2019-11043",
|
||||
"description": "Python exp for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-29T11:16:12Z",
|
||||
"updated_at": "2019-11-27T04:14:03Z",
|
||||
"pushed_at": "2019-10-30T06:19:21Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 218500391,
|
||||
"name": "docker-CVE-2019-11043",
|
||||
"full_name": "ypereirareis\/docker-CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "ypereirareis",
|
||||
"id": 6838923,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6838923?v=4",
|
||||
"html_url": "https:\/\/github.com\/ypereirareis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ypereirareis\/docker-CVE-2019-11043",
|
||||
"description": "Docker image and commands to check CVE-2019-11043 vulnerability on nginx\/php-fpm applications.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-30T10:22:41Z",
|
||||
"updated_at": "2020-04-13T12:25:26Z",
|
||||
"pushed_at": "2019-10-30T12:53:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 220021213,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "MRdoulestar\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "MRdoulestar",
|
||||
"id": 18137763,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18137763?v=4",
|
||||
"html_url": "https:\/\/github.com\/MRdoulestar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MRdoulestar\/CVE-2019-11043",
|
||||
"description": "CVE-2019-11043 && PHP7.x && RCE EXP",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-06T14:53:13Z",
|
||||
"updated_at": "2019-11-06T15:29:35Z",
|
||||
"pushed_at": "2019-11-06T15:24:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 220032292,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "0th3rs-Security-Team\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "0th3rs-Security-Team",
|
||||
"id": 57450857,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/57450857?v=4",
|
||||
"html_url": "https:\/\/github.com\/0th3rs-Security-Team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0th3rs-Security-Team\/CVE-2019-11043",
|
||||
"description": "CVE-2019-11043 PHP7.x RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-06T15:44:47Z",
|
||||
"updated_at": "2020-05-21T06:24:43Z",
|
||||
"pushed_at": "2019-11-06T15:48:18Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 220966609,
|
||||
"name": "CVE-2019-11043",
|
||||
"full_name": "k8gege\/CVE-2019-11043",
|
||||
"owner": {
|
||||
"login": "k8gege",
|
||||
"id": 42312878,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4",
|
||||
"html_url": "https:\/\/github.com\/k8gege"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k8gege\/CVE-2019-11043",
|
||||
"description": "Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-11T11:29:54Z",
|
||||
"updated_at": "2020-04-27T11:25:06Z",
|
||||
"pushed_at": "2019-11-11T11:59:52Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 222200768,
|
||||
"name": "CVE-2019-11043_env",
|
||||
"full_name": "moniik\/CVE-2019-11043_env",
|
||||
"owner": {
|
||||
"login": "moniik",
|
||||
"id": 40794673,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40794673?v=4",
|
||||
"html_url": "https:\/\/github.com\/moniik"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/moniik\/CVE-2019-11043_env",
|
||||
"description": "remote debug environment for CLion",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-17T05:16:02Z",
|
||||
"updated_at": "2019-11-17T05:24:29Z",
|
||||
"pushed_at": "2019-11-17T05:19:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 263386812,
|
||||
"name": "cve-2019-11043",
|
||||
|
|
25
2019/CVE-2019-11061.json
Normal file
25
2019/CVE-2019-11061.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 178342166,
|
||||
"name": "ASUS-SmartHome-Exploit",
|
||||
"full_name": "tim124058\/ASUS-SmartHome-Exploit",
|
||||
"owner": {
|
||||
"login": "tim124058",
|
||||
"id": 12321191,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12321191?v=4",
|
||||
"html_url": "https:\/\/github.com\/tim124058"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tim124058\/ASUS-SmartHome-Exploit",
|
||||
"description": "ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-29T06:01:49Z",
|
||||
"updated_at": "2019-09-29T03:45:29Z",
|
||||
"pushed_at": "2019-08-27T04:23:24Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-11076.json
Normal file
25
2019/CVE-2019-11076.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 180679185,
|
||||
"name": "poc-cribl-rce",
|
||||
"full_name": "livehybrid\/poc-cribl-rce",
|
||||
"owner": {
|
||||
"login": "livehybrid",
|
||||
"id": 5527349,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5527349?v=4",
|
||||
"html_url": "https:\/\/github.com\/livehybrid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/livehybrid\/poc-cribl-rce",
|
||||
"description": "CVE-2019-11076 - Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthenticated web request",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T23:31:39Z",
|
||||
"updated_at": "2020-03-15T20:21:00Z",
|
||||
"pushed_at": "2019-04-11T12:50:39Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-1108.json
Normal file
25
2019/CVE-2019-1108.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 233756730,
|
||||
"name": "cve-2019-1108",
|
||||
"full_name": "Lanph3re\/cve-2019-1108",
|
||||
"owner": {
|
||||
"login": "Lanph3re",
|
||||
"id": 47443280,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/47443280?v=4",
|
||||
"html_url": "https:\/\/github.com\/Lanph3re"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Lanph3re\/cve-2019-1108",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-14T04:31:17Z",
|
||||
"updated_at": "2020-04-04T15:51:05Z",
|
||||
"pushed_at": "2020-01-14T04:36:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-11157.json
Normal file
25
2019/CVE-2019-11157.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 228203919,
|
||||
"name": "v0ltpwn",
|
||||
"full_name": "zkenjar\/v0ltpwn",
|
||||
"owner": {
|
||||
"login": "zkenjar",
|
||||
"id": 9324632,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/9324632?v=4",
|
||||
"html_url": "https:\/\/github.com\/zkenjar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zkenjar\/v0ltpwn",
|
||||
"description": "Tool Suite for V0LTpwn (CVE-2019-11157). Code will be published soon.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-15T15:11:07Z",
|
||||
"updated_at": "2020-04-12T13:02:11Z",
|
||||
"pushed_at": "2019-12-16T22:32:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-11223.json
Normal file
25
2019/CVE-2019-11223.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 181940820,
|
||||
"name": "CVE-2019-11223",
|
||||
"full_name": "AngelCtulhu\/CVE-2019-11223",
|
||||
"owner": {
|
||||
"login": "AngelCtulhu",
|
||||
"id": 36587659,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36587659?v=4",
|
||||
"html_url": "https:\/\/github.com\/AngelCtulhu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AngelCtulhu\/CVE-2019-11223",
|
||||
"description": "CVE-2019-11223 - Arbitrary File Upload in Wordpress Support Candy Plugin Version 2.0 Below",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-17T17:43:46Z",
|
||||
"updated_at": "2019-04-19T16:43:54Z",
|
||||
"pushed_at": "2019-04-19T04:32:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2019/CVE-2019-1132.json
Normal file
48
2019/CVE-2019-1132.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 198963113,
|
||||
"name": "CVE-2019-1132",
|
||||
"full_name": "Vlad-tri\/CVE-2019-1132",
|
||||
"owner": {
|
||||
"login": "Vlad-tri",
|
||||
"id": 20975540,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20975540?v=4",
|
||||
"html_url": "https:\/\/github.com\/Vlad-tri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Vlad-tri\/CVE-2019-1132",
|
||||
"description": "EoP POC for CVE-2019-1132",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-26T06:51:28Z",
|
||||
"updated_at": "2020-03-21T23:32:28Z",
|
||||
"pushed_at": "2019-09-08T07:58:12Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 199763019,
|
||||
"name": "CVE-2019-1132",
|
||||
"full_name": "petercc\/CVE-2019-1132",
|
||||
"owner": {
|
||||
"login": "petercc",
|
||||
"id": 1819628,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1819628?v=4",
|
||||
"html_url": "https:\/\/github.com\/petercc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/petercc\/CVE-2019-1132",
|
||||
"description": "CVE-2019-1132",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T02:30:28Z",
|
||||
"updated_at": "2019-11-05T07:24:12Z",
|
||||
"pushed_at": "2019-07-31T02:38:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,29 @@
|
|||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 197643691,
|
||||
"name": "jquery-prototype-pollution-fix",
|
||||
"full_name": "bitnesswise\/jquery-prototype-pollution-fix",
|
||||
"owner": {
|
||||
"login": "bitnesswise",
|
||||
"id": 32780182,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32780182?v=4",
|
||||
"html_url": "https:\/\/github.com\/bitnesswise"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bitnesswise\/jquery-prototype-pollution-fix",
|
||||
"description": "A fix for CVE-2019-11358 (prototype pollution in jquery)",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-18T19:15:33Z",
|
||||
"updated_at": "2020-04-04T15:02:00Z",
|
||||
"pushed_at": "2019-07-18T20:00:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 255702097,
|
||||
"name": "snyk-js-jquery-565129",
|
||||
|
|
25
2019/CVE-2019-11477.json
Normal file
25
2019/CVE-2019-11477.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 198296662,
|
||||
"name": "cve-2019-11477-poc",
|
||||
"full_name": "sasqwatch\/cve-2019-11477-poc",
|
||||
"owner": {
|
||||
"login": "sasqwatch",
|
||||
"id": 22352904,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22352904?v=4",
|
||||
"html_url": "https:\/\/github.com\/sasqwatch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sasqwatch\/cve-2019-11477-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-07-22T20:23:08Z",
|
||||
"updated_at": "2020-06-28T07:56:08Z",
|
||||
"pushed_at": "2019-07-21T15:56:43Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 203542766,
|
||||
"name": "CVE-2019-11510",
|
||||
"full_name": "projectzeroindia\/CVE-2019-11510",
|
||||
"owner": {
|
||||
"login": "projectzeroindia",
|
||||
"id": 54312442,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54312442?v=4",
|
||||
"html_url": "https:\/\/github.com\/projectzeroindia"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
|
||||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-21T08:40:26Z",
|
||||
"updated_at": "2020-07-04T15:43:00Z",
|
||||
"pushed_at": "2020-01-11T13:55:33Z",
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 203567273,
|
||||
"name": "Pulse",
|
||||
|
@ -22,6 +45,144 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 203747377,
|
||||
"name": "CVE-2019-11510-poc",
|
||||
"full_name": "imjdl\/CVE-2019-11510-poc",
|
||||
"owner": {
|
||||
"login": "imjdl",
|
||||
"id": 31382943,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/31382943?v=4",
|
||||
"html_url": "https:\/\/github.com\/imjdl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc",
|
||||
"description": "Pulse Secure SSL VPN pre-auth file reading",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-22T08:18:19Z",
|
||||
"updated_at": "2020-06-22T09:44:45Z",
|
||||
"pushed_at": "2019-08-26T19:33:43Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 204579243,
|
||||
"name": "CVE-2019-11510_poc",
|
||||
"full_name": "es0\/CVE-2019-11510_poc",
|
||||
"owner": {
|
||||
"login": "es0",
|
||||
"id": 10739380,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10739380?v=4",
|
||||
"html_url": "https:\/\/github.com\/es0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc",
|
||||
"description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-26T23:30:15Z",
|
||||
"updated_at": "2020-07-07T01:57:08Z",
|
||||
"pushed_at": "2019-08-27T00:52:49Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 204608508,
|
||||
"name": "http-pulse_ssl_vpn.nse",
|
||||
"full_name": "r00tpgp\/http-pulse_ssl_vpn.nse",
|
||||
"owner": {
|
||||
"login": "r00tpgp",
|
||||
"id": 29351179,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29351179?v=4",
|
||||
"html_url": "https:\/\/github.com\/r00tpgp"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse",
|
||||
"description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-27T03:04:19Z",
|
||||
"updated_at": "2020-04-21T06:45:53Z",
|
||||
"pushed_at": "2019-08-27T07:03:26Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 204666616,
|
||||
"name": "CVE-2019-11510-1",
|
||||
"full_name": "jas502n\/CVE-2019-11510-1",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1",
|
||||
"description": "SSL VPN Rce",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-27T09:21:10Z",
|
||||
"updated_at": "2020-06-27T03:05:40Z",
|
||||
"pushed_at": "2019-08-27T09:29:05Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 205106127,
|
||||
"name": "CVE-2019-11510",
|
||||
"full_name": "jason3e7\/CVE-2019-11510",
|
||||
"owner": {
|
||||
"login": "jason3e7",
|
||||
"id": 3059297,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/3059297?v=4",
|
||||
"html_url": "https:\/\/github.com\/jason3e7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-29T07:27:57Z",
|
||||
"updated_at": "2019-08-29T07:28:54Z",
|
||||
"pushed_at": "2019-08-29T07:28:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 207348255,
|
||||
"name": "pwn-pulse",
|
||||
"full_name": "BishopFox\/pwn-pulse",
|
||||
"owner": {
|
||||
"login": "BishopFox",
|
||||
"id": 4523757,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4523757?v=4",
|
||||
"html_url": "https:\/\/github.com\/BishopFox"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
|
||||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-09T15:58:39Z",
|
||||
"updated_at": "2020-07-08T14:09:16Z",
|
||||
"pushed_at": "2020-01-15T17:01:50Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 226548291,
|
||||
"name": "pulsexploit",
|
||||
|
|
25
2019/CVE-2019-11523.json
Normal file
25
2019/CVE-2019-11523.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 182799429,
|
||||
"name": "anviz-m3-rfid-cve-2019-11523-poc",
|
||||
"full_name": "wizlab-it\/anviz-m3-rfid-cve-2019-11523-poc",
|
||||
"owner": {
|
||||
"login": "wizlab-it",
|
||||
"id": 19650583,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19650583?v=4",
|
||||
"html_url": "https:\/\/github.com\/wizlab-it"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wizlab-it\/anviz-m3-rfid-cve-2019-11523-poc",
|
||||
"description": "Anviz M3 RFID CVE-2019-11523 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-22T14:00:50Z",
|
||||
"updated_at": "2019-06-13T16:23:09Z",
|
||||
"pushed_at": "2019-06-13T16:23:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-11539.json
Normal file
25
2019/CVE-2019-11539.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 206321288,
|
||||
"name": "CVE-2019-11539",
|
||||
"full_name": "0xDezzy\/CVE-2019-11539",
|
||||
"owner": {
|
||||
"login": "0xDezzy",
|
||||
"id": 4141697,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4141697?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xDezzy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xDezzy\/CVE-2019-11539",
|
||||
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-04T13:06:02Z",
|
||||
"updated_at": "2020-07-08T07:20:45Z",
|
||||
"pushed_at": "2019-09-04T17:39:35Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 197342430,
|
||||
"name": "CVE-2019-11580",
|
||||
"full_name": "jas502n\/CVE-2019-11580",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11580",
|
||||
"description": "CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-17T07:54:38Z",
|
||||
"updated_at": "2020-05-26T03:05:04Z",
|
||||
"pushed_at": "2019-07-18T10:03:28Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 245476096,
|
||||
"name": "CVE-2019-11580",
|
||||
|
|
48
2019/CVE-2019-11581.json
Normal file
48
2019/CVE-2019-11581.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 197105656,
|
||||
"name": "CVE-2019-11581",
|
||||
"full_name": "jas502n\/CVE-2019-11581",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11581",
|
||||
"description": "Atlassian JIRA Template injection vulnerability RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-16T02:27:00Z",
|
||||
"updated_at": "2020-07-16T07:17:49Z",
|
||||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 198763431,
|
||||
"name": "CVE-2019-11581",
|
||||
"full_name": "kobs0N\/CVE-2019-11581",
|
||||
"owner": {
|
||||
"login": "kobs0N",
|
||||
"id": 23138815,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/23138815?v=4",
|
||||
"html_url": "https:\/\/github.com\/kobs0N"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kobs0N\/CVE-2019-11581",
|
||||
"description": "CVE-2019–11581 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-25T05:29:23Z",
|
||||
"updated_at": "2020-03-17T18:01:38Z",
|
||||
"pushed_at": "2019-12-13T13:03:39Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 202974494,
|
||||
"name": "CVE-2019-11707",
|
||||
"full_name": "vigneshsrao\/CVE-2019-11707",
|
||||
"owner": {
|
||||
"login": "vigneshsrao",
|
||||
"id": 20860267,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20860267?v=4",
|
||||
"html_url": "https:\/\/github.com\/vigneshsrao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vigneshsrao\/CVE-2019-11707",
|
||||
"description": "Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu ",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-18T07:41:01Z",
|
||||
"updated_at": "2020-05-17T11:41:32Z",
|
||||
"pushed_at": "2019-08-18T07:42:36Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 255362000,
|
||||
"name": "cve-2019-11707",
|
||||
|
|
25
2019/CVE-2019-11730.json
Normal file
25
2019/CVE-2019-11730.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 229617717,
|
||||
"name": "CVE-2019-11730",
|
||||
"full_name": "alidnf\/CVE-2019-11730",
|
||||
"owner": {
|
||||
"login": "alidnf",
|
||||
"id": 54067374,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/54067374?v=4",
|
||||
"html_url": "https:\/\/github.com\/alidnf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alidnf\/CVE-2019-11730",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-22T19:14:05Z",
|
||||
"updated_at": "2020-04-04T01:29:38Z",
|
||||
"pushed_at": "2019-12-22T19:18:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-1181.json
Normal file
25
2019/CVE-2019-1181.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 202264461,
|
||||
"name": "cve-2019-1181",
|
||||
"full_name": "major203\/cve-2019-1181",
|
||||
"owner": {
|
||||
"login": "major203",
|
||||
"id": 7425945,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7425945?v=4",
|
||||
"html_url": "https:\/\/github.com\/major203"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/major203\/cve-2019-1181",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-08-14T03:07:02Z",
|
||||
"updated_at": "2019-08-14T03:07:02Z",
|
||||
"pushed_at": "2019-08-14T03:07:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-11881.json
Normal file
25
2019/CVE-2019-11881.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 188323560,
|
||||
"name": "VanCleef",
|
||||
"full_name": "MauroEldritch\/VanCleef",
|
||||
"owner": {
|
||||
"login": "MauroEldritch",
|
||||
"id": 1292978,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1292978?v=4",
|
||||
"html_url": "https:\/\/github.com\/MauroEldritch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MauroEldritch\/VanCleef",
|
||||
"description": "Exploit for CVE-2019-11881 (Rancher 2.1.4 Web Parameter Tampering)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-24T00:09:21Z",
|
||||
"updated_at": "2020-03-04T21:42:00Z",
|
||||
"pushed_at": "2019-06-10T22:10:10Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2019/CVE-2019-11931.json
Normal file
48
2019/CVE-2019-11931.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 222086842,
|
||||
"name": "whatsapp-rce-patched",
|
||||
"full_name": "kasif-dekel\/whatsapp-rce-patched",
|
||||
"owner": {
|
||||
"login": "kasif-dekel",
|
||||
"id": 5827021,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5827021?v=4",
|
||||
"html_url": "https:\/\/github.com\/kasif-dekel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kasif-dekel\/whatsapp-rce-patched",
|
||||
"description": "cve-2019-11931",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-16T11:06:52Z",
|
||||
"updated_at": "2020-07-14T09:22:51Z",
|
||||
"pushed_at": "2019-11-16T11:15:06Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 223598650,
|
||||
"name": "CVE-2019-11931",
|
||||
"full_name": "nop-team\/CVE-2019-11931",
|
||||
"owner": {
|
||||
"login": "nop-team",
|
||||
"id": 58111818,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/58111818?v=4",
|
||||
"html_url": "https:\/\/github.com\/nop-team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nop-team\/CVE-2019-11931",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-11-23T14:06:13Z",
|
||||
"updated_at": "2019-11-23T14:06:17Z",
|
||||
"pushed_at": "2019-11-23T14:06:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,234 @@
|
|||
[
|
||||
{
|
||||
"id": 212541592,
|
||||
"name": "CVE-2019-11932",
|
||||
"full_name": "dorkerdevil\/CVE-2019-11932",
|
||||
"owner": {
|
||||
"login": "dorkerdevil",
|
||||
"id": 15796745,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15796745?v=4",
|
||||
"html_url": "https:\/\/github.com\/dorkerdevil"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2019-11932",
|
||||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2020-07-05T05:03:17Z",
|
||||
"pushed_at": "2019-10-03T09:43:55Z",
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 75,
|
||||
"forks": 75,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 212824676,
|
||||
"name": "WhatsRCE",
|
||||
"full_name": "KeepWannabe\/WhatsRCE",
|
||||
"owner": {
|
||||
"login": "KeepWannabe",
|
||||
"id": 31374361,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31374361?v=4",
|
||||
"html_url": "https:\/\/github.com\/KeepWannabe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KeepWannabe\/WhatsRCE",
|
||||
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T13:45:44Z",
|
||||
"updated_at": "2020-07-07T12:15:29Z",
|
||||
"pushed_at": "2019-12-13T19:07:53Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 212837105,
|
||||
"name": "CVE-2019-11932",
|
||||
"full_name": "awakened1712\/CVE-2019-11932",
|
||||
"owner": {
|
||||
"login": "awakened1712",
|
||||
"id": 628212,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/628212?v=4",
|
||||
"html_url": "https:\/\/github.com\/awakened1712"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/awakened1712\/CVE-2019-11932",
|
||||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2020-07-11T17:44:00Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 212954402,
|
||||
"name": "CVE-2019-11932",
|
||||
"full_name": "TulungagungCyberLink\/CVE-2019-11932",
|
||||
"owner": {
|
||||
"login": "TulungagungCyberLink",
|
||||
"id": 46483873,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/46483873?v=4",
|
||||
"html_url": "https:\/\/github.com\/TulungagungCyberLink"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TulungagungCyberLink\/CVE-2019-11932",
|
||||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-05T06:24:08Z",
|
||||
"updated_at": "2019-11-03T03:01:39Z",
|
||||
"pushed_at": "2019-10-08T06:17:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 213187543,
|
||||
"name": "CVE-2019-11932",
|
||||
"full_name": "infiniteLoopers\/CVE-2019-11932",
|
||||
"owner": {
|
||||
"login": "infiniteLoopers",
|
||||
"id": 27885817,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/27885817?v=4",
|
||||
"html_url": "https:\/\/github.com\/infiniteLoopers"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-11932",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-06T14:54:35Z",
|
||||
"updated_at": "2019-10-18T20:41:54Z",
|
||||
"pushed_at": "2019-10-06T15:34:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 213971107,
|
||||
"name": "CVE-2019-11932",
|
||||
"full_name": "alexanderstonec\/CVE-2019-11932",
|
||||
"owner": {
|
||||
"login": "alexanderstonec",
|
||||
"id": 52692998,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52692998?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexanderstonec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexanderstonec\/CVE-2019-11932",
|
||||
"description": "The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-09T16:41:38Z",
|
||||
"updated_at": "2020-03-19T03:06:30Z",
|
||||
"pushed_at": "2019-10-09T17:00:02Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 215516489,
|
||||
"name": "CVE-2019-11932-SupportApp",
|
||||
"full_name": "valbrux\/CVE-2019-11932-SupportApp",
|
||||
"owner": {
|
||||
"login": "valbrux",
|
||||
"id": 20357515,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20357515?v=4",
|
||||
"html_url": "https:\/\/github.com\/valbrux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/valbrux\/CVE-2019-11932-SupportApp",
|
||||
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T10:04:30Z",
|
||||
"updated_at": "2020-07-16T04:23:00Z",
|
||||
"pushed_at": "2019-10-16T12:20:53Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 215635890,
|
||||
"name": "CVE-2019-11932",
|
||||
"full_name": "fastmo\/CVE-2019-11932",
|
||||
"owner": {
|
||||
"login": "fastmo",
|
||||
"id": 53575270,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/53575270?v=4",
|
||||
"html_url": "https:\/\/github.com\/fastmo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fastmo\/CVE-2019-11932",
|
||||
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T20:13:23Z",
|
||||
"updated_at": "2020-03-30T02:16:58Z",
|
||||
"pushed_at": "2019-10-16T20:24:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 217001772,
|
||||
"name": "CVE-2019-11932-whatsApp-exploit",
|
||||
"full_name": "mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
|
||||
"owner": {
|
||||
"login": "mRanonyMousTZ",
|
||||
"id": 38766899,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/38766899?v=4",
|
||||
"html_url": "https:\/\/github.com\/mRanonyMousTZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
|
||||
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-23T08:02:15Z",
|
||||
"updated_at": "2020-07-07T12:13:32Z",
|
||||
"pushed_at": "2019-10-23T08:25:48Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 228222453,
|
||||
"name": "CVE-2019-11932",
|
||||
"full_name": "SmoZy92\/CVE-2019-11932",
|
||||
"owner": {
|
||||
"login": "SmoZy92",
|
||||
"id": 58377338,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/58377338?v=4",
|
||||
"html_url": "https:\/\/github.com\/SmoZy92"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SmoZy92\/CVE-2019-11932",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-15T17:21:26Z",
|
||||
"updated_at": "2020-02-12T00:00:14Z",
|
||||
"pushed_at": "2019-12-15T17:40:15Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 239654888,
|
||||
"name": "https-github.com-awakened171",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 188635290,
|
||||
"name": "CVE-2019-12086-jackson-databind-file-read",
|
||||
"full_name": "codeplutos\/CVE-2019-12086-jackson-databind-file-read",
|
||||
"owner": {
|
||||
"login": "codeplutos",
|
||||
"id": 59257067,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/59257067?v=4",
|
||||
"html_url": "https:\/\/github.com\/codeplutos"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/codeplutos\/CVE-2019-12086-jackson-databind-file-read",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-26T03:19:49Z",
|
||||
"updated_at": "2020-06-27T16:08:29Z",
|
||||
"pushed_at": "2020-07-01T23:13:17Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 266165766,
|
||||
"name": "CVE-2019-12086",
|
||||
|
|
25
2019/CVE-2019-1215.json
Normal file
25
2019/CVE-2019-1215.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 232197518,
|
||||
"name": "CVE-2019-1215",
|
||||
"full_name": "bluefrostsecurity\/CVE-2019-1215",
|
||||
"owner": {
|
||||
"login": "bluefrostsecurity",
|
||||
"id": 4976074,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4976074?v=4",
|
||||
"html_url": "https:\/\/github.com\/bluefrostsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2019-1215",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-06T22:34:16Z",
|
||||
"updated_at": "2020-07-13T11:39:22Z",
|
||||
"pushed_at": "2020-01-07T14:29:45Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12169.json
Normal file
25
2019/CVE-2019-12169.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 188356491,
|
||||
"name": "ATutor-2.2.4-Language-Exploit",
|
||||
"full_name": "fuzzlove\/ATutor-2.2.4-Language-Exploit",
|
||||
"owner": {
|
||||
"login": "fuzzlove",
|
||||
"id": 44779781,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44779781?v=4",
|
||||
"html_url": "https:\/\/github.com\/fuzzlove"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fuzzlove\/ATutor-2.2.4-Language-Exploit",
|
||||
"description": "ATutor 2.2.4 Arbitrary File Upload \/ RCE (CVE-2019-12169)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-24T05:15:17Z",
|
||||
"updated_at": "2019-10-02T06:32:26Z",
|
||||
"pushed_at": "2019-06-09T21:39:55Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12170.json
Normal file
25
2019/CVE-2019-12170.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 186354983,
|
||||
"name": "ATutor-Instructor-Backup-Arbitrary-File",
|
||||
"full_name": "fuzzlove\/ATutor-Instructor-Backup-Arbitrary-File",
|
||||
"owner": {
|
||||
"login": "fuzzlove",
|
||||
"id": 44779781,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44779781?v=4",
|
||||
"html_url": "https:\/\/github.com\/fuzzlove"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fuzzlove\/ATutor-Instructor-Backup-Arbitrary-File",
|
||||
"description": "ATutor 2.2.4 'Backup' Remote Command Execution (CVE-2019-12170)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-13T06:01:47Z",
|
||||
"updated_at": "2019-06-03T04:12:28Z",
|
||||
"pushed_at": "2019-06-03T04:12:26Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12181.json
Normal file
25
2019/CVE-2019-12181.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 191652233,
|
||||
"name": "CVE-2019-12181",
|
||||
"full_name": "guywhataguy\/CVE-2019-12181",
|
||||
"owner": {
|
||||
"login": "guywhataguy",
|
||||
"id": 33753158,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/33753158?v=4",
|
||||
"html_url": "https:\/\/github.com\/guywhataguy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guywhataguy\/CVE-2019-12181",
|
||||
"description": "LPE Exploit For CVE-2019-12181 (Serv-U FTP 15.1.6)",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T22:18:45Z",
|
||||
"updated_at": "2020-05-14T17:28:26Z",
|
||||
"pushed_at": "2019-10-20T21:36:23Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12185.json
Normal file
25
2019/CVE-2019-12185.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 187415847,
|
||||
"name": "eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
|
||||
"full_name": "fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
|
||||
"owner": {
|
||||
"login": "fuzzlove",
|
||||
"id": 44779781,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/44779781?v=4",
|
||||
"html_url": "https:\/\/github.com\/fuzzlove"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fuzzlove\/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE",
|
||||
"description": "eLabFTW 1.8.5 'EntityController' Arbitrary File Upload \/ RCE (CVE-2019-12185)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-18T23:56:52Z",
|
||||
"updated_at": "2019-11-12T06:27:17Z",
|
||||
"pushed_at": "2019-05-20T00:29:16Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2019/CVE-2019-12189.json
Normal file
48
2019/CVE-2019-12189.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 187569819,
|
||||
"name": "CVE-2019-12189",
|
||||
"full_name": "falconz\/CVE-2019-12189",
|
||||
"owner": {
|
||||
"login": "falconz",
|
||||
"id": 9218490,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9218490?v=4",
|
||||
"html_url": "https:\/\/github.com\/falconz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/falconz\/CVE-2019-12189",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-20T04:52:38Z",
|
||||
"updated_at": "2019-05-20T06:03:05Z",
|
||||
"pushed_at": "2019-05-20T06:03:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 187589027,
|
||||
"name": "CVE-2019-12189",
|
||||
"full_name": "tuyenhva\/CVE-2019-12189",
|
||||
"owner": {
|
||||
"login": "tuyenhva",
|
||||
"id": 17802001,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
|
||||
"html_url": "https:\/\/github.com\/tuyenhva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12189",
|
||||
"description": "CVE-2019-12189 - Zoho ManageEngine ServiceDesk Plus 9.3 XSS vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-20T07:23:51Z",
|
||||
"updated_at": "2019-05-20T07:44:03Z",
|
||||
"pushed_at": "2019-05-20T07:44:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12190.json
Normal file
25
2019/CVE-2019-12190.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 187596474,
|
||||
"name": "CVE-2019-12190",
|
||||
"full_name": "tuyenhva\/CVE-2019-12190",
|
||||
"owner": {
|
||||
"login": "tuyenhva",
|
||||
"id": 17802001,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
|
||||
"html_url": "https:\/\/github.com\/tuyenhva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12190",
|
||||
"description": "CVE-2019-12190 - CentOS-WebPanel XSS vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-20T08:09:49Z",
|
||||
"updated_at": "2019-05-20T08:13:09Z",
|
||||
"pushed_at": "2019-05-20T08:13:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12252.json
Normal file
25
2019/CVE-2019-12252.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 187880000,
|
||||
"name": "CVE-2019-12252",
|
||||
"full_name": "tuyenhva\/CVE-2019-12252",
|
||||
"owner": {
|
||||
"login": "tuyenhva",
|
||||
"id": 17802001,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17802001?v=4",
|
||||
"html_url": "https:\/\/github.com\/tuyenhva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tuyenhva\/CVE-2019-12252",
|
||||
"description": "CVE-2019-12252 Zoho ManageEngine ServiceDesk Plus < 10.5 Incorrect Access Control",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T16:59:23Z",
|
||||
"updated_at": "2019-05-21T17:01:52Z",
|
||||
"pushed_at": "2019-05-21T17:01:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12255.json
Normal file
25
2019/CVE-2019-12255.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 221308311,
|
||||
"name": "Urgent11-Suricata-LUA-scripts",
|
||||
"full_name": "sud0woodo\/Urgent11-Suricata-LUA-scripts",
|
||||
"owner": {
|
||||
"login": "sud0woodo",
|
||||
"id": 40278342,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/40278342?v=4",
|
||||
"html_url": "https:\/\/github.com\/sud0woodo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sud0woodo\/Urgent11-Suricata-LUA-scripts",
|
||||
"description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-12T20:43:46Z",
|
||||
"updated_at": "2020-07-04T20:50:43Z",
|
||||
"pushed_at": "2019-11-28T20:16:35Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2019/CVE-2019-12272.json
Normal file
48
2019/CVE-2019-12272.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 195171033,
|
||||
"name": "LuCI_RCE_exp",
|
||||
"full_name": "HACHp1\/LuCI_RCE_exp",
|
||||
"owner": {
|
||||
"login": "HACHp1",
|
||||
"id": 25722416,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25722416?v=4",
|
||||
"html_url": "https:\/\/github.com\/HACHp1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HACHp1\/LuCI_RCE_exp",
|
||||
"description": "Exp of cve-2019-12272",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-04T04:54:36Z",
|
||||
"updated_at": "2020-04-22T15:44:21Z",
|
||||
"pushed_at": "2019-07-10T04:33:30Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 226418974,
|
||||
"name": "lede-17.01.3",
|
||||
"full_name": "roguedream\/lede-17.01.3",
|
||||
"owner": {
|
||||
"login": "roguedream",
|
||||
"id": 15247135,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15247135?v=4",
|
||||
"html_url": "https:\/\/github.com\/roguedream"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/roguedream\/lede-17.01.3",
|
||||
"description": "Version-contains-cve-2019-12272",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-06T22:04:24Z",
|
||||
"updated_at": "2019-12-06T22:19:00Z",
|
||||
"pushed_at": "2019-12-06T22:18:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12314.json
Normal file
25
2019/CVE-2019-12314.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 219755425,
|
||||
"name": "CVE-2019-12314",
|
||||
"full_name": "ras313\/CVE-2019-12314",
|
||||
"owner": {
|
||||
"login": "ras313",
|
||||
"id": 57402076,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/57402076?v=4",
|
||||
"html_url": "https:\/\/github.com\/ras313"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ras313\/CVE-2019-12314",
|
||||
"description": "Optional Mitigation Steps",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-05T13:45:58Z",
|
||||
"updated_at": "2019-11-05T13:53:04Z",
|
||||
"pushed_at": "2019-11-05T13:51:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 198579428,
|
||||
"name": "CVE-2019-12384",
|
||||
"full_name": "jas502n\/CVE-2019-12384",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12384",
|
||||
"description": "Jackson Rce For CVE-2019-12384 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-24T07:12:14Z",
|
||||
"updated_at": "2020-06-04T06:10:41Z",
|
||||
"pushed_at": "2019-07-24T07:31:42Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 198939305,
|
||||
"name": "Jackson_RCE-CVE-2019-12384",
|
||||
|
|
25
2019/CVE-2019-12409.json
Normal file
25
2019/CVE-2019-12409.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 222651199,
|
||||
"name": "CVE-2019-12409",
|
||||
"full_name": "jas502n\/CVE-2019-12409",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12409",
|
||||
"description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-19T08:53:56Z",
|
||||
"updated_at": "2020-06-25T05:24:04Z",
|
||||
"pushed_at": "2019-11-19T09:18:00Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12453.json
Normal file
25
2019/CVE-2019-12453.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 197012907,
|
||||
"name": "CVE-2019-12453",
|
||||
"full_name": "undefinedmode\/CVE-2019-12453",
|
||||
"owner": {
|
||||
"login": "undefinedmode",
|
||||
"id": 4165481,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4165481?v=4",
|
||||
"html_url": "https:\/\/github.com\/undefinedmode"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12453",
|
||||
"description": "Authenticated XSS in Microstrategy Web - Versions prior to 10.1 patch 10",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-15T14:17:10Z",
|
||||
"updated_at": "2019-07-15T14:44:49Z",
|
||||
"pushed_at": "2019-07-15T14:44:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12460.json
Normal file
25
2019/CVE-2019-12460.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 188212424,
|
||||
"name": "WebPort-v1.19.1-Reflected-XSS",
|
||||
"full_name": "EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
|
||||
"owner": {
|
||||
"login": "EmreOvunc",
|
||||
"id": 15659223,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15659223?v=4",
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EmreOvunc\/WebPort-v1.19.1-Reflected-XSS",
|
||||
"description": "CVE-2019-12460|Reflected XSS in WebPort-v1.19.1 impacts users who open a maliciously crafted link or third-party web page.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T10:27:49Z",
|
||||
"updated_at": "2020-05-16T12:47:54Z",
|
||||
"pushed_at": "2019-05-30T16:21:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12475.json
Normal file
25
2019/CVE-2019-12475.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 197017455,
|
||||
"name": "CVE-2019-12475",
|
||||
"full_name": "undefinedmode\/CVE-2019-12475",
|
||||
"owner": {
|
||||
"login": "undefinedmode",
|
||||
"id": 4165481,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4165481?v=4",
|
||||
"html_url": "https:\/\/github.com\/undefinedmode"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/undefinedmode\/CVE-2019-12475",
|
||||
"description": "Stored XSS in MicroStrategy Web prior to 10.4.6",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-15T14:42:53Z",
|
||||
"updated_at": "2019-07-15T14:47:02Z",
|
||||
"pushed_at": "2019-07-15T14:47:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
94
2019/CVE-2019-1253.json
Normal file
94
2019/CVE-2019-1253.json
Normal file
|
@ -0,0 +1,94 @@
|
|||
[
|
||||
{
|
||||
"id": 180551311,
|
||||
"name": "CVE-2019-1253",
|
||||
"full_name": "rogue-kdc\/CVE-2019-1253",
|
||||
"owner": {
|
||||
"login": "rogue-kdc",
|
||||
"id": 49311295,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/49311295?v=4",
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rogue-kdc\/CVE-2019-1253",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T09:44:38Z",
|
||||
"updated_at": "2020-07-09T02:24:48Z",
|
||||
"pushed_at": "2019-09-11T08:46:24Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 207780184,
|
||||
"name": "CVE-2019-1253",
|
||||
"full_name": "denmilu\/CVE-2019-1253",
|
||||
"owner": {
|
||||
"login": "denmilu",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/denmilu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/denmilu\/CVE-2019-1253",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T09:59:22Z",
|
||||
"updated_at": "2019-09-11T09:59:44Z",
|
||||
"pushed_at": "2019-09-11T09:59:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 207902814,
|
||||
"name": "CVE-2019-1253",
|
||||
"full_name": "padovah4ck\/CVE-2019-1253",
|
||||
"owner": {
|
||||
"login": "padovah4ck",
|
||||
"id": 13963076,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13963076?v=4",
|
||||
"html_url": "https:\/\/github.com\/padovah4ck"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/padovah4ck\/CVE-2019-1253",
|
||||
"description": "Poc for CVE-2019-1253",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T20:40:15Z",
|
||||
"updated_at": "2020-06-10T14:04:05Z",
|
||||
"pushed_at": "2019-09-12T14:43:47Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 133,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 207924388,
|
||||
"name": "CVE-2019-1253",
|
||||
"full_name": "sgabe\/CVE-2019-1253",
|
||||
"owner": {
|
||||
"login": "sgabe",
|
||||
"id": 5206619,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5206619?v=4",
|
||||
"html_url": "https:\/\/github.com\/sgabe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sgabe\/CVE-2019-1253",
|
||||
"description": "AppXSvc Arbitrary File Security Descriptor Overwrite EoP",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-11T23:28:59Z",
|
||||
"updated_at": "2020-04-14T21:19:18Z",
|
||||
"pushed_at": "2019-09-15T17:09:51Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12538.json
Normal file
25
2019/CVE-2019-12538.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 190171110,
|
||||
"name": "CVE-2019-12538",
|
||||
"full_name": "tarantula-team\/CVE-2019-12538",
|
||||
"owner": {
|
||||
"login": "tarantula-team",
|
||||
"id": 51333391,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51333391?v=4",
|
||||
"html_url": "https:\/\/github.com\/tarantula-team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-12538",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-04T09:32:10Z",
|
||||
"updated_at": "2019-11-19T08:18:53Z",
|
||||
"pushed_at": "2019-11-19T08:18:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12541.json
Normal file
25
2019/CVE-2019-12541.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 190172498,
|
||||
"name": "CVE-2019-12541",
|
||||
"full_name": "tarantula-team\/CVE-2019-12541",
|
||||
"owner": {
|
||||
"login": "tarantula-team",
|
||||
"id": 51333391,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51333391?v=4",
|
||||
"html_url": "https:\/\/github.com\/tarantula-team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-12541",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-04T09:40:20Z",
|
||||
"updated_at": "2019-11-19T08:17:08Z",
|
||||
"pushed_at": "2019-11-19T08:17:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12542.json
Normal file
25
2019/CVE-2019-12542.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 190173583,
|
||||
"name": "CVE-2019-12542",
|
||||
"full_name": "tarantula-team\/CVE-2019-12542",
|
||||
"owner": {
|
||||
"login": "tarantula-team",
|
||||
"id": 51333391,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51333391?v=4",
|
||||
"html_url": "https:\/\/github.com\/tarantula-team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-12542",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-04T09:46:51Z",
|
||||
"updated_at": "2019-11-19T08:17:50Z",
|
||||
"pushed_at": "2019-11-19T08:17:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12543.json
Normal file
25
2019/CVE-2019-12543.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 190174353,
|
||||
"name": "CVE-2019-12543",
|
||||
"full_name": "tarantula-team\/CVE-2019-12543",
|
||||
"owner": {
|
||||
"login": "tarantula-team",
|
||||
"id": 51333391,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51333391?v=4",
|
||||
"html_url": "https:\/\/github.com\/tarantula-team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-12543",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-04T09:51:42Z",
|
||||
"updated_at": "2019-11-19T08:18:20Z",
|
||||
"pushed_at": "2019-11-19T08:18:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12562.json
Normal file
25
2019/CVE-2019-12562.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 212626761,
|
||||
"name": "CVE-2019-12562",
|
||||
"full_name": "MAYASEVEN\/CVE-2019-12562",
|
||||
"owner": {
|
||||
"login": "MAYASEVEN",
|
||||
"id": 1219852,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1219852?v=4",
|
||||
"html_url": "https:\/\/github.com\/MAYASEVEN"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MAYASEVEN\/CVE-2019-12562",
|
||||
"description": "Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 | XSS to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T16:29:58Z",
|
||||
"updated_at": "2020-07-12T12:12:02Z",
|
||||
"pushed_at": "2019-10-03T17:28:50Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2019/CVE-2019-12586.json
Normal file
25
2019/CVE-2019-12586.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 206106300,
|
||||
"name": "esp32_esp8266_attacks",
|
||||
"full_name": "Matheus-Garbelini\/esp32_esp8266_attacks",
|
||||
"owner": {
|
||||
"login": "Matheus-Garbelini",
|
||||
"id": 6465668,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/6465668?v=4",
|
||||
"html_url": "https:\/\/github.com\/Matheus-Garbelini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Matheus-Garbelini\/esp32_esp8266_attacks",
|
||||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2020-07-12T08:01:51Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 666,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue