# PoC in GitHub ## 1999 ### CVE-1999-0532 - [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner) ## 2000 ### CVE-2000-0170 - [mike182/exploit](https://github.com/mike182/exploit) ### CVE-2000-0979 - [Z6543/CVE-2000-0979](https://github.com/Z6543/CVE-2000-0979) ## 2001 ### CVE-2001-0680 - [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680) ### CVE-2001-0758 - [alt3kx/CVE-2001-0758](https://github.com/alt3kx/CVE-2001-0758) ### CVE-2001-0931 - [alt3kx/CVE-2001-0931](https://github.com/alt3kx/CVE-2001-0931) ### CVE-2001-0932 - [alt3kx/CVE-2001-0932](https://github.com/alt3kx/CVE-2001-0932) ### CVE-2001-0933 - [alt3kx/CVE-2001-0933](https://github.com/alt3kx/CVE-2001-0933) ### CVE-2001-0934 - [alt3kx/CVE-2001-0934](https://github.com/alt3kx/CVE-2001-0934) ### CVE-2001-1442 - [alt3kx/CVE-2001-1442](https://github.com/alt3kx/CVE-2001-1442) ## 2002 ### CVE-2002-0200 - [alt3kx/CVE-2002-0200](https://github.com/alt3kx/CVE-2002-0200) ### CVE-2002-0201 - [alt3kx/CVE-2002-0201](https://github.com/alt3kx/CVE-2002-0201) ### CVE-2002-0288 - [alt3kx/CVE-2002-0288](https://github.com/alt3kx/CVE-2002-0288) ### CVE-2002-0289 - [alt3kx/CVE-2002-0289](https://github.com/alt3kx/CVE-2002-0289) ### CVE-2002-0346 - [alt3kx/CVE-2002-0346](https://github.com/alt3kx/CVE-2002-0346) ### CVE-2002-0347 - [alt3kx/CVE-2002-0347](https://github.com/alt3kx/CVE-2002-0347) ### CVE-2002-0348 - [alt3kx/CVE-2002-0348](https://github.com/alt3kx/CVE-2002-0348) ### CVE-2002-0448 - [alt3kx/CVE-2002-0448](https://github.com/alt3kx/CVE-2002-0448) ### CVE-2002-0740 - [alt3kx/CVE-2002-0740](https://github.com/alt3kx/CVE-2002-0740) ### CVE-2002-0991 - [alt3kx/CVE-2002-0991](https://github.com/alt3kx/CVE-2002-0991) ## 2003 ### CVE-2003-0222 - [phamthanhsang280477/CVE-2003-0222](https://github.com/phamthanhsang280477/CVE-2003-0222) ### CVE-2003-0264 - [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264) - [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit) - [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264) ## 2004 ### CVE-2004-0558 - [fibonascii/CVE-2004-0558](https://github.com/fibonascii/CVE-2004-0558) ### CVE-2004-2167 - [uzzzval/cve-2004-2167](https://github.com/uzzzval/cve-2004-2167) ### CVE-2004-2271 - [kkirsche/CVE-2004-2271](https://github.com/kkirsche/CVE-2004-2271) - [PercussiveElbow/CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow](https://github.com/PercussiveElbow/CVE-2004-2271-MiniShare-1.4.1-Buffer-Overflow) - [war4uthor/CVE-2004-2271](https://github.com/war4uthor/CVE-2004-2271) - [pwncone/CVE-2004-2271-MiniShare-1.4.1-BOF](https://github.com/pwncone/CVE-2004-2271-MiniShare-1.4.1-BOF) ### CVE-2004-2549 - [alt3kx/CVE-2004-2549](https://github.com/alt3kx/CVE-2004-2549) ## 2005 ### CVE-2005-1125 - [tagatac/libsafe-CVE-2005-1125](https://github.com/tagatac/libsafe-CVE-2005-1125) ### CVE-2005-2428 - [schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit](https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit) ## 2006 ### CVE-2006-1236 - [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236) ### CVE-2006-3592 - [adenkiewicz/CVE-2006-3592](https://github.com/adenkiewicz/CVE-2006-3592) ### CVE-2006-3747 - [spinfoo/CVE-2006-3747](https://github.com/spinfoo/CVE-2006-3747) ### CVE-2006-4777 - [Mario1234/js-driveby-download-CVE-2006-4777](https://github.com/Mario1234/js-driveby-download-CVE-2006-4777) ### CVE-2006-4814 - [tagatac/linux-CVE-2006-4814](https://github.com/tagatac/linux-CVE-2006-4814) ### CVE-2006-6184 - [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184) - [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184) ## 2007 ### CVE-2007-0038 - [Axua/CVE-2007-0038](https://github.com/Axua/CVE-2007-0038) ### CVE-2007-0843 - [z3APA3A/spydir](https://github.com/z3APA3A/spydir) ### CVE-2007-1567 - [war4uthor/CVE-2007-1567](https://github.com/war4uthor/CVE-2007-1567) ### CVE-2007-2447 - [noondi/metasploitable2](https://github.com/noondi/metasploitable2) - [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447) - [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap) - [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script) - [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447) ### CVE-2007-3830 - [alt3kx/CVE-2007-3830](https://github.com/alt3kx/CVE-2007-3830) ### CVE-2007-3831 - [alt3kx/CVE-2007-3831](https://github.com/alt3kx/CVE-2007-3831) ### CVE-2007-4607 - [joeyrideout/CVE-2007-4607](https://github.com/joeyrideout/CVE-2007-4607) ### CVE-2007-5036 - [alt3kx/CVE-2007-5036](https://github.com/alt3kx/CVE-2007-5036) ### CVE-2007-6638 - [alt3kx/CVE-2007-6638](https://github.com/alt3kx/CVE-2007-6638) ## 2008 ### CVE-2008-0128 - [ngyanch/4062-1](https://github.com/ngyanch/4062-1) ### CVE-2008-0166 - [g0tmi1k/debian-ssh](https://github.com/g0tmi1k/debian-ssh) - [avarx/vulnkeys](https://github.com/avarx/vulnkeys) - [nu11secur1ty/debian-ssh](https://github.com/nu11secur1ty/debian-ssh) ### CVE-2008-0228 - [SpiderLabs/TWSL2011-007_iOS_code_workaround](https://github.com/SpiderLabs/TWSL2011-007_iOS_code_workaround) ### CVE-2008-1611 - [Axua/CVE-2008-1611](https://github.com/Axua/CVE-2008-1611) ### CVE-2008-1613 - [SECFORCE/CVE-2008-1613](https://github.com/SECFORCE/CVE-2008-1613) ### CVE-2008-2938 - [Naramsim/Offensive](https://github.com/Naramsim/Offensive) ### CVE-2008-4250 - [thunderstrike9090/Conflicker_analysis_scripts](https://github.com/thunderstrike9090/Conflicker_analysis_scripts) ### CVE-2008-4609 - [marcelki/sockstress](https://github.com/marcelki/sockstress) ### CVE-2008-4654 - [bongbongco/CVE-2008-4654](https://github.com/bongbongco/CVE-2008-4654) - [ChinaKevinLi/VLC-CVE-2008-4654-Exploit](https://github.com/ChinaKevinLi/VLC-CVE-2008-4654-Exploit) ### CVE-2008-5416 - [SECFORCE/CVE-2008-5416](https://github.com/SECFORCE/CVE-2008-5416) ### CVE-2008-6827 - [alt3kx/CVE-2008-6827](https://github.com/alt3kx/CVE-2008-6827) ### CVE-2008-6970 - [KyomaHooin/CVE-2008-6970](https://github.com/KyomaHooin/CVE-2008-6970) ### CVE-2008-7220 - [followboy1999/CVE-2008-7220](https://github.com/followboy1999/CVE-2008-7220) ## 2009 ### CVE-2009-0473 - [akbarq/CVE-2009-0473](https://github.com/akbarq/CVE-2009-0473) ### CVE-2009-0689 - [Fullmetal5/str2hax](https://github.com/Fullmetal5/str2hax) ### CVE-2009-1151 - [minervais/pocs](https://github.com/minervais/pocs) ### CVE-2009-1244 - [piotrbania/vmware_exploit_pack_CVE-2009-1244](https://github.com/piotrbania/vmware_exploit_pack_CVE-2009-1244) ### CVE-2009-1324 - [war4uthor/CVE-2009-1324](https://github.com/war4uthor/CVE-2009-1324) ### CVE-2009-1330 - [adenkiewicz/CVE-2009-1330](https://github.com/adenkiewicz/CVE-2009-1330) - [war4uthor/CVE-2009-1330](https://github.com/war4uthor/CVE-2009-1330) - [exploitwritter/CVE-2009-1330_EasyRMToMp3Converter](https://github.com/exploitwritter/CVE-2009-1330_EasyRMToMp3Converter) ### CVE-2009-1437 - [HanseSecure/CVE-2009-1437](https://github.com/HanseSecure/CVE-2009-1437) ### CVE-2009-1904 - [NZKoz/bigdecimal-segfault-fix](https://github.com/NZKoz/bigdecimal-segfault-fix) ### CVE-2009-2692 - [jdvalentini/CVE-2009-2692](https://github.com/jdvalentini/CVE-2009-2692) ### CVE-2009-2698 - [xiaoxiaoleo/CVE-2009-2698](https://github.com/xiaoxiaoleo/CVE-2009-2698) ### CVE-2009-3103 - [mazding/ms09050](https://github.com/mazding/ms09050) ### CVE-2009-4092 - [xiaoyu-iid/Simplog-Exploit](https://github.com/xiaoyu-iid/Simplog-Exploit) ### CVE-2009-4118 - [alt3kx/CVE-2009-4118](https://github.com/alt3kx/CVE-2009-4118) ### CVE-2009-4137 - [Alexeyan/CVE-2009-4137](https://github.com/Alexeyan/CVE-2009-4137) ### CVE-2009-4660 - [war4uthor/CVE-2009-4660](https://github.com/war4uthor/CVE-2009-4660) ### CVE-2009-5147 - [vpereira/CVE-2009-5147](https://github.com/vpereira/CVE-2009-5147) - [zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-](https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-) ## 2010 ### CVE-2010-0426 - [t0kx/privesc-CVE-2010-0426](https://github.com/t0kx/privesc-CVE-2010-0426) - [cved-sources/cve-2010-0426](https://github.com/cved-sources/cve-2010-0426) ### CVE-2010-0738 - [ChristianPapathanasiou/jboss-autopwn](https://github.com/ChristianPapathanasiou/jboss-autopwn) - [gitcollect/jboss-autopwn](https://github.com/gitcollect/jboss-autopwn) ### CVE-2010-1205 - [mk219533/CVE-2010-1205](https://github.com/mk219533/CVE-2010-1205) ### CVE-2010-1411 - [MAVProxyUser/httpfuzz-robomiller](https://github.com/MAVProxyUser/httpfuzz-robomiller) ### CVE-2010-2075 - [M4LV0/UnrealIRCd-3.2.8.1-RCE](https://github.com/M4LV0/UnrealIRCd-3.2.8.1-RCE) ### CVE-2010-3332 - [bongbongco/MS10-070](https://github.com/bongbongco/MS10-070) ### CVE-2010-3333 - [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333) ### CVE-2010-3437 - [ehuan015/CVE-2010-3437](https://github.com/ehuan015/CVE-2010-3437) ### CVE-2010-3490 - [moayadalmalat/CVE-2010-3490](https://github.com/moayadalmalat/CVE-2010-3490) ### CVE-2010-3600 - [LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2](https://github.com/LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2) ### CVE-2010-3847 - [magisterquis/cve-2010-3847](https://github.com/magisterquis/cve-2010-3847) ### CVE-2010-3904 - [redhatkaty/-cve-2010-3904-report](https://github.com/redhatkaty/-cve-2010-3904-report) ### CVE-2010-3971 - [nektra/CVE-2010-3971-hotpatch](https://github.com/nektra/CVE-2010-3971-hotpatch) ### CVE-2010-4221 - [M31MOTH/cve-2010-4221](https://github.com/M31MOTH/cve-2010-4221) ### CVE-2010-4258 - [johnreginald/CVE-2010-4258](https://github.com/johnreginald/CVE-2010-4258) ### CVE-2010-4476 - [grzegorzblaszczyk/CVE-2010-4476-check](https://github.com/grzegorzblaszczyk/CVE-2010-4476-check) ### CVE-2010-4669 - [quinn-samuel-perry/CVE-2010-4669](https://github.com/quinn-samuel-perry/CVE-2010-4669) ### CVE-2010-4804 - [thomascannon/android-cve-2010-4804](https://github.com/thomascannon/android-cve-2010-4804) ### CVE-2010-5327 - [Michael-Main/CVE-2010-5327](https://github.com/Michael-Main/CVE-2010-5327) ## 2011 ### CVE-2011-0228 - [jan0/isslfix](https://github.com/jan0/isslfix) ### CVE-2011-1237 - [BrunoPujos/CVE-2011-1237](https://github.com/BrunoPujos/CVE-2011-1237) ### CVE-2011-1473 - [c826/bash-tls-reneg-attack](https://github.com/c826/bash-tls-reneg-attack) - [zjt674449039/cve-2011-1473](https://github.com/zjt674449039/cve-2011-1473) ### CVE-2011-1475 - [samaujs/CVE-2011-1475](https://github.com/samaujs/CVE-2011-1475) ### CVE-2011-1485 - [Pashkela/CVE-2011-1485](https://github.com/Pashkela/CVE-2011-1485) ### CVE-2011-1571 - [noobpk/CVE-2011-1571](https://github.com/noobpk/CVE-2011-1571) ### CVE-2011-1575 - [masamoon/cve-2011-1575-poc](https://github.com/masamoon/cve-2011-1575-poc) ### CVE-2011-1720 - [nbeguier/postfix_exploit](https://github.com/nbeguier/postfix_exploit) ### CVE-2011-1974 - [hittlle/CVE-2011-1974-PoC](https://github.com/hittlle/CVE-2011-1974-PoC) ### CVE-2011-2461 - [ikkisoft/ParrotNG](https://github.com/ikkisoft/ParrotNG) - [u-maxx/magento-swf-patched-CVE-2011-2461](https://github.com/u-maxx/magento-swf-patched-CVE-2011-2461) - [edmondscommerce/CVE-2011-2461_Magento_Patch](https://github.com/edmondscommerce/CVE-2011-2461_Magento_Patch) ### CVE-2011-2894 - [pwntester/SpringBreaker](https://github.com/pwntester/SpringBreaker) ### CVE-2011-3026 - [argp/cve-2011-3026-firefox](https://github.com/argp/cve-2011-3026-firefox) ### CVE-2011-3192 - [tkisason/KillApachePy](https://github.com/tkisason/KillApachePy) - [limkokhole/CVE-2011-3192](https://github.com/limkokhole/CVE-2011-3192) ### CVE-2011-3368 - [SECFORCE/CVE-2011-3368](https://github.com/SECFORCE/CVE-2011-3368) - [colorblindpentester/CVE-2011-3368](https://github.com/colorblindpentester/CVE-2011-3368) ### CVE-2011-3389 - [mpgn/BEAST-PoC](https://github.com/mpgn/BEAST-PoC) ### CVE-2011-3556 - [sk4la/cve_2011_3556](https://github.com/sk4la/cve_2011_3556) ### CVE-2011-3872 - [puppetlabs/puppetlabs-cve20113872](https://github.com/puppetlabs/puppetlabs-cve20113872) ### CVE-2011-4107 - [SECFORCE/CVE-2011-4107](https://github.com/SECFORCE/CVE-2011-4107) ### CVE-2011-4862 - [hdbreaker/GO-CVE-2011-4862](https://github.com/hdbreaker/GO-CVE-2011-4862) - [lol-fi/cve-2011-4862](https://github.com/lol-fi/cve-2011-4862) - [kpawar2410/CVE-2011-4862](https://github.com/kpawar2410/CVE-2011-4862) ### CVE-2011-4872 - [Chiggins/CVE-2011-4872](https://github.com/Chiggins/CVE-2011-4872) ### CVE-2011-4905 - [Michael-Main/CVE-2011-4905](https://github.com/Michael-Main/CVE-2011-4905) ### CVE-2011-4919 - [hartwork/mpacktrafficripper](https://github.com/hartwork/mpacktrafficripper) ## 2012 ### CVE-2012-0003 - [k0keoyo/CVE-2012-0003_eXP](https://github.com/k0keoyo/CVE-2012-0003_eXP) ### CVE-2012-0056 - [srclib/CVE-2012-0056](https://github.com/srclib/CVE-2012-0056) - [pythonone/CVE-2012-0056](https://github.com/pythonone/CVE-2012-0056) ### CVE-2012-0152 - [rutvijjethwa/RDP_jammer](https://github.com/rutvijjethwa/RDP_jammer) ### CVE-2012-1675 - [bongbongco/CVE-2012-1675](https://github.com/bongbongco/CVE-2012-1675) ### CVE-2012-1723 - [EthanNJC/CVE-2012-1723](https://github.com/EthanNJC/CVE-2012-1723) ### CVE-2012-1823 - [drone789/CVE-2012-1823](https://github.com/drone789/CVE-2012-1823) - [gamamaru6005/oscp_scripts-1](https://github.com/gamamaru6005/oscp_scripts-1) - [noondi/metasploitable2](https://github.com/noondi/metasploitable2) ### CVE-2012-1876 - [WizardVan/CVE-2012-1876](https://github.com/WizardVan/CVE-2012-1876) ### CVE-2012-1889 - [whu-enjoy/CVE-2012-1889](https://github.com/whu-enjoy/CVE-2012-1889) - [l-iberty/cve-2012-1889](https://github.com/l-iberty/cve-2012-1889) ### CVE-2012-2122 - [Avinza/CVE-2012-2122-scanner](https://github.com/Avinza/CVE-2012-2122-scanner) ### CVE-2012-3137 - [hantwister/o5logon-fetch](https://github.com/hantwister/o5logon-fetch) - [r1-/cve-2012-3137](https://github.com/r1-/cve-2012-3137) ### CVE-2012-3153 - [Mekanismen/pwnacle-fusion](https://github.com/Mekanismen/pwnacle-fusion) ### CVE-2012-3716 - [d4rkcat/killosx](https://github.com/d4rkcat/killosx) ### CVE-2012-4220 - [hiikezoe/diaggetroot](https://github.com/hiikezoe/diaggetroot) - [poliva/root-zte-open](https://github.com/poliva/root-zte-open) ### CVE-2012-4431 - [Michael-Main/CVE-2012-4431](https://github.com/Michael-Main/CVE-2012-4431) ### CVE-2012-4681 - [benjholla/CVE-2012-4681-Armoring](https://github.com/benjholla/CVE-2012-4681-Armoring) - [ZH3FENG/PoCs-CVE_2012_4681](https://github.com/ZH3FENG/PoCs-CVE_2012_4681) ### CVE-2012-4792 - [WizardVan/CVE-2012-4792](https://github.com/WizardVan/CVE-2012-4792) ### CVE-2012-4929 - [mpgn/CRIME-poc](https://github.com/mpgn/CRIME-poc) ### CVE-2012-5106 - [war4uthor/CVE-2012-5106](https://github.com/war4uthor/CVE-2012-5106) ### CVE-2012-5575 - [tafamace/CVE-2012-5575](https://github.com/tafamace/CVE-2012-5575) ### CVE-2012-5613 - [Hood3dRob1n/MySQL-Fu.rb](https://github.com/Hood3dRob1n/MySQL-Fu.rb) - [w4fz5uck5/UDFPwn-CVE-2012-5613](https://github.com/w4fz5uck5/UDFPwn-CVE-2012-5613) ### CVE-2012-5664 - [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test) ### CVE-2012-5958 - [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp) ### CVE-2012-5960 - [finn79426/CVE-2012-5960-PoC](https://github.com/finn79426/CVE-2012-5960-PoC) ### CVE-2012-6066 - [bongbongco/CVE-2012-6066](https://github.com/bongbongco/CVE-2012-6066) ### CVE-2012-6636 - [xckevin/AndroidWebviewInjectDemo](https://github.com/xckevin/AndroidWebviewInjectDemo) ## 2013 ### CVE-2013-0156 - [terracatta/name_reverser](https://github.com/terracatta/name_reverser) - [heroku/heroku-CVE-2013-0156](https://github.com/heroku/heroku-CVE-2013-0156) - [josal/crack-0.1.8-fixed](https://github.com/josal/crack-0.1.8-fixed) - [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156) - [R3dKn33/CVE-2013-0156](https://github.com/R3dKn33/CVE-2013-0156) ### CVE-2013-0229 - [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp) ### CVE-2013-0269 - [heroku/heroku-CVE-2013-0269](https://github.com/heroku/heroku-CVE-2013-0269) ### CVE-2013-0333 - [heroku/heroku-CVE-2013-0333](https://github.com/heroku/heroku-CVE-2013-0333) ### CVE-2013-1081 - [steponequit/CVE-2013-1081](https://github.com/steponequit/CVE-2013-1081) ### CVE-2013-1300 - [Meatballs1/cve-2013-1300](https://github.com/Meatballs1/cve-2013-1300) ### CVE-2013-1488 - [v-p-b/buherablog-cve-2013-1488](https://github.com/v-p-b/buherablog-cve-2013-1488) ### CVE-2013-1491 - [guhe120/CVE20131491-JIT](https://github.com/guhe120/CVE20131491-JIT) ### CVE-2013-1690 - [vlad902/annotated-fbi-tbb-exploit](https://github.com/vlad902/annotated-fbi-tbb-exploit) ### CVE-2013-1775 - [bekhzod0725/perl-CVE-2013-1775](https://github.com/bekhzod0725/perl-CVE-2013-1775) ### CVE-2013-1965 - [cinno/CVE-2013-1965](https://github.com/cinno/CVE-2013-1965) ### CVE-2013-2028 - [danghvu/nginx-1.4.0](https://github.com/danghvu/nginx-1.4.0) - [kitctf/nginxpwn](https://github.com/kitctf/nginxpwn) - [tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC](https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC) ### CVE-2013-2072 - [bl4ck5un/cve-2013-2072](https://github.com/bl4ck5un/cve-2013-2072) ### CVE-2013-2094 - [realtalk/cve-2013-2094](https://github.com/realtalk/cve-2013-2094) - [hiikezoe/libperf_event_exploit](https://github.com/hiikezoe/libperf_event_exploit) - [Pashkela/CVE-2013-2094](https://github.com/Pashkela/CVE-2013-2094) - [tarunyadav/fix-cve-2013-2094](https://github.com/tarunyadav/fix-cve-2013-2094) - [timhsutw/cve-2013-2094](https://github.com/timhsutw/cve-2013-2094) - [vnik5287/CVE-2013-2094](https://github.com/vnik5287/CVE-2013-2094) ### CVE-2013-2186 - [GrrrDog/ACEDcup](https://github.com/GrrrDog/ACEDcup) - [SPlayer1248/Payload_CVE_2013_2186](https://github.com/SPlayer1248/Payload_CVE_2013_2186) - [SPlayer1248/CVE_2013_2186](https://github.com/SPlayer1248/CVE_2013_2186) ### CVE-2013-2217 - [Osirium/suds](https://github.com/Osirium/suds) ### CVE-2013-225 - [ninj4c0d3r/ShellEvil](https://github.com/ninj4c0d3r/ShellEvil) ### CVE-2013-2595 - [fi01/libmsm_cameraconfig_exploit](https://github.com/fi01/libmsm_cameraconfig_exploit) ### CVE-2013-2596 - [hiikezoe/libfb_mem_exploit](https://github.com/hiikezoe/libfb_mem_exploit) ### CVE-2013-2597 - [fi01/libmsm_acdb_exploit](https://github.com/fi01/libmsm_acdb_exploit) ### CVE-2013-2729 - [feliam/CVE-2013-2729](https://github.com/feliam/CVE-2013-2729) ### CVE-2013-2730 - [feliam/CVE-2013-2730](https://github.com/feliam/CVE-2013-2730) ### CVE-2013-2842 - [173210/spider](https://github.com/173210/spider) ### CVE-2013-2977 - [lagartojuancho/CVE-2013-2977](https://github.com/lagartojuancho/CVE-2013-2977) ### CVE-2013-3319 - [integrity-sa/cve-2013-3319](https://github.com/integrity-sa/cve-2013-3319) ### CVE-2013-3651 - [motikan2010/CVE-2013-3651](https://github.com/motikan2010/CVE-2013-3651) ### CVE-2013-3664 - [lagartojuancho/CVE-2013-3664_MAC](https://github.com/lagartojuancho/CVE-2013-3664_MAC) - [lagartojuancho/CVE-2013-3664_BMP](https://github.com/lagartojuancho/CVE-2013-3664_BMP) ### CVE-2013-4002 - [tafamace/CVE-2013-4002](https://github.com/tafamace/CVE-2013-4002) ### CVE-2013-4175 - [hartwork/mysecureshell-issues](https://github.com/hartwork/mysecureshell-issues) ### CVE-2013-4348 - [bl4ck5un/cve-2013-4348](https://github.com/bl4ck5un/cve-2013-4348) ### CVE-2013-4378 - [theratpack/grails-javamelody-sample-app](https://github.com/theratpack/grails-javamelody-sample-app) ### CVE-2013-4434 - [styx00/Dropbear_CVE-2013-4434](https://github.com/styx00/Dropbear_CVE-2013-4434) ### CVE-2013-4784 - [alexoslabs/ipmitest](https://github.com/alexoslabs/ipmitest) ### CVE-2013-5065 - [Friarfukd/RobbinHood](https://github.com/Friarfukd/RobbinHood) ### CVE-2013-5211 - [dani87/ntpscanner](https://github.com/dani87/ntpscanner) - [suedadam/ntpscanner](https://github.com/suedadam/ntpscanner) - [sepehrdaddev/ntpdos](https://github.com/sepehrdaddev/ntpdos) ### CVE-2013-5664 - [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test) ### CVE-2013-5842 - [guhe120/CVE-2013-5842](https://github.com/guhe120/CVE-2013-5842) ### CVE-2013-6117 - [milo2012/CVE-2013-6117](https://github.com/milo2012/CVE-2013-6117) ### CVE-2013-6282 - [fi01/libput_user_exploit](https://github.com/fi01/libput_user_exploit) - [fi01/libget_user_exploit](https://github.com/fi01/libget_user_exploit) - [jeboo/bypasslkm](https://github.com/jeboo/bypasslkm) - [timwr/CVE-2013-6282](https://github.com/timwr/CVE-2013-6282) ### CVE-2013-6375 - [bl4ck5un/cve-2013-6375](https://github.com/bl4ck5un/cve-2013-6375) ### CVE-2013-6668 - [sdneon/CveTest](https://github.com/sdneon/CveTest) ## 2014 ### CVE-2014-0038 - [saelo/cve-2014-0038](https://github.com/saelo/cve-2014-0038) ### CVE-2014-0050 - [jrrdev/cve-2014-0050](https://github.com/jrrdev/cve-2014-0050) ### CVE-2014-0094 - [HasegawaTadamitsu/CVE-2014-0094-test-program-for-struts1](https://github.com/HasegawaTadamitsu/CVE-2014-0094-test-program-for-struts1) ### CVE-2014-0114 - [rgielen/struts1filter](https://github.com/rgielen/struts1filter) - [ricedu/struts1-patch](https://github.com/ricedu/struts1-patch) - [anob3it/strutt-cve-2014-0114](https://github.com/anob3it/strutt-cve-2014-0114) ### CVE-2014-0130 - [omarkurt/cve-2014-0130](https://github.com/omarkurt/cve-2014-0130) ### CVE-2014-0160 - [FiloSottile/Heartbleed](https://github.com/FiloSottile/Heartbleed) - [titanous/heartbleeder](https://github.com/titanous/heartbleeder) - [DominikTo/bleed](https://github.com/DominikTo/bleed) - [cyphar/heartthreader](https://github.com/cyphar/heartthreader) - [jdauphant/patch-openssl-CVE-2014-0160](https://github.com/jdauphant/patch-openssl-CVE-2014-0160) - [musalbas/heartbleed-masstest](https://github.com/musalbas/heartbleed-masstest) - [obayesshelton/CVE-2014-0160-Scanner](https://github.com/obayesshelton/CVE-2014-0160-Scanner) - [Lekensteyn/pacemaker](https://github.com/Lekensteyn/pacemaker) - [isgroup-srl/openmagic](https://github.com/isgroup-srl/openmagic) - [fb1h2s/CVE-2014-0160](https://github.com/fb1h2s/CVE-2014-0160) - [roganartu/heartbleedchecker-chrome](https://github.com/roganartu/heartbleedchecker-chrome) - [zouguangxian/heartbleed](https://github.com/zouguangxian/heartbleed) - [sensepost/heartbleed-poc](https://github.com/sensepost/heartbleed-poc) - [proactiveRISK/heartbleed-extention](https://github.com/proactiveRISK/heartbleed-extention) - [amerine/coronary](https://github.com/amerine/coronary) - [0x90/CVE-2014-0160](https://github.com/0x90/CVE-2014-0160) - [ice-security88/CVE-2014-0160](https://github.com/ice-security88/CVE-2014-0160) - [waqasjamal-zz/HeartBleed-Vulnerability-Checker](https://github.com/waqasjamal-zz/HeartBleed-Vulnerability-Checker) - [siddolo/knockbleed](https://github.com/siddolo/knockbleed) - [sammyfung/openssl-heartbleed-fix](https://github.com/sammyfung/openssl-heartbleed-fix) - [a0726h77/heartbleed-test](https://github.com/a0726h77/heartbleed-test) - [hreese/heartbleed-dtls](https://github.com/hreese/heartbleed-dtls) - [wwwiretap/bleeding_onions](https://github.com/wwwiretap/bleeding_onions) - [idkqh7/heatbleeding](https://github.com/idkqh7/heatbleeding) - [GeeksXtreme/ssl-heartbleed.nse](https://github.com/GeeksXtreme/ssl-heartbleed.nse) - [xlucas/heartbleed](https://github.com/xlucas/heartbleed) - [indiw0rm/-Heartbleed-](https://github.com/indiw0rm/-Heartbleed-) - [einaros/heartbleed-tools](https://github.com/einaros/heartbleed-tools) - [mozilla-services/Heartbleed](https://github.com/mozilla-services/Heartbleed) - [yryz/heartbleed.js](https://github.com/yryz/heartbleed.js) - [DisK0nn3cT/MaltegoHeartbleed](https://github.com/DisK0nn3cT/MaltegoHeartbleed) - [OffensivePython/HeartLeak](https://github.com/OffensivePython/HeartLeak) - [vortextube/ssl_scanner](https://github.com/vortextube/ssl_scanner) - [mpgn/heartbleed-PoC](https://github.com/mpgn/heartbleed-PoC) - [xanas/heartbleed.py](https://github.com/xanas/heartbleed.py) - [iSCInc/heartbleed](https://github.com/iSCInc/heartbleed) - [marstornado/cve-2014-0160-Yunfeng-Jiang](https://github.com/marstornado/cve-2014-0160-Yunfeng-Jiang) - [hmlio/vaas-cve-2014-0160](https://github.com/hmlio/vaas-cve-2014-0160) - [hybridus/heartbleedscanner](https://github.com/hybridus/heartbleedscanner) - [Xyl2k/CVE-2014-0160-Chrome-Plugin](https://github.com/Xyl2k/CVE-2014-0160-Chrome-Plugin) - [kaosV20/Heartexploit](https://github.com/kaosV20/Heartexploit) - [caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC](https://github.com/caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC) - [Saymeis/HeartBleed](https://github.com/Saymeis/HeartBleed) - [cved-sources/cve-2014-0160](https://github.com/cved-sources/cve-2014-0160) - [cheese-hub/heartbleed](https://github.com/cheese-hub/heartbleed) - [artofscripting/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS](https://github.com/artofscripting/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS) - [cldme/heartbleed-bug](https://github.com/cldme/heartbleed-bug) - [hack3r-0m/heartbleed_fix_updated](https://github.com/hack3r-0m/heartbleed_fix_updated) ### CVE-2014-0166 - [Ettack/POC-CVE-2014-0166](https://github.com/Ettack/POC-CVE-2014-0166) ### CVE-2014-0195 - [ricedu/CVE-2014-0195](https://github.com/ricedu/CVE-2014-0195) ### CVE-2014-0196 - [SunRain/CVE-2014-0196](https://github.com/SunRain/CVE-2014-0196) - [tempbottle/CVE-2014-0196](https://github.com/tempbottle/CVE-2014-0196) ### CVE-2014-0224 - [Tripwire/OpenSSL-CCS-Inject-Test](https://github.com/Tripwire/OpenSSL-CCS-Inject-Test) - [iph0n3/CVE-2014-0224](https://github.com/iph0n3/CVE-2014-0224) - [droptables/ccs-eval](https://github.com/droptables/ccs-eval) - [ssllabs/openssl-ccs-cve-2014-0224](https://github.com/ssllabs/openssl-ccs-cve-2014-0224) - [secretnonempty/CVE-2014-0224](https://github.com/secretnonempty/CVE-2014-0224) ### CVE-2014-0291 - [niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204](https://github.com/niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204) ### CVE-2014-0521 - [molnarg/cve-2014-0521](https://github.com/molnarg/cve-2014-0521) ### CVE-2014-0816 - [tandasat/CVE-2014-0816](https://github.com/tandasat/CVE-2014-0816) ### CVE-2014-0993 - [helpsystems/Embarcadero-Workaround](https://github.com/helpsystems/Embarcadero-Workaround) ### CVE-2014-10069 - [Manouchehri/hitron-cfg-decrypter](https://github.com/Manouchehri/hitron-cfg-decrypter) ### CVE-2014-1266 - [landonf/Testability-CVE-2014-1266](https://github.com/landonf/Testability-CVE-2014-1266) - [linusyang/SSLPatch](https://github.com/linusyang/SSLPatch) - [gabrielg/CVE-2014-1266-poc](https://github.com/gabrielg/CVE-2014-1266-poc) ### CVE-2014-1303 - [RKX1209/CVE-2014-1303](https://github.com/RKX1209/CVE-2014-1303) ### CVE-2014-1322 - [raymondpittman/IPC-Memory-Mac-OSX-Exploit](https://github.com/raymondpittman/IPC-Memory-Mac-OSX-Exploit) ### CVE-2014-1447 - [tagatac/libvirt-CVE-2014-1447](https://github.com/tagatac/libvirt-CVE-2014-1447) ### CVE-2014-160 - [menrcom/CVE-2014-160](https://github.com/menrcom/CVE-2014-160) - [GitMirar/heartbleed_exploit](https://github.com/GitMirar/heartbleed_exploit) ### CVE-2014-1677 - [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit) ### CVE-2014-1773 - [day6reak/CVE-2014-1773](https://github.com/day6reak/CVE-2014-1773) ### CVE-2014-2064 - [Naramsim/Offensive](https://github.com/Naramsim/Offensive) ### CVE-2014-2323 - [cirocosta/lighty-sqlinj-demo](https://github.com/cirocosta/lighty-sqlinj-demo) ### CVE-2014-2324 - [sp4c30x1/uc_httpd_exploit](https://github.com/sp4c30x1/uc_httpd_exploit) ### CVE-2014-2630 - [redtimmy/perf-exploiter](https://github.com/redtimmy/perf-exploiter) ### CVE-2014-2734 - [gdisneyleugers/CVE-2014-2734](https://github.com/gdisneyleugers/CVE-2014-2734) - [adrienthebo/cve-2014-2734](https://github.com/adrienthebo/cve-2014-2734) ### CVE-2014-3120 - [jeffgeiger/es_inject](https://github.com/jeffgeiger/es_inject) - [echohtp/ElasticSearch-CVE-2014-3120](https://github.com/echohtp/ElasticSearch-CVE-2014-3120) ### CVE-2014-3153 - [timwr/CVE-2014-3153](https://github.com/timwr/CVE-2014-3153) - [android-rooting-tools/libfutex_exploit](https://github.com/android-rooting-tools/libfutex_exploit) - [geekben/towelroot](https://github.com/geekben/towelroot) - [lieanu/CVE-2014-3153](https://github.com/lieanu/CVE-2014-3153) - [zerodavinci/CVE-2014-3153-exploit](https://github.com/zerodavinci/CVE-2014-3153-exploit) - [c3c/CVE-2014-3153](https://github.com/c3c/CVE-2014-3153) - [dangtunguyen/TowelRoot](https://github.com/dangtunguyen/TowelRoot) ### CVE-2014-3341 - [ehabhussein/snmpvlan](https://github.com/ehabhussein/snmpvlan) ### CVE-2014-3466 - [azet/CVE-2014-3466_PoC](https://github.com/azet/CVE-2014-3466_PoC) ### CVE-2014-3566 - [mikesplain/CVE-2014-3566-poodle-cookbook](https://github.com/mikesplain/CVE-2014-3566-poodle-cookbook) - [stdevel/poodle_protector](https://github.com/stdevel/poodle_protector) - [ashmastaflash/mangy-beast](https://github.com/ashmastaflash/mangy-beast) - [mpgn/poodle-PoC](https://github.com/mpgn/poodle-PoC) ### CVE-2014-3625 - [ilmila/springcss-cve-2014-3625](https://github.com/ilmila/springcss-cve-2014-3625) - [gforresu/SpringPathTraversal](https://github.com/gforresu/SpringPathTraversal) ### CVE-2014-3704 - [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704) ### CVE-2014-4014 - [vnik5287/cve-2014-4014-privesc](https://github.com/vnik5287/cve-2014-4014-privesc) ### CVE-2014-4076 - [fungoshacks/CVE-2014-4076](https://github.com/fungoshacks/CVE-2014-4076) ### CVE-2014-4109 - [day6reak/CVE-2014-4109](https://github.com/day6reak/CVE-2014-4109) ### CVE-2014-4113 - [johnjohnsp1/CVE-2014-4113](https://github.com/johnjohnsp1/CVE-2014-4113) - [nsxz/Exploit-CVE-2014-4113](https://github.com/nsxz/Exploit-CVE-2014-4113) - [sam-b/CVE-2014-4113](https://github.com/sam-b/CVE-2014-4113) ### CVE-2014-4140 - [day6reak/CVE-2014-4140](https://github.com/day6reak/CVE-2014-4140) ### CVE-2014-4210 - [NoneNotNull/SSRFX](https://github.com/NoneNotNull/SSRFX) ### CVE-2014-4321 - [android-rooting-tools/libmsm_vfe_read_exploit](https://github.com/android-rooting-tools/libmsm_vfe_read_exploit) ### CVE-2014-4322 - [retme7/CVE-2014-4322_poc](https://github.com/retme7/CVE-2014-4322_poc) - [laginimaineb/cve-2014-4322](https://github.com/laginimaineb/cve-2014-4322) - [askk/CVE-2014-4322_adaptation](https://github.com/askk/CVE-2014-4322_adaptation) - [koozxcv/CVE-2014-4322](https://github.com/koozxcv/CVE-2014-4322) ### CVE-2014-4323 - [marcograss/cve-2014-4323](https://github.com/marcograss/cve-2014-4323) ### CVE-2014-4377 - [feliam/CVE-2014-4377](https://github.com/feliam/CVE-2014-4377) - [davidmurray/CVE-2014-4377](https://github.com/davidmurray/CVE-2014-4377) ### CVE-2014-4378 - [feliam/CVE-2014-4378](https://github.com/feliam/CVE-2014-4378) ### CVE-2014-4481 - [feliam/CVE-2014-4481](https://github.com/feliam/CVE-2014-4481) ### CVE-2014-4511 - [michaelsss1/gitlist-RCE](https://github.com/michaelsss1/gitlist-RCE) ### CVE-2014-4671 - [cph/rabl-old](https://github.com/cph/rabl-old) ### CVE-2014-4699 - [vnik5287/cve-2014-4699-ptrace](https://github.com/vnik5287/cve-2014-4699-ptrace) ### CVE-2014-4936 - [0x3a/CVE-2014-4936](https://github.com/0x3a/CVE-2014-4936) ### CVE-2014-4943 - [redes-2015/l2tp-socket-bug](https://github.com/redes-2015/l2tp-socket-bug) ### CVE-2014-5284 - [mbadanoiu/CVE-2014-5284](https://github.com/mbadanoiu/CVE-2014-5284) ### CVE-2014-6271 - [dlitz/bash-cve-2014-6271-fixes](https://github.com/dlitz/bash-cve-2014-6271-fixes) - [npm/ansible-bashpocalypse](https://github.com/npm/ansible-bashpocalypse) - [ryancnelson/patched-bash-4.3](https://github.com/ryancnelson/patched-bash-4.3) - [jblaine/cookbook-bash-CVE-2014-6271](https://github.com/jblaine/cookbook-bash-CVE-2014-6271) - [rrreeeyyy/cve-2014-6271-spec](https://github.com/rrreeeyyy/cve-2014-6271-spec) - [scottjpack/shellshock_scanner](https://github.com/scottjpack/shellshock_scanner) - [Anklebiter87/Cgi-bin_bash_Reverse](https://github.com/Anklebiter87/Cgi-bin_bash_Reverse) - [justzx2011/bash-up](https://github.com/justzx2011/bash-up) - [mattclegg/CVE-2014-6271](https://github.com/mattclegg/CVE-2014-6271) - [ilismal/Nessus_CVE-2014-6271_check](https://github.com/ilismal/Nessus_CVE-2014-6271_check) - [RainMak3r/Rainstorm](https://github.com/RainMak3r/Rainstorm) - [gabemarshall/shocknaww](https://github.com/gabemarshall/shocknaww) - [woltage/CVE-2014-6271](https://github.com/woltage/CVE-2014-6271) - [ariarijp/vagrant-shellshock](https://github.com/ariarijp/vagrant-shellshock) - [themson/shellshock](https://github.com/themson/shellshock) - [securusglobal/BadBash](https://github.com/securusglobal/BadBash) - [villadora/CVE-2014-6271](https://github.com/villadora/CVE-2014-6271) - [APSL/salt-shellshock](https://github.com/APSL/salt-shellshock) - [teedeedubya/bash-fix-exploit](https://github.com/teedeedubya/bash-fix-exploit) - [internero/debian-lenny-bash_3.2.52-cve-2014-6271](https://github.com/internero/debian-lenny-bash_3.2.52-cve-2014-6271) - [pwnGuy/shellshock-shell](https://github.com/pwnGuy/shellshock-shell) - [vonnyfly/shellshock_crawler](https://github.com/vonnyfly/shellshock_crawler) - [u20024804/bash-3.2-fixed-CVE-2014-6271](https://github.com/u20024804/bash-3.2-fixed-CVE-2014-6271) - [u20024804/bash-4.2-fixed-CVE-2014-6271](https://github.com/u20024804/bash-4.2-fixed-CVE-2014-6271) - [u20024804/bash-4.3-fixed-CVE-2014-6271](https://github.com/u20024804/bash-4.3-fixed-CVE-2014-6271) - [francisck/shellshock-cgi](https://github.com/francisck/shellshock-cgi) - [proclnas/ShellShock-CGI-Scan](https://github.com/proclnas/ShellShock-CGI-Scan) - [sch3m4/RIS](https://github.com/sch3m4/RIS) - [ryeyao/CVE-2014-6271_Test](https://github.com/ryeyao/CVE-2014-6271_Test) - [cj1324/CGIShell](https://github.com/cj1324/CGIShell) - [renanvicente/puppet-shellshock](https://github.com/renanvicente/puppet-shellshock) - [indiandragon/Shellshock-Vulnerability-Scan](https://github.com/indiandragon/Shellshock-Vulnerability-Scan) - [ramnes/pyshellshock](https://github.com/ramnes/pyshellshock) - [akiraaisha/shellshocker-python](https://github.com/akiraaisha/shellshocker-python) - [kelleykong/cve-2014-6271-mengjia-kong](https://github.com/kelleykong/cve-2014-6271-mengjia-kong) - [huanlu/cve-2014-6271-huan-lu](https://github.com/huanlu/cve-2014-6271-huan-lu) - [sunnyjiang/shellshocker-android](https://github.com/sunnyjiang/shellshocker-android) - [P0cL4bs/ShellShock-CGI-Scan](https://github.com/P0cL4bs/ShellShock-CGI-Scan) - [hmlio/vaas-cve-2014-6271](https://github.com/hmlio/vaas-cve-2014-6271) - [opsxcq/exploit-CVE-2014-6271](https://github.com/opsxcq/exploit-CVE-2014-6271) - [Pilou-Pilou/docker_CVE-2014-6271.](https://github.com/Pilou-Pilou/docker_CVE-2014-6271.) - [zalalov/CVE-2014-6271](https://github.com/zalalov/CVE-2014-6271) - [0x00-0x00/CVE-2014-6271](https://github.com/0x00-0x00/CVE-2014-6271) - [kowshik-sundararajan/CVE-2014-6271](https://github.com/kowshik-sundararajan/CVE-2014-6271) - [w4fz5uck5/ShockZaum-CVE-2014-6271](https://github.com/w4fz5uck5/ShockZaum-CVE-2014-6271) - [Aruthw/CVE-2014-6271](https://github.com/Aruthw/CVE-2014-6271) - [cved-sources/cve-2014-6271](https://github.com/cved-sources/cve-2014-6271) - [shawntns/exploit-CVE-2014-6271](https://github.com/shawntns/exploit-CVE-2014-6271) - [Sindadziy/cve-2014-6271](https://github.com/Sindadziy/cve-2014-6271) - [wenyu1999/bash-shellshock](https://github.com/wenyu1999/bash-shellshock) - [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271) - [Any3ite/CVE-2014-6271](https://github.com/Any3ite/CVE-2014-6271) - [somhm-solutions/Shell-Shock](https://github.com/somhm-solutions/Shell-Shock) ### CVE-2014-6287 - [roughiz/cve-2014-6287.py](https://github.com/roughiz/cve-2014-6287.py) ### CVE-2014-6332 - [MarkoArmitage/metasploit-framework](https://github.com/MarkoArmitage/metasploit-framework) - [tjjh89017/cve-2014-6332](https://github.com/tjjh89017/cve-2014-6332) - [mourr/CVE-2014-6332](https://github.com/mourr/CVE-2014-6332) ### CVE-2014-6577 - [SecurityArtWork/oracle-xxe-sqli](https://github.com/SecurityArtWork/oracle-xxe-sqli) ### CVE-2014-6598 - [KPN-CISO/DRA_writeup](https://github.com/KPN-CISO/DRA_writeup) ### CVE-2014-7169 - [chef-boneyard/bash-shellshock](https://github.com/chef-boneyard/bash-shellshock) - [gina-alaska/bash-cve-2014-7169-cookbook](https://github.com/gina-alaska/bash-cve-2014-7169-cookbook) ### CVE-2014-7236 - [m0nad/CVE-2014-7236_Exploit](https://github.com/m0nad/CVE-2014-7236_Exploit) ### CVE-2014-7911 - [retme7/CVE-2014-7911_poc](https://github.com/retme7/CVE-2014-7911_poc) - [ele7enxxh/CVE-2014-7911](https://github.com/ele7enxxh/CVE-2014-7911) - [heeeeen/CVE-2014-7911poc](https://github.com/heeeeen/CVE-2014-7911poc) - [GeneBlue/cve-2014-7911-exp](https://github.com/GeneBlue/cve-2014-7911-exp) - [koozxcv/CVE-2014-7911](https://github.com/koozxcv/CVE-2014-7911) - [koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilege](https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilege) - [mabin004/cve-2014-7911](https://github.com/mabin004/cve-2014-7911) - [CytQ/CVE-2014-7911_poc](https://github.com/CytQ/CVE-2014-7911_poc) ### CVE-2014-7920 - [laginimaineb/cve-2014-7920-7921](https://github.com/laginimaineb/cve-2014-7920-7921) - [Vinc3nt4H/cve-2014-7920-7921_update](https://github.com/Vinc3nt4H/cve-2014-7920-7921_update) ### CVE-2014-8110 - [tafamace/CVE-2014-8110](https://github.com/tafamace/CVE-2014-8110) ### CVE-2014-8142 - [3xp10it/php_cve-2014-8142_cve-2015-0231](https://github.com/3xp10it/php_cve-2014-8142_cve-2015-0231) ### CVE-2014-8244 - [JollyJumbuckk/LinksysLeaks](https://github.com/JollyJumbuckk/LinksysLeaks) ### CVE-2014-8609 - [locisvv/Vulnerable-CVE-2014-8609](https://github.com/locisvv/Vulnerable-CVE-2014-8609) ### CVE-2014-8682 - [nihal1306/gogs](https://github.com/nihal1306/gogs) ### CVE-2014-8729 - [inso-/TORQUE-Resource-Manager-2.5.x-2.5.13-stack-based-buffer-overflow-exploit-CVE-2014-8729-CVE-2014-878](https://github.com/inso-/TORQUE-Resource-Manager-2.5.x-2.5.13-stack-based-buffer-overflow-exploit-CVE-2014-8729-CVE-2014-878) ### CVE-2014-8757 - [irsl/lgosp-poc](https://github.com/irsl/lgosp-poc) ### CVE-2014-9016 - [c0r3dump3d/wp_drupal_timing_attack](https://github.com/c0r3dump3d/wp_drupal_timing_attack) - [Primus27/WordPress-Long-Password-Denial-of-Service](https://github.com/Primus27/WordPress-Long-Password-Denial-of-Service) ### CVE-2014-9222 - [BenChaliah/MIPS-CVE-2014-9222](https://github.com/BenChaliah/MIPS-CVE-2014-9222) ### CVE-2014-9295 - [MacMiniVault/NTPUpdateSnowLeopard](https://github.com/MacMiniVault/NTPUpdateSnowLeopard) ### CVE-2014-9301 - [ottimo/burp-alfresco-referer-proxy-cve-2014-9301](https://github.com/ottimo/burp-alfresco-referer-proxy-cve-2014-9301) ### CVE-2014-9322 - [RKX1209/CVE-2014-9322](https://github.com/RKX1209/CVE-2014-9322) ### CVE-2014-9390 - [mmetince/CVE-2014-9390](https://github.com/mmetince/CVE-2014-9390) - [hakatashi/CVE-2014-9390](https://github.com/hakatashi/CVE-2014-9390) ### CVE-2014-9707 - [ench4nt3r/cve-2014-9707](https://github.com/ench4nt3r/cve-2014-9707) ## 2015 ### CVE-2015-0006 - [bugch3ck/imposter](https://github.com/bugch3ck/imposter) ### CVE-2015-0057 - [55-AA/CVE-2015-0057](https://github.com/55-AA/CVE-2015-0057) ### CVE-2015-0072 - [dbellavista/uxss-poc](https://github.com/dbellavista/uxss-poc) ### CVE-2015-0204 - [felmoltor/FreakVulnChecker](https://github.com/felmoltor/FreakVulnChecker) - [scottjpack/Freak-Scanner](https://github.com/scottjpack/Freak-Scanner) - [AbhishekGhosh/FREAK-Attack-CVE-2015-0204-Testing-Script](https://github.com/AbhishekGhosh/FREAK-Attack-CVE-2015-0204-Testing-Script) - [niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204](https://github.com/niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204) ### CVE-2015-0231 - [3xp10it/php_cve-2014-8142_cve-2015-0231](https://github.com/3xp10it/php_cve-2014-8142_cve-2015-0231) ### CVE-2015-0235 - [fser/ghost-checker](https://github.com/fser/ghost-checker) - [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook) - [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test) - [piyokango/ghost](https://github.com/piyokango/ghost) - [LyricalSecurity/GHOSTCHECK-cve-2015-0235](https://github.com/LyricalSecurity/GHOSTCHECK-cve-2015-0235) - [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST) - [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST) - [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6) - [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235) - [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc) - [F88/ghostbusters15](https://github.com/F88/ghostbusters15) - [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester) - [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235) - [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround) - [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit) - [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc) - [r0otshell/CVE-2015-0235](https://github.com/r0otshell/CVE-2015-0235) ### CVE-2015-0313 - [SecurityObscurity/cve-2015-0313](https://github.com/SecurityObscurity/cve-2015-0313) ### CVE-2015-0345 - [BishopFox/coldfusion-10-11-xss](https://github.com/BishopFox/coldfusion-10-11-xss) ### CVE-2015-0568 - [betalphafai/CVE-2015-0568](https://github.com/betalphafai/CVE-2015-0568) ### CVE-2015-0816 - [Afudadi/Firefox-35-37-Exploit](https://github.com/Afudadi/Firefox-35-37-Exploit) ### CVE-2015-1130 - [Shmoopi/RootPipe-Demo](https://github.com/Shmoopi/RootPipe-Demo) - [sideeffect42/RootPipeTester](https://github.com/sideeffect42/RootPipeTester) ### CVE-2015-1140 - [kpwn/vpwn](https://github.com/kpwn/vpwn) ### CVE-2015-1157 - [perillamint/CVE-2015-1157](https://github.com/perillamint/CVE-2015-1157) ### CVE-2015-1318 - [ScottyBauer/CVE-2015-1318](https://github.com/ScottyBauer/CVE-2015-1318) ### CVE-2015-1427 - [t0kx/exploit-CVE-2015-1427](https://github.com/t0kx/exploit-CVE-2015-1427) - [cved-sources/cve-2015-1427](https://github.com/cved-sources/cve-2015-1427) ### CVE-2015-1474 - [p1gl3t/CVE-2015-1474_poc](https://github.com/p1gl3t/CVE-2015-1474_poc) ### CVE-2015-1528 - [secmob/PoCForCVE-2015-1528](https://github.com/secmob/PoCForCVE-2015-1528) - [kanpol/PoCForCVE-2015-1528](https://github.com/kanpol/PoCForCVE-2015-1528) ### CVE-2015-1538 - [oguzhantopgul/cve-2015-1538-1](https://github.com/oguzhantopgul/cve-2015-1538-1) - [renjithsasidharan/cve-2015-1538-1](https://github.com/renjithsasidharan/cve-2015-1538-1) - [jduck/cve-2015-1538-1](https://github.com/jduck/cve-2015-1538-1) - [marZiiw/Stagefright_CVE-2015-1538-1](https://github.com/marZiiw/Stagefright_CVE-2015-1538-1) - [niranjanshr13/Stagefright-cve-2015-1538-1](https://github.com/niranjanshr13/Stagefright-cve-2015-1538-1) ### CVE-2015-1560 - [Iansus/Centreon-CVE-2015-1560_1561](https://github.com/Iansus/Centreon-CVE-2015-1560_1561) ### CVE-2015-1579 - [APT55/WordPressMassExploiter](https://github.com/APT55/WordPressMassExploiter) - [APT55/CVE-2015-1579](https://github.com/APT55/CVE-2015-1579) ### CVE-2015-1592 - [lightsey/cve-2015-1592](https://github.com/lightsey/cve-2015-1592) ### CVE-2015-1635 - [xPaw/HTTPsys](https://github.com/xPaw/HTTPsys) - [Zx7ffa4512-Python/Project-CVE-2015-1635](https://github.com/Zx7ffa4512-Python/Project-CVE-2015-1635) - [technion/erlvulnscan](https://github.com/technion/erlvulnscan) - [wiredaem0n/chk-ms15-034](https://github.com/wiredaem0n/chk-ms15-034) - [1337r00t/Remove-IIS-RIIS](https://github.com/1337r00t/Remove-IIS-RIIS) - [bongbongco/MS15-034](https://github.com/bongbongco/MS15-034) - [aedoo/CVE-2015-1635-POC](https://github.com/aedoo/CVE-2015-1635-POC) - [limkokhole/CVE-2015-1635](https://github.com/limkokhole/CVE-2015-1635) ### CVE-2015-1641 - [Cyberclues/rtf_exploit_extractor](https://github.com/Cyberclues/rtf_exploit_extractor) ### CVE-2015-1701 - [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701) ### CVE-2015-1805 - [panyu6325/CVE-2015-1805](https://github.com/panyu6325/CVE-2015-1805) - [dosomder/iovyroot](https://github.com/dosomder/iovyroot) - [FloatingGuy/cve-2015-1805](https://github.com/FloatingGuy/cve-2015-1805) - [mobilelinux/iovy_root_research](https://github.com/mobilelinux/iovy_root_research) ### CVE-2015-1855 - [vpereira/CVE-2015-1855](https://github.com/vpereira/CVE-2015-1855) ### CVE-2015-2080 - [BizarreNULL/CVE-2015-2080](https://github.com/BizarreNULL/CVE-2015-2080) ### CVE-2015-2153 - [arntsonl/CVE-2015-2153](https://github.com/arntsonl/CVE-2015-2153) ### CVE-2015-2208 - [ptantiku/cve-2015-2208](https://github.com/ptantiku/cve-2015-2208) ### CVE-2015-2231 - [rednaga/adups-get-super-serial](https://github.com/rednaga/adups-get-super-serial) ### CVE-2015-2315 - [weidongl74/cve-2015-2315-report](https://github.com/weidongl74/cve-2015-2315-report) ### CVE-2015-2546 - [k0keoyo/CVE-2015-2546-Exploit](https://github.com/k0keoyo/CVE-2015-2546-Exploit) ### CVE-2015-2794 - [styx00/DNN_CVE-2015-2794](https://github.com/styx00/DNN_CVE-2015-2794) - [wilsc0w/CVE-2015-2794-finder](https://github.com/wilsc0w/CVE-2015-2794-finder) ### CVE-2015-2900 - [securifera/CVE-2015-2900-Exploit](https://github.com/securifera/CVE-2015-2900-Exploit) ### CVE-2015-2925 - [Kagami/docker_cve-2015-2925](https://github.com/Kagami/docker_cve-2015-2925) ### CVE-2015-3043 - [whitehairman/Exploit](https://github.com/whitehairman/Exploit) ### CVE-2015-3073 - [reigningshells/CVE-2015-3073](https://github.com/reigningshells/CVE-2015-3073) ### CVE-2015-3152 - [duo-labs/mysslstrip](https://github.com/duo-labs/mysslstrip) ### CVE-2015-3224 - [0x00-0x00/CVE-2015-3224](https://github.com/0x00-0x00/CVE-2015-3224) - [0xEval/cve-2015-3224](https://github.com/0xEval/cve-2015-3224) ### CVE-2015-3306 - [chcx/cpx_proftpd](https://github.com/chcx/cpx_proftpd) - [nootropics/propane](https://github.com/nootropics/propane) - [t0kx/exploit-CVE-2015-3306](https://github.com/t0kx/exploit-CVE-2015-3306) - [davidtavarez/CVE-2015-3306](https://github.com/davidtavarez/CVE-2015-3306) - [cved-sources/cve-2015-3306](https://github.com/cved-sources/cve-2015-3306) ### CVE-2015-3337 - [jas502n/CVE-2015-3337](https://github.com/jas502n/CVE-2015-3337) ### CVE-2015-3456 - [vincentbernat/cve-2015-3456](https://github.com/vincentbernat/cve-2015-3456) - [MauroEldritch/venom](https://github.com/MauroEldritch/venom) ### CVE-2015-3636 - [betalphafai/cve-2015-3636_crash](https://github.com/betalphafai/cve-2015-3636_crash) - [askk/libping_unhash_exploit_POC](https://github.com/askk/libping_unhash_exploit_POC) - [ludongxu/cve-2015-3636](https://github.com/ludongxu/cve-2015-3636) - [fi01/CVE-2015-3636](https://github.com/fi01/CVE-2015-3636) - [android-rooting-tools/libpingpong_exploit](https://github.com/android-rooting-tools/libpingpong_exploit) - [debugfan/rattle_root](https://github.com/debugfan/rattle_root) - [a7vinx/CVE-2015-3636](https://github.com/a7vinx/CVE-2015-3636) ### CVE-2015-3825 - [roeeh/conscryptchecker](https://github.com/roeeh/conscryptchecker) ### CVE-2015-3837 - [itibs/IsildursBane](https://github.com/itibs/IsildursBane) ### CVE-2015-3839 - [mabin004/cve-2015-3839_PoC](https://github.com/mabin004/cve-2015-3839_PoC) ### CVE-2015-3864 - [pwnaccelerator/stagefright-cve-2015-3864](https://github.com/pwnaccelerator/stagefright-cve-2015-3864) - [eudemonics/scaredycat](https://github.com/eudemonics/scaredycat) - [HenryVHuang/CVE-2015-3864](https://github.com/HenryVHuang/CVE-2015-3864) ### CVE-2015-4495 - [vincd/CVE-2015-4495](https://github.com/vincd/CVE-2015-4495) ### CVE-2015-4852 - [roo7break/serialator](https://github.com/roo7break/serialator) - [AndersonSingh/serialization-vulnerability-scanner](https://github.com/AndersonSingh/serialization-vulnerability-scanner) ### CVE-2015-4870 - [OsandaMalith/CVE-2015-4870](https://github.com/OsandaMalith/CVE-2015-4870) ### CVE-2015-5119 - [jvazquez-r7/CVE-2015-5119](https://github.com/jvazquez-r7/CVE-2015-5119) - [portcullislabs/CVE-2015-5119_walkthrough](https://github.com/portcullislabs/CVE-2015-5119_walkthrough) - [dangokyo/CVE-2015-5119](https://github.com/dangokyo/CVE-2015-5119) ### CVE-2015-5195 - [theglife214/CVE-2015-5195](https://github.com/theglife214/CVE-2015-5195) ### CVE-2015-5254 - [jas502n/CVE-2015-5254](https://github.com/jas502n/CVE-2015-5254) ### CVE-2015-5290 - [skyhighwings/CVE-2015-5290](https://github.com/skyhighwings/CVE-2015-5290) ### CVE-2015-5374 - [can/CVE-2015-5374-DoS-PoC](https://github.com/can/CVE-2015-5374-DoS-PoC) ### CVE-2015-5454 - [security-breachlock/CVE-2015-5454](https://github.com/security-breachlock/CVE-2015-5454) ### CVE-2015-5477 - [robertdavidgraham/cve-2015-5477](https://github.com/robertdavidgraham/cve-2015-5477) - [elceef/tkeypoc](https://github.com/elceef/tkeypoc) - [hmlio/vaas-cve-2015-5477](https://github.com/hmlio/vaas-cve-2015-5477) - [knqyf263/cve-2015-5477](https://github.com/knqyf263/cve-2015-5477) - [ilanyu/cve-2015-5477](https://github.com/ilanyu/cve-2015-5477) - [denmilu/ShareDoc_cve-2015-5477](https://github.com/denmilu/ShareDoc_cve-2015-5477) ### CVE-2015-5602 - [t0kx/privesc-CVE-2015-5602](https://github.com/t0kx/privesc-CVE-2015-5602) - [cved-sources/cve-2015-5602](https://github.com/cved-sources/cve-2015-5602) ### CVE-2015-5932 - [jndok/tpwn-bis](https://github.com/jndok/tpwn-bis) ### CVE-2015-5995 - [shaheemirza/TendaSpill](https://github.com/shaheemirza/TendaSpill) ### CVE-2015-6086 - [payatu/CVE-2015-6086](https://github.com/payatu/CVE-2015-6086) ### CVE-2015-6095 - [JackOfMostTrades/bluebox](https://github.com/JackOfMostTrades/bluebox) ### CVE-2015-6132 - [hexx0r/CVE-2015-6132](https://github.com/hexx0r/CVE-2015-6132) ### CVE-2015-6357 - [mattimustang/firepwner](https://github.com/mattimustang/firepwner) ### CVE-2015-6576 - [CallMeJonas/CVE-2015-6576](https://github.com/CallMeJonas/CVE-2015-6576) ### CVE-2015-6606 - [michaelroland/omapi-cve-2015-6606-exploit](https://github.com/michaelroland/omapi-cve-2015-6606-exploit) ### CVE-2015-6612 - [secmob/CVE-2015-6612](https://github.com/secmob/CVE-2015-6612) - [flankerhqd/cve-2015-6612poc-forM](https://github.com/flankerhqd/cve-2015-6612poc-forM) ### CVE-2015-6620 - [flankerhqd/CVE-2015-6620-POC](https://github.com/flankerhqd/CVE-2015-6620-POC) - [flankerhqd/mediacodecoob](https://github.com/flankerhqd/mediacodecoob) ### CVE-2015-6637 - [betalphafai/CVE-2015-6637](https://github.com/betalphafai/CVE-2015-6637) ### CVE-2015-6639 - [laginimaineb/cve-2015-6639](https://github.com/laginimaineb/cve-2015-6639) - [laginimaineb/ExtractKeyMaster](https://github.com/laginimaineb/ExtractKeyMaster) ### CVE-2015-6640 - [betalphafai/CVE-2015-6640](https://github.com/betalphafai/CVE-2015-6640) ### CVE-2015-6835 - [ockeghem/CVE-2015-6835-checker](https://github.com/ockeghem/CVE-2015-6835-checker) ### CVE-2015-6967 - [VanTekken/CVE-2015-6967](https://github.com/VanTekken/CVE-2015-6967) ### CVE-2015-7214 - [llamakko/CVE-2015-7214](https://github.com/llamakko/CVE-2015-7214) ### CVE-2015-7297 - [CCrashBandicot/ContentHistory](https://github.com/CCrashBandicot/ContentHistory) ### CVE-2015-7545 - [avuserow/bug-free-chainsaw](https://github.com/avuserow/bug-free-chainsaw) ### CVE-2015-7547 - [fjserna/CVE-2015-7547](https://github.com/fjserna/CVE-2015-7547) - [cakuzo/CVE-2015-7547](https://github.com/cakuzo/CVE-2015-7547) - [t0r0t0r0/CVE-2015-7547](https://github.com/t0r0t0r0/CVE-2015-7547) - [JustDenisYT/glibc-patcher](https://github.com/JustDenisYT/glibc-patcher) - [rexifiles/rex-sec-glibc](https://github.com/rexifiles/rex-sec-glibc) - [babykillerblack/CVE-2015-7547](https://github.com/babykillerblack/CVE-2015-7547) - [jgajek/cve-2015-7547](https://github.com/jgajek/cve-2015-7547) - [eSentire/cve-2015-7547-public](https://github.com/eSentire/cve-2015-7547-public) - [bluebluelan/CVE-2015-7547-proj-master](https://github.com/bluebluelan/CVE-2015-7547-proj-master) - [miracle03/CVE-2015-7547-master](https://github.com/miracle03/CVE-2015-7547-master) - [Stick-U235/glibc-exploit---CVE-2015-7547](https://github.com/Stick-U235/glibc-exploit---CVE-2015-7547) ### CVE-2015-7755 - [hdm/juniper-cve-2015-7755](https://github.com/hdm/juniper-cve-2015-7755) - [cinno/CVE-2015-7755-POC](https://github.com/cinno/CVE-2015-7755-POC) ### CVE-2015-7808 - [Prajithp/CVE-2015-7808](https://github.com/Prajithp/CVE-2015-7808) ### CVE-2015-8088 - [Pray3r/CVE-2015-8088](https://github.com/Pray3r/CVE-2015-8088) ### CVE-2015-8103 - [cved-sources/cve-2015-8103](https://github.com/cved-sources/cve-2015-8103) ### CVE-2015-8277 - [securifera/CVE-2015-8277-Exploit](https://github.com/securifera/CVE-2015-8277-Exploit) ### CVE-2015-8299 - [kernoelpanic/CVE-2015-8299](https://github.com/kernoelpanic/CVE-2015-8299) ### CVE-2015-8543 - [bittorrent3389/CVE-2015-8543_for_SLE12SP1](https://github.com/bittorrent3389/CVE-2015-8543_for_SLE12SP1) ### CVE-2015-8562 - [ZaleHack/joomla_rce_CVE-2015-8562](https://github.com/ZaleHack/joomla_rce_CVE-2015-8562) - [RobinHoutevelts/Joomla-CVE-2015-8562-PHP-POC](https://github.com/RobinHoutevelts/Joomla-CVE-2015-8562-PHP-POC) - [atcasanova/cve-2015-8562-exploit](https://github.com/atcasanova/cve-2015-8562-exploit) - [thejackerz/scanner-exploit-joomla-CVE-2015-8562](https://github.com/thejackerz/scanner-exploit-joomla-CVE-2015-8562) - [APT55/CVE-2015-8562](https://github.com/APT55/CVE-2015-8562) - [VoidSec/Joomla_CVE-2015-8562](https://github.com/VoidSec/Joomla_CVE-2015-8562) - [xnorkl/Joomla_Payload](https://github.com/xnorkl/Joomla_Payload) ### CVE-2015-8651 - [Gitlabpro/The-analysis-of-the-cve-2015-8651](https://github.com/Gitlabpro/The-analysis-of-the-cve-2015-8651) ### CVE-2015-8660 - [whu-enjoy/CVE-2015-8660](https://github.com/whu-enjoy/CVE-2015-8660) ### CVE-2015-8710 - [Karm/CVE-2015-8710](https://github.com/Karm/CVE-2015-8710) ### CVE-2015-9251 - [halkichi0308/CVE-2015-9251](https://github.com/halkichi0308/CVE-2015-9251) ## 2016 ### CVE-2016-0034 - [DiamondHunters/CVE-2016-0034-Decompile](https://github.com/DiamondHunters/CVE-2016-0034-Decompile) ### CVE-2016-0040 - [Rootkitsmm/cve-2016-0040](https://github.com/Rootkitsmm/cve-2016-0040) - [de7ec7ed/CVE-2016-0040](https://github.com/de7ec7ed/CVE-2016-0040) ### CVE-2016-0049 - [JackOfMostTrades/bluebox](https://github.com/JackOfMostTrades/bluebox) ### CVE-2016-0051 - [koczkatamas/CVE-2016-0051](https://github.com/koczkatamas/CVE-2016-0051) - [hexx0r/CVE-2016-0051](https://github.com/hexx0r/CVE-2016-0051) - [ganrann/CVE-2016-0051](https://github.com/ganrann/CVE-2016-0051) ### CVE-2016-0095 - [4M4Z4/cve-2016-0095-x64](https://github.com/4M4Z4/cve-2016-0095-x64) ### CVE-2016-0099 - [zcgonvh/MS16-032](https://github.com/zcgonvh/MS16-032) ### CVE-2016-010033 - [zi0Black/CVE-2016-010033-010045](https://github.com/zi0Black/CVE-2016-010033-010045) ### CVE-2016-0189 - [theori-io/cve-2016-0189](https://github.com/theori-io/cve-2016-0189) - [deamwork/MS16-051-poc](https://github.com/deamwork/MS16-051-poc) ### CVE-2016-0199 - [LeoonZHANG/CVE-2016-0199](https://github.com/LeoonZHANG/CVE-2016-0199) ### CVE-2016-0701 - [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701) ### CVE-2016-0728 - [idl3r/cve-2016-0728](https://github.com/idl3r/cve-2016-0728) - [kennetham/cve_2016_0728](https://github.com/kennetham/cve_2016_0728) - [nardholio/cve-2016-0728](https://github.com/nardholio/cve-2016-0728) - [googleweb/CVE-2016-0728](https://github.com/googleweb/CVE-2016-0728) - [MagicPwn/CVE-2016-0728-Check](https://github.com/MagicPwn/CVE-2016-0728-Check) - [neuschaefer/cve-2016-0728-testbed](https://github.com/neuschaefer/cve-2016-0728-testbed) - [bittorrent3389/cve-2016-0728](https://github.com/bittorrent3389/cve-2016-0728) - [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728) - [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728) - [sugarvillela/CVE](https://github.com/sugarvillela/CVE) ### CVE-2016-0752 - [forced-request/rails-rce-cve-2016-0752](https://github.com/forced-request/rails-rce-cve-2016-0752) - [dachidahu/CVE-2016-0752](https://github.com/dachidahu/CVE-2016-0752) ### CVE-2016-0792 - [jpiechowka/jenkins-cve-2016-0792](https://github.com/jpiechowka/jenkins-cve-2016-0792) - [s0wr0b1ndef/java-deserialization-exploits](https://github.com/s0wr0b1ndef/java-deserialization-exploits) ### CVE-2016-0793 - [tafamace/CVE-2016-0793](https://github.com/tafamace/CVE-2016-0793) ### CVE-2016-0801 - [abdsec/CVE-2016-0801](https://github.com/abdsec/CVE-2016-0801) - [zsaurus/CVE-2016-0801-test](https://github.com/zsaurus/CVE-2016-0801-test) ### CVE-2016-0805 - [hulovebin/cve-2016-0805](https://github.com/hulovebin/cve-2016-0805) ### CVE-2016-0846 - [secmob/CVE-2016-0846](https://github.com/secmob/CVE-2016-0846) - [b0b0505/CVE-2016-0846-PoC](https://github.com/b0b0505/CVE-2016-0846-PoC) ### CVE-2016-0974 - [Fullmetal5/FlashHax](https://github.com/Fullmetal5/FlashHax) ### CVE-2016-10033 - [opsxcq/exploit-CVE-2016-10033](https://github.com/opsxcq/exploit-CVE-2016-10033) - [Zenexer/safeshell](https://github.com/Zenexer/safeshell) - [GeneralTesler/CVE-2016-10033](https://github.com/GeneralTesler/CVE-2016-10033) - [chipironcin/CVE-2016-10033](https://github.com/chipironcin/CVE-2016-10033) - [Bajunan/CVE-2016-10033](https://github.com/Bajunan/CVE-2016-10033) - [qwertyuiop12138/CVE-2016-10033](https://github.com/qwertyuiop12138/CVE-2016-10033) - [liusec/WP-CVE-2016-10033](https://github.com/liusec/WP-CVE-2016-10033) - [pedro823/cve-2016-10033-45](https://github.com/pedro823/cve-2016-10033-45) - [awidardi/opsxcq-cve-2016-10033](https://github.com/awidardi/opsxcq-cve-2016-10033) - [0x00-0x00/CVE-2016-10033](https://github.com/0x00-0x00/CVE-2016-10033) - [cved-sources/cve-2016-10033](https://github.com/cved-sources/cve-2016-10033) ### CVE-2016-10034 - [heikipikker/exploit-CVE-2016-10034](https://github.com/heikipikker/exploit-CVE-2016-10034) ### CVE-2016-10277 - [alephsecurity/initroot](https://github.com/alephsecurity/initroot) - [leosol/initroot](https://github.com/leosol/initroot) ### CVE-2016-10709 - [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development) ### CVE-2016-10761 - [ISSAPolska/CVE-2016-10761](https://github.com/ISSAPolska/CVE-2016-10761) ### CVE-2016-1240 - [Naramsim/Offensive](https://github.com/Naramsim/Offensive) - [mhe18/CVE_Project](https://github.com/mhe18/CVE_Project) ### CVE-2016-1287 - [jgajek/killasa](https://github.com/jgajek/killasa) - [NetSPI/asa_tools](https://github.com/NetSPI/asa_tools) ### CVE-2016-1494 - [matthiasbe/secuimag3a](https://github.com/matthiasbe/secuimag3a) ### CVE-2016-1542 - [patriknordlen/bladelogic_bmc-cve-2016-1542](https://github.com/patriknordlen/bladelogic_bmc-cve-2016-1542) - [bao7uo/bmc_bladelogic](https://github.com/bao7uo/bmc_bladelogic) ### CVE-2016-1555 - [ide0x90/cve-2016-1555](https://github.com/ide0x90/cve-2016-1555) ### CVE-2016-1734 - [Manouchehri/CVE-2016-1734](https://github.com/Manouchehri/CVE-2016-1734) ### CVE-2016-1757 - [gdbinit/mach_race](https://github.com/gdbinit/mach_race) ### CVE-2016-1764 - [moloch--/cve-2016-1764](https://github.com/moloch--/cve-2016-1764) ### CVE-2016-1825 - [bazad/physmem](https://github.com/bazad/physmem) ### CVE-2016-1827 - [bazad/flow_divert-heap-overflow](https://github.com/bazad/flow_divert-heap-overflow) ### CVE-2016-1828 - [bazad/rootsh](https://github.com/bazad/rootsh) ### CVE-2016-2098 - [hderms/dh-CVE_2016_2098](https://github.com/hderms/dh-CVE_2016_2098) - [CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42](https://github.com/CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42) - [Alejandro-MartinG/rails-PoC-CVE-2016-2098](https://github.com/Alejandro-MartinG/rails-PoC-CVE-2016-2098) - [0x00-0x00/CVE-2016-2098](https://github.com/0x00-0x00/CVE-2016-2098) - [its-arun/CVE-2016-2098](https://github.com/its-arun/CVE-2016-2098) - [3rg1s/CVE-2016-2098](https://github.com/3rg1s/CVE-2016-2098) ### CVE-2016-2107 - [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107) - [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107) ### CVE-2016-2118 - [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118) ### CVE-2016-2173 - [HaToan/CVE-2016-2173](https://github.com/HaToan/CVE-2016-2173) ### CVE-2016-2233 - [fath0218/CVE-2016-2233](https://github.com/fath0218/CVE-2016-2233) ### CVE-2016-2334 - [icewall/CVE-2016-2334](https://github.com/icewall/CVE-2016-2334) ### CVE-2016-2402 - [ikoz/cert-pinning-flaw-poc](https://github.com/ikoz/cert-pinning-flaw-poc) - [ikoz/certPinningVulnerableOkHttp](https://github.com/ikoz/certPinningVulnerableOkHttp) ### CVE-2016-2431 - [laginimaineb/cve-2016-2431](https://github.com/laginimaineb/cve-2016-2431) - [laginimaineb/ExtractKeyMaster](https://github.com/laginimaineb/ExtractKeyMaster) ### CVE-2016-2434 - [jianqiangzhao/CVE-2016-2434](https://github.com/jianqiangzhao/CVE-2016-2434) ### CVE-2016-2468 - [gitcollect/CVE-2016-2468](https://github.com/gitcollect/CVE-2016-2468) ### CVE-2016-2569 - [amit-raut/CVE-2016-2569](https://github.com/amit-raut/CVE-2016-2569) ### CVE-2016-2776 - [KosukeShimofuji/CVE-2016-2776](https://github.com/KosukeShimofuji/CVE-2016-2776) - [infobyte/CVE-2016-2776](https://github.com/infobyte/CVE-2016-2776) ### CVE-2016-3141 - [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141) ### CVE-2016-3308 - [55-AA/CVE-2016-3308](https://github.com/55-AA/CVE-2016-3308) ### CVE-2016-3309 - [siberas/CVE-2016-3309_Reloaded](https://github.com/siberas/CVE-2016-3309_Reloaded) ### CVE-2016-3714 - [jackdpeterson/imagick_secure_puppet](https://github.com/jackdpeterson/imagick_secure_puppet) - [tommiionfire/CVE-2016-3714](https://github.com/tommiionfire/CVE-2016-3714) - [chusiang/CVE-2016-3714.ansible.role](https://github.com/chusiang/CVE-2016-3714.ansible.role) - [jpeanut/ImageTragick-CVE-2016-3714-RShell](https://github.com/jpeanut/ImageTragick-CVE-2016-3714-RShell) - [Hood3dRob1n/CVE-2016-3714](https://github.com/Hood3dRob1n/CVE-2016-3714) - [HRSkraps/CVE-2016-3714](https://github.com/HRSkraps/CVE-2016-3714) ### CVE-2016-3749 - [nirdev/CVE-2016-3749-PoC](https://github.com/nirdev/CVE-2016-3749-PoC) ### CVE-2016-3955 - [pqsec/uboatdemo](https://github.com/pqsec/uboatdemo) ### CVE-2016-3957 - [sj/web2py-e94946d-CVE-2016-3957](https://github.com/sj/web2py-e94946d-CVE-2016-3957) ### CVE-2016-3959 - [alexmullins/dsa](https://github.com/alexmullins/dsa) ### CVE-2016-3962 - [securifera/CVE-2016-3962-Exploit](https://github.com/securifera/CVE-2016-3962-Exploit) ### CVE-2016-4010 - [brianwrf/Magento-CVE-2016-4010](https://github.com/brianwrf/Magento-CVE-2016-4010) ### CVE-2016-4117 - [amit-raut/CVE-2016-4117-Report](https://github.com/amit-raut/CVE-2016-4117-Report) - [hybridious/CVE-2016-4117](https://github.com/hybridious/CVE-2016-4117) ### CVE-2016-4438 - [jason3e7/CVE-2016-4438](https://github.com/jason3e7/CVE-2016-4438) - [tafamace/CVE-2016-4438](https://github.com/tafamace/CVE-2016-4438) ### CVE-2016-4463 - [arntsonl/CVE-2016-4463](https://github.com/arntsonl/CVE-2016-4463) ### CVE-2016-4622 - [saelo/jscpwn](https://github.com/saelo/jscpwn) ### CVE-2016-4631 - [hansnielsen/tiffdisabler](https://github.com/hansnielsen/tiffdisabler) ### CVE-2016-4655 - [jndok/PegasusX](https://github.com/jndok/PegasusX) - [Cryptiiiic/skybreak](https://github.com/Cryptiiiic/skybreak) ### CVE-2016-4657 - [Mimoja/CVE-2016-4657-NintendoSwitch](https://github.com/Mimoja/CVE-2016-4657-NintendoSwitch) - [Traiver/CVE-2016-4657-Switch-Browser-Binary](https://github.com/Traiver/CVE-2016-4657-Switch-Browser-Binary) - [iDaN5x/Switcheroo](https://github.com/iDaN5x/Switcheroo) - [vigneshyaadav27/webkit-vulnerability](https://github.com/vigneshyaadav27/webkit-vulnerability) ### CVE-2016-4669 - [i-o-s/CVE-2016-4669](https://github.com/i-o-s/CVE-2016-4669) ### CVE-2016-4825 - [kaito834/cve-2016-4845_csrf](https://github.com/kaito834/cve-2016-4845_csrf) ### CVE-2016-4845 - [kaito834/cve-2016-4845_csrf](https://github.com/kaito834/cve-2016-4845_csrf) ### CVE-2016-4861 - [KosukeShimofuji/CVE-2016-4861](https://github.com/KosukeShimofuji/CVE-2016-4861) ### CVE-2016-4971 - [BlueCocoa/CVE-2016-4971](https://github.com/BlueCocoa/CVE-2016-4971) - [mbadanoiu/CVE-2016-4971](https://github.com/mbadanoiu/CVE-2016-4971) ### CVE-2016-5195 - [KosukeShimofuji/CVE-2016-5195](https://github.com/KosukeShimofuji/CVE-2016-5195) - [ASRTeam/CVE-2016-5195](https://github.com/ASRTeam/CVE-2016-5195) - [timwr/CVE-2016-5195](https://github.com/timwr/CVE-2016-5195) - [xlucas/dirtycow.cr](https://github.com/xlucas/dirtycow.cr) - [istenrot/centos-dirty-cow-ansible](https://github.com/istenrot/centos-dirty-cow-ansible) - [pgporada/ansible-role-cve](https://github.com/pgporada/ansible-role-cve) - [sideeffect42/DirtyCOWTester](https://github.com/sideeffect42/DirtyCOWTester) - [scumjr/dirtycow-vdso](https://github.com/scumjr/dirtycow-vdso) - [gbonacini/CVE-2016-5195](https://github.com/gbonacini/CVE-2016-5195) - [DavidBuchanan314/cowroot](https://github.com/DavidBuchanan314/cowroot) - [aishee/scan-dirtycow](https://github.com/aishee/scan-dirtycow) - [oleg-fiksel/ansible_CVE-2016-5195_check](https://github.com/oleg-fiksel/ansible_CVE-2016-5195_check) - [ldenevi/CVE-2016-5195](https://github.com/ldenevi/CVE-2016-5195) - [whu-enjoy/CVE-2016-5195](https://github.com/whu-enjoy/CVE-2016-5195) - [ndobson/inspec_CVE-2016-5195](https://github.com/ndobson/inspec_CVE-2016-5195) - [linhlt247/DirtyCOW_CVE-2016-5195](https://github.com/linhlt247/DirtyCOW_CVE-2016-5195) - [sribaba/android-CVE-2016-5195](https://github.com/sribaba/android-CVE-2016-5195) - [esc0rtd3w/org.cowpoop.moooooo](https://github.com/esc0rtd3w/org.cowpoop.moooooo) - [nu11secur1ty/Protect-CVE-2016-5195-DirtyCow-](https://github.com/nu11secur1ty/Protect-CVE-2016-5195-DirtyCow-) - [hyln9/VIKIROOT](https://github.com/hyln9/VIKIROOT) - [droidvoider/dirtycow-replacer](https://github.com/droidvoider/dirtycow-replacer) - [FloridSleeves/os-experiment-4](https://github.com/FloridSleeves/os-experiment-4) - [arbll/dirtycow](https://github.com/arbll/dirtycow) - [titanhp/Dirty-COW-CVE-2016-5195-Testing](https://github.com/titanhp/Dirty-COW-CVE-2016-5195-Testing) - [acidburnmi/CVE-2016-5195-master](https://github.com/acidburnmi/CVE-2016-5195-master) - [xpcmdshell/derpyc0w](https://github.com/xpcmdshell/derpyc0w) - [Brucetg/DirtyCow-EXP](https://github.com/Brucetg/DirtyCow-EXP) - [jas502n/CVE-2016-5195](https://github.com/jas502n/CVE-2016-5195) - [imust6226/dirtcow](https://github.com/imust6226/dirtcow) ### CVE-2016-5345 - [NickStephens/cve-2016-5345](https://github.com/NickStephens/cve-2016-5345) ### CVE-2016-5639 - [xfox64x/CVE-2016-5639](https://github.com/xfox64x/CVE-2016-5639) ### CVE-2016-5640 - [vpnguy-zz/CrestCrack](https://github.com/vpnguy-zz/CrestCrack) - [xfox64x/CVE-2016-5640](https://github.com/xfox64x/CVE-2016-5640) ### CVE-2016-5696 - [Gnoxter/mountain_goat](https://github.com/Gnoxter/mountain_goat) - [violentshell/rover](https://github.com/violentshell/rover) - [jduck/challack](https://github.com/jduck/challack) - [bpukallus/chackd](https://github.com/bpukallus/chackd) - [nogoegst/grill](https://github.com/nogoegst/grill) ### CVE-2016-5699 - [bunseokbot/CVE-2016-5699-poc](https://github.com/bunseokbot/CVE-2016-5699-poc) - [shajinzheng/cve-2016-5699-jinzheng-sha](https://github.com/shajinzheng/cve-2016-5699-jinzheng-sha) ### CVE-2016-5734 - [KosukeShimofuji/CVE-2016-5734](https://github.com/KosukeShimofuji/CVE-2016-5734) ### CVE-2016-6187 - [vnik5287/cve-2016-6187-poc](https://github.com/vnik5287/cve-2016-6187-poc) ### CVE-2016-6210 - [justlce/CVE-2016-6210-Exploit](https://github.com/justlce/CVE-2016-6210-Exploit) ### CVE-2016-6271 - [gteissier/CVE-2016-6271](https://github.com/gteissier/CVE-2016-6271) ### CVE-2016-6317 - [kavgan/vuln_test_repo_public_ruby_gemfile_cve-2016-6317](https://github.com/kavgan/vuln_test_repo_public_ruby_gemfile_cve-2016-6317) ### CVE-2016-6366 - [RiskSense-Ops/CVE-2016-6366](https://github.com/RiskSense-Ops/CVE-2016-6366) ### CVE-2016-6515 - [opsxcq/exploit-CVE-2016-6515](https://github.com/opsxcq/exploit-CVE-2016-6515) - [cved-sources/cve-2016-6515](https://github.com/cved-sources/cve-2016-6515) ### CVE-2016-6516 - [wpengfei/CVE-2016-6516-exploit](https://github.com/wpengfei/CVE-2016-6516-exploit) ### CVE-2016-6584 - [ViralSecurityGroup/KNOXout](https://github.com/ViralSecurityGroup/KNOXout) ### CVE-2016-6662 - [konstantin-kelemen/mysqld_safe-CVE-2016-6662-patch](https://github.com/konstantin-kelemen/mysqld_safe-CVE-2016-6662-patch) - [meersjo/ansible-mysql-cve-2016-6662](https://github.com/meersjo/ansible-mysql-cve-2016-6662) - [KosukeShimofuji/CVE-2016-6662](https://github.com/KosukeShimofuji/CVE-2016-6662) - [Ashrafdev/MySQL-Remote-Root-Code-Execution](https://github.com/Ashrafdev/MySQL-Remote-Root-Code-Execution) - [boompig/cve-2016-6662](https://github.com/boompig/cve-2016-6662) - [MAYASEVEN/CVE-2016-6662](https://github.com/MAYASEVEN/CVE-2016-6662) ### CVE-2016-6663 - [firebroo/CVE-2016-6663](https://github.com/firebroo/CVE-2016-6663) ### CVE-2016-6754 - [secmob/BadKernel](https://github.com/secmob/BadKernel) ### CVE-2016-6798 - [tafamace/CVE-2016-6798](https://github.com/tafamace/CVE-2016-6798) ### CVE-2016-6801 - [TSNGL21/CVE-2016-6801](https://github.com/TSNGL21/CVE-2016-6801) ### CVE-2016-7117 - [KosukeShimofuji/CVE-2016-7117](https://github.com/KosukeShimofuji/CVE-2016-7117) ### CVE-2016-7190 - [0xcl/cve-2016-7190](https://github.com/0xcl/cve-2016-7190) ### CVE-2016-7200 - [theori-io/chakra-2016-11](https://github.com/theori-io/chakra-2016-11) ### CVE-2016-7255 - [heh3/CVE-2016-7255](https://github.com/heh3/CVE-2016-7255) - [FSecureLABS/CVE-2016-7255](https://github.com/FSecureLABS/CVE-2016-7255) - [homjxi0e/CVE-2016-7255](https://github.com/homjxi0e/CVE-2016-7255) - [yuvatia/page-table-exploitation](https://github.com/yuvatia/page-table-exploitation) - [bbolmin/cve-2016-7255_x86_x64](https://github.com/bbolmin/cve-2016-7255_x86_x64) ### CVE-2016-7434 - [opsxcq/exploit-CVE-2016-7434](https://github.com/opsxcq/exploit-CVE-2016-7434) - [shekkbuilder/CVE-2016-7434](https://github.com/shekkbuilder/CVE-2016-7434) - [cved-sources/cve-2016-7434](https://github.com/cved-sources/cve-2016-7434) ### CVE-2016-7608 - [bazad/IOFireWireFamily-overflow](https://github.com/bazad/IOFireWireFamily-overflow) ### CVE-2016-7855 - [swagatbora90/CheckFlashPlayerVersion](https://github.com/swagatbora90/CheckFlashPlayerVersion) ### CVE-2016-8007 - [dmaasland/mcafee-hip-CVE-2016-8007](https://github.com/dmaasland/mcafee-hip-CVE-2016-8007) ### CVE-2016-8016 - [opsxcq/exploit-CVE-2016-8016-25](https://github.com/opsxcq/exploit-CVE-2016-8016-25) ### CVE-2016-8367 - [0xICF/PanelShock](https://github.com/0xICF/PanelShock) ### CVE-2016-8462 - [CunningLogic/PixelDump_CVE-2016-8462](https://github.com/CunningLogic/PixelDump_CVE-2016-8462) ### CVE-2016-8467 - [roeeh/bootmodechecker](https://github.com/roeeh/bootmodechecker) ### CVE-2016-8610 - [cujanovic/CVE-2016-8610-PoC](https://github.com/cujanovic/CVE-2016-8610-PoC) ### CVE-2016-8636 - [jigerjain/Integer-Overflow-test](https://github.com/jigerjain/Integer-Overflow-test) ### CVE-2016-8655 - [scarvell/cve-2016-8655](https://github.com/scarvell/cve-2016-8655) - [LakshmiDesai/CVE-2016-8655](https://github.com/LakshmiDesai/CVE-2016-8655) - [KosukeShimofuji/CVE-2016-8655](https://github.com/KosukeShimofuji/CVE-2016-8655) - [agkunkle/chocobo](https://github.com/agkunkle/chocobo) - [m-mullins/CVE-2016-8655_Android](https://github.com/m-mullins/CVE-2016-8655_Android) ### CVE-2016-8735 - [ianxtianxt/CVE-2016-8735](https://github.com/ianxtianxt/CVE-2016-8735) ### CVE-2016-8740 - [lcfpadilha/mac0352-ep4](https://github.com/lcfpadilha/mac0352-ep4) ### CVE-2016-8776 - [maviroxz/CVE-2016-8776](https://github.com/maviroxz/CVE-2016-8776) ### CVE-2016-8858 - [dag-erling/kexkill](https://github.com/dag-erling/kexkill) ### CVE-2016-8869 - [sunsunza2009/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870](https://github.com/sunsunza2009/Joomla-3.4.4-3.6.4_CVE-2016-8869_and_CVE-2016-8870) - [rustyJ4ck/JoomlaCVE20168869](https://github.com/rustyJ4ck/JoomlaCVE20168869) - [cved-sources/cve-2016-8869](https://github.com/cved-sources/cve-2016-8869) ### CVE-2016-8870 - [cved-sources/cve-2016-8870](https://github.com/cved-sources/cve-2016-8870) ### CVE-2016-9066 - [saelo/foxpwn](https://github.com/saelo/foxpwn) ### CVE-2016-9079 - [LakshmiDesai/CVE-2016-9079](https://github.com/LakshmiDesai/CVE-2016-9079) - [dangokyo/CVE-2016-9079](https://github.com/dangokyo/CVE-2016-9079) ### CVE-2016-9192 - [serializingme/cve-2016-9192](https://github.com/serializingme/cve-2016-9192) ### CVE-2016-9244 - [EgeBalci/Ticketbleed](https://github.com/EgeBalci/Ticketbleed) - [glestel/minion-ticket-bleed-plugin](https://github.com/glestel/minion-ticket-bleed-plugin) ### CVE-2016-9838 - [cved-sources/cve-2016-9838](https://github.com/cved-sources/cve-2016-9838) ### CVE-2016-9920 - [t0kx/exploit-CVE-2016-9920](https://github.com/t0kx/exploit-CVE-2016-9920) ## 2017 ### CVE-2017-0038 - [k0keoyo/CVE-2017-0038-EXP-C-JS](https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS) ### CVE-2017-0065 - [Dankirk/cve-2017-0065](https://github.com/Dankirk/cve-2017-0065) ### CVE-2017-0075 - [4B5F5F4B/HyperV](https://github.com/4B5F5F4B/HyperV) ### CVE-2017-0106 - [ryhanson/CVE-2017-0106](https://github.com/ryhanson/CVE-2017-0106) ### CVE-2017-0108 - [homjxi0e/CVE-2017-0108](https://github.com/homjxi0e/CVE-2017-0108) ### CVE-2017-0143 - [valarauco/wannafind](https://github.com/valarauco/wannafind) ### CVE-2017-0144 - [peterpt/eternal_scanner](https://github.com/peterpt/eternal_scanner) - [kimocoder/eternalblue](https://github.com/kimocoder/eternalblue) ### CVE-2017-0145 - [MelonSmasher/chef_tissues](https://github.com/MelonSmasher/chef_tissues) ### CVE-2017-0199 - [ryhanson/CVE-2017-0199](https://github.com/ryhanson/CVE-2017-0199) - [SyFi/cve-2017-0199](https://github.com/SyFi/cve-2017-0199) - [bhdresh/CVE-2017-0199](https://github.com/bhdresh/CVE-2017-0199) - [NotAwful/CVE-2017-0199-Fix](https://github.com/NotAwful/CVE-2017-0199-Fix) - [haibara3839/CVE-2017-0199-master](https://github.com/haibara3839/CVE-2017-0199-master) - [Exploit-install/CVE-2017-0199](https://github.com/Exploit-install/CVE-2017-0199) - [zakybstrd21215/PoC-CVE-2017-0199](https://github.com/zakybstrd21215/PoC-CVE-2017-0199) - [n1shant-sinha/CVE-2017-0199](https://github.com/n1shant-sinha/CVE-2017-0199) - [kn0wm4d/htattack](https://github.com/kn0wm4d/htattack) - [joke998/Cve-2017-0199](https://github.com/joke998/Cve-2017-0199) - [joke998/Cve-2017-0199-](https://github.com/joke998/Cve-2017-0199-) - [r0otshell/Microsoft-Word-CVE-2017-0199-](https://github.com/r0otshell/Microsoft-Word-CVE-2017-0199-) - [viethdgit/CVE-2017-0199](https://github.com/viethdgit/CVE-2017-0199) - [nicpenning/RTF-Cleaner](https://github.com/nicpenning/RTF-Cleaner) - [bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199](https://github.com/bloomer1016/2017-11-17-Maldoc-Using-CVE-2017-0199) - [jacobsoo/RTF-Cleaner](https://github.com/jacobsoo/RTF-Cleaner) - [denmilu/CVE-2017-0199](https://github.com/denmilu/CVE-2017-0199) ### CVE-2017-0204 - [ryhanson/CVE-2017-0204](https://github.com/ryhanson/CVE-2017-0204) ### CVE-2017-0213 - [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213) - [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213) - [denmilu/CVE-2017-0213](https://github.com/denmilu/CVE-2017-0213) - [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213) - [eonrickity/CVE-2017-0213](https://github.com/eonrickity/CVE-2017-0213) - [Jos675/CVE-2017-0213-Exploit](https://github.com/Jos675/CVE-2017-0213-Exploit) ### CVE-2017-0248 - [rubenmamo/CVE-2017-0248-Test](https://github.com/rubenmamo/CVE-2017-0248-Test) ### CVE-2017-0261 - [kcufId/eps-CVE-2017-0261](https://github.com/kcufId/eps-CVE-2017-0261) ### CVE-2017-0263 - [R06otMD5/cve-2017-0263-poc](https://github.com/R06otMD5/cve-2017-0263-poc) ### CVE-2017-0290 - [homjxi0e/CVE-2017-0290-](https://github.com/homjxi0e/CVE-2017-0290-) ### CVE-2017-0411 - [lulusudoku/PoC](https://github.com/lulusudoku/PoC) ### CVE-2017-0478 - [JiounDai/CVE-2017-0478](https://github.com/JiounDai/CVE-2017-0478) - [denmilu/CVE-2017-0478](https://github.com/denmilu/CVE-2017-0478) ### CVE-2017-0541 - [JiounDai/CVE-2017-0541](https://github.com/JiounDai/CVE-2017-0541) - [denmilu/CVE-2017-0541](https://github.com/denmilu/CVE-2017-0541) ### CVE-2017-0554 - [lanrat/tethr](https://github.com/lanrat/tethr) ### CVE-2017-0564 - [guoygang/CVE-2017-0564-ION-PoC](https://github.com/guoygang/CVE-2017-0564-ION-PoC) ### CVE-2017-0780 - [EggUncle/CVE-2017-0780](https://github.com/EggUncle/CVE-2017-0780) ### CVE-2017-0781 - [ojasookert/CVE-2017-0781](https://github.com/ojasookert/CVE-2017-0781) - [marcinguy/android712-blueborne](https://github.com/marcinguy/android712-blueborne) ### CVE-2017-0785 - [ojasookert/CVE-2017-0785](https://github.com/ojasookert/CVE-2017-0785) - [aymankhalfatni/CVE-2017-0785](https://github.com/aymankhalfatni/CVE-2017-0785) - [Alfa100001/-CVE-2017-0785-BlueBorne-PoC](https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC) - [Android013/CVE-2017-0785](https://github.com/Android013/CVE-2017-0785) - [Hackerscript/BlueBorne-CVE-2017-0785](https://github.com/Hackerscript/BlueBorne-CVE-2017-0785) - [pieterbork/blueborne](https://github.com/pieterbork/blueborne) - [sigbitsadmin/diff](https://github.com/sigbitsadmin/diff) - [SigBitsLabs/diff](https://github.com/SigBitsLabs/diff) - [RavSS/Bluetooth-Crash-CVE-2017-0785](https://github.com/RavSS/Bluetooth-Crash-CVE-2017-0785) ### CVE-2017-0806 - [michalbednarski/ReparcelBug](https://github.com/michalbednarski/ReparcelBug) ### CVE-2017-0807 - [kpatsakis/PoC_CVE-2017-0807](https://github.com/kpatsakis/PoC_CVE-2017-0807) ### CVE-2017-1000000 - [smythtech/DWF-CVE-2017-1000000](https://github.com/smythtech/DWF-CVE-2017-1000000) ### CVE-2017-1000083 - [matlink/evince-cve-2017-1000083](https://github.com/matlink/evince-cve-2017-1000083) - [matlink/cve-2017-1000083-atril-nautilus](https://github.com/matlink/cve-2017-1000083-atril-nautilus) ### CVE-2017-1000112 - [hikame/docker_escape_pwn](https://github.com/hikame/docker_escape_pwn) ### CVE-2017-1000117 - [timwr/CVE-2017-1000117](https://github.com/timwr/CVE-2017-1000117) - [GrahamMThomas/test-git-vuln_CVE-2017-1000117](https://github.com/GrahamMThomas/test-git-vuln_CVE-2017-1000117) - [Manouchehri/CVE-2017-1000117](https://github.com/Manouchehri/CVE-2017-1000117) - [thelastbyte/CVE-2017-1000117](https://github.com/thelastbyte/CVE-2017-1000117) - [alilangtest/CVE-2017-1000117](https://github.com/alilangtest/CVE-2017-1000117) - [VulApps/CVE-2017-1000117](https://github.com/VulApps/CVE-2017-1000117) - [greymd/CVE-2017-1000117](https://github.com/greymd/CVE-2017-1000117) - [shogo82148/Fix-CVE-2017-1000117](https://github.com/shogo82148/Fix-CVE-2017-1000117) - [sasairc/CVE-2017-1000117_wasawasa](https://github.com/sasairc/CVE-2017-1000117_wasawasa) - [Shadow5523/CVE-2017-1000117-test](https://github.com/Shadow5523/CVE-2017-1000117-test) - [bells17/CVE-2017-1000117](https://github.com/bells17/CVE-2017-1000117) - [ieee0824/CVE-2017-1000117](https://github.com/ieee0824/CVE-2017-1000117) - [rootclay/CVE-2017-1000117](https://github.com/rootclay/CVE-2017-1000117) - [ieee0824/CVE-2017-1000117-sl](https://github.com/ieee0824/CVE-2017-1000117-sl) - [takehaya/CVE-2017-1000117](https://github.com/takehaya/CVE-2017-1000117) - [ikmski/CVE-2017-1000117](https://github.com/ikmski/CVE-2017-1000117) - [nkoneko/CVE-2017-1000117](https://github.com/nkoneko/CVE-2017-1000117) - [chenzhuo0618/test](https://github.com/chenzhuo0618/test) - [siling2017/CVE-2017-1000117](https://github.com/siling2017/CVE-2017-1000117) - [Q2h1Cg/CVE-2017-1000117](https://github.com/Q2h1Cg/CVE-2017-1000117) - [cved-sources/cve-2017-1000117](https://github.com/cved-sources/cve-2017-1000117) - [leezp/CVE-2017-1000117](https://github.com/leezp/CVE-2017-1000117) - [AnonymKing/CVE-2017-1000117](https://github.com/AnonymKing/CVE-2017-1000117) ### CVE-2017-1000250 - [olav-st/CVE-2017-1000250-PoC](https://github.com/olav-st/CVE-2017-1000250-PoC) ### CVE-2017-1000251 - [hayzamjs/Blueborne-CVE-2017-1000251](https://github.com/hayzamjs/Blueborne-CVE-2017-1000251) - [chmod750/blueborne](https://github.com/chmod750/blueborne) - [tlatkdgus1/blueborne-CVE-2017-1000251](https://github.com/tlatkdgus1/blueborne-CVE-2017-1000251) - [own2pwn/blueborne-CVE-2017-1000251-POC](https://github.com/own2pwn/blueborne-CVE-2017-1000251-POC) - [marcinguy/blueborne-CVE-2017-1000251](https://github.com/marcinguy/blueborne-CVE-2017-1000251) ### CVE-2017-1000253 - [sagiesec/PIE-Stack-Clash-CVE-2017-1000253](https://github.com/sagiesec/PIE-Stack-Clash-CVE-2017-1000253) ### CVE-2017-1000353 - [vulhub/CVE-2017-1000353](https://github.com/vulhub/CVE-2017-1000353) ### CVE-2017-1000367 - [c0d3z3r0/sudo-CVE-2017-1000367](https://github.com/c0d3z3r0/sudo-CVE-2017-1000367) - [homjxi0e/CVE-2017-1000367](https://github.com/homjxi0e/CVE-2017-1000367) - [pucerpocok/sudo_exploit](https://github.com/pucerpocok/sudo_exploit) ### CVE-2017-1000405 - [bindecy/HugeDirtyCowPOC](https://github.com/bindecy/HugeDirtyCowPOC) ### CVE-2017-1000475 - [lajarajorge/CVE-2017-1000475](https://github.com/lajarajorge/CVE-2017-1000475) ### CVE-2017-1000486 - [pimps/CVE-2017-1000486](https://github.com/pimps/CVE-2017-1000486) - [mogwailabs/CVE-2017-1000486](https://github.com/mogwailabs/CVE-2017-1000486) - [cved-sources/cve-2017-1000486](https://github.com/cved-sources/cve-2017-1000486) ### CVE-2017-1000499 - [Villaquiranm/5MMISSI-CVE-2017-1000499](https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499) ### CVE-2017-1002101 - [bgeesaman/subpath-exploit](https://github.com/bgeesaman/subpath-exploit) ### CVE-2017-10235 - [fundacion-sadosky/vbox_cve_2017_10235](https://github.com/fundacion-sadosky/vbox_cve_2017_10235) ### CVE-2017-10271 - [1337g/CVE-2017-10271](https://github.com/1337g/CVE-2017-10271) - [s3xy/CVE-2017-10271](https://github.com/s3xy/CVE-2017-10271) - [ZH3FENG/PoCs-Weblogic_2017_10271](https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271) - [c0mmand3rOpSec/CVE-2017-10271](https://github.com/c0mmand3rOpSec/CVE-2017-10271) - [Luffin/CVE-2017-10271](https://github.com/Luffin/CVE-2017-10271) - [cjjduck/weblogic_wls_wsat_rce](https://github.com/cjjduck/weblogic_wls_wsat_rce) - [kkirsche/CVE-2017-10271](https://github.com/kkirsche/CVE-2017-10271) - [pssss/CVE-2017-10271](https://github.com/pssss/CVE-2017-10271) - [SuperHacker-liuan/cve-2017-10271-poc](https://github.com/SuperHacker-liuan/cve-2017-10271-poc) - [bmcculley/CVE-2017-10271](https://github.com/bmcculley/CVE-2017-10271) - [RealBearcat/Oracle-WebLogic-CVE-2017-10271](https://github.com/RealBearcat/Oracle-WebLogic-CVE-2017-10271) - [Sch01ar/CVE-2017-10271](https://github.com/Sch01ar/CVE-2017-10271) - [Cymmetria/weblogic_honeypot](https://github.com/Cymmetria/weblogic_honeypot) - [JackyTsuuuy/weblogic_wls_rce_poc-exp](https://github.com/JackyTsuuuy/weblogic_wls_rce_poc-exp) - [s0wr0b1ndef/Oracle-WebLogic-WLS-WSAT](https://github.com/s0wr0b1ndef/Oracle-WebLogic-WLS-WSAT) - [lonehand/Oracle-WebLogic-CVE-2017-10271-master](https://github.com/lonehand/Oracle-WebLogic-CVE-2017-10271-master) - [shack2/javaserializetools](https://github.com/shack2/javaserializetools) - [nhwuxiaojun/CVE-2017-10271](https://github.com/nhwuxiaojun/CVE-2017-10271) - [ETOCheney/JavaDeserialization](https://github.com/ETOCheney/JavaDeserialization) - [cved-sources/cve-2017-10271](https://github.com/cved-sources/cve-2017-10271) - [XHSecurity/Oracle-WebLogic-CVE-2017-10271](https://github.com/XHSecurity/Oracle-WebLogic-CVE-2017-10271) - [kaidb/Weblogic_Wsat_RCE](https://github.com/kaidb/Weblogic_Wsat_RCE) - [SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961](https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961) - [Yuusuke4/WebLogic_CNVD_C_2019_48814](https://github.com/Yuusuke4/WebLogic_CNVD_C_2019_48814) - [7kbstorm/WebLogic_CNVD_C2019_48814](https://github.com/7kbstorm/WebLogic_CNVD_C2019_48814) - [ianxtianxt/-CVE-2017-10271-](https://github.com/ianxtianxt/-CVE-2017-10271-) ### CVE-2017-10352 - [bigsizeme/weblogic-XMLDecoder](https://github.com/bigsizeme/weblogic-XMLDecoder) ### CVE-2017-10366 - [blazeinfosec/CVE-2017-10366_peoplesoft](https://github.com/blazeinfosec/CVE-2017-10366_peoplesoft) ### CVE-2017-10617 - [gteissier/CVE-2017-10617](https://github.com/gteissier/CVE-2017-10617) ### CVE-2017-10661 - [GeneBlue/CVE-2017-10661_POC](https://github.com/GeneBlue/CVE-2017-10661_POC) ### CVE-2017-10797 - [n4xh4ck5/CVE-2017-10797](https://github.com/n4xh4ck5/CVE-2017-10797) ### CVE-2017-10952 - [afbase/CVE-2017-10952](https://github.com/afbase/CVE-2017-10952) ### CVE-2017-11176 - [DoubleMice/cve-2017-11176](https://github.com/DoubleMice/cve-2017-11176) - [HckEX/CVE-2017-11176](https://github.com/HckEX/CVE-2017-11176) - [leonardo1101/cve-2017-11176](https://github.com/leonardo1101/cve-2017-11176) ### CVE-2017-11317 - [bao7uo/RAU_crypto](https://github.com/bao7uo/RAU_crypto) ### CVE-2017-11427 - [CHYbeta/CVE-2017-11427-DEMO](https://github.com/CHYbeta/CVE-2017-11427-DEMO) ### CVE-2017-11503 - [wizardafric/download](https://github.com/wizardafric/download) ### CVE-2017-11519 - [vakzz/tplink-CVE-2017-11519](https://github.com/vakzz/tplink-CVE-2017-11519) ### CVE-2017-11610 - [ivanitlearning/CVE-2017-11610](https://github.com/ivanitlearning/CVE-2017-11610) ### CVE-2017-11611 - [faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc) ### CVE-2017-11774 - [devcoinfet/SniperRoost](https://github.com/devcoinfet/SniperRoost) ### CVE-2017-11783 - [Sheisback/CVE-2017-11783](https://github.com/Sheisback/CVE-2017-11783) ### CVE-2017-11816 - [lr3800/CVE-2017-11816](https://github.com/lr3800/CVE-2017-11816) ### CVE-2017-11826 - [thatskriptkid/CVE-2017-11826](https://github.com/thatskriptkid/CVE-2017-11826) ### CVE-2017-11882 - [starnightcyber/exploits](https://github.com/starnightcyber/exploits) - [zhouat/cve-2017-11882](https://github.com/zhouat/cve-2017-11882) - [embedi/CVE-2017-11882](https://github.com/embedi/CVE-2017-11882) - [Ridter/CVE-2017-11882](https://github.com/Ridter/CVE-2017-11882) - [BlackMathIT/2017-11882_Generator](https://github.com/BlackMathIT/2017-11882_Generator) - [unamer/CVE-2017-11882](https://github.com/unamer/CVE-2017-11882) - [0x09AL/CVE-2017-11882-metasploit](https://github.com/0x09AL/CVE-2017-11882-metasploit) - [HZachev/ABC](https://github.com/HZachev/ABC) - [starnightcyber/CVE-2017-11882](https://github.com/starnightcyber/CVE-2017-11882) - [Grey-Li/CVE-2017-11882](https://github.com/Grey-Li/CVE-2017-11882) - [legendsec/CVE-2017-11882-for-Kali](https://github.com/legendsec/CVE-2017-11882-for-Kali) - [CSC-pentest/cve-2017-11882](https://github.com/CSC-pentest/cve-2017-11882) - [Shadowshusky/CVE-2017-11882-](https://github.com/Shadowshusky/CVE-2017-11882-) - [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802) - [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802) - [denmilu/CVE-2017-11882](https://github.com/denmilu/CVE-2017-11882) - [denmilu/CVE-2018-0802_CVE-2017-11882](https://github.com/denmilu/CVE-2018-0802_CVE-2017-11882) - [bloomer1016/CVE-2017-11882-Possible-Remcos-Malspam](https://github.com/bloomer1016/CVE-2017-11882-Possible-Remcos-Malspam) - [ChaitanyaHaritash/CVE-2017-11882](https://github.com/ChaitanyaHaritash/CVE-2017-11882) - [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-) - [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882) - [R0fM1a/IDB_Share](https://github.com/R0fM1a/IDB_Share) - [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882) - [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882) - [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882) ### CVE-2017-11907 - [re4lity/CVE-2017-11907](https://github.com/re4lity/CVE-2017-11907) ### CVE-2017-12149 - [sevck/CVE-2017-12149](https://github.com/sevck/CVE-2017-12149) - [yunxu1/jboss-_CVE-2017-12149](https://github.com/yunxu1/jboss-_CVE-2017-12149) - [1337g/CVE-2017-12149](https://github.com/1337g/CVE-2017-12149) - [jreppiks/CVE-2017-12149](https://github.com/jreppiks/CVE-2017-12149) ### CVE-2017-12426 - [sm-paul-schuette/CVE-2017-12426](https://github.com/sm-paul-schuette/CVE-2017-12426) ### CVE-2017-12542 - [skelsec/CVE-2017-12542](https://github.com/skelsec/CVE-2017-12542) - [sk1dish/ilo4-rce-vuln-scanner](https://github.com/sk1dish/ilo4-rce-vuln-scanner) ### CVE-2017-12611 - [brianwrf/S2-053-CVE-2017-12611](https://github.com/brianwrf/S2-053-CVE-2017-12611) ### CVE-2017-12615 - [breaktoprotect/CVE-2017-12615](https://github.com/breaktoprotect/CVE-2017-12615) - [mefulton/cve-2017-12615](https://github.com/mefulton/cve-2017-12615) - [zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717](https://github.com/zi0Black/POC-CVE-2017-12615-or-CVE-2017-12717) - [RealBearcat/CVE-2017-12615](https://github.com/RealBearcat/CVE-2017-12615) - [wsg00d/cve-2017-12615](https://github.com/wsg00d/cve-2017-12615) - [1337g/CVE-2017-12615](https://github.com/1337g/CVE-2017-12615) - [Shellkeys/CVE-2017-12615](https://github.com/Shellkeys/CVE-2017-12615) - [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615) - [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615) ### CVE-2017-12617 - [cyberheartmi9/CVE-2017-12617](https://github.com/cyberheartmi9/CVE-2017-12617) - [devcoinfet/CVE-2017-12617](https://github.com/devcoinfet/CVE-2017-12617) - [qiantu88/CVE-2017-12617](https://github.com/qiantu88/CVE-2017-12617) - [ygouzerh/CVE-2017-12617](https://github.com/ygouzerh/CVE-2017-12617) ### CVE-2017-12624 - [tafamace/CVE-2017-12624](https://github.com/tafamace/CVE-2017-12624) ### CVE-2017-12635 - [assalielmehdi/CVE-2017-12635](https://github.com/assalielmehdi/CVE-2017-12635) ### CVE-2017-12636 - [moayadalmalat/CVE-2017-12636](https://github.com/moayadalmalat/CVE-2017-12636) - [F1uffyGoat/F1uffyCouchDB](https://github.com/F1uffyGoat/F1uffyCouchDB) ### CVE-2017-12792 - [ZZS2017/cve-2017-12792](https://github.com/ZZS2017/cve-2017-12792) ### CVE-2017-12852 - [BT123/numpy-1.13.1](https://github.com/BT123/numpy-1.13.1) ### CVE-2017-12943 - [aymankhalfatni/D-Link](https://github.com/aymankhalfatni/D-Link) ### CVE-2017-12945 - [aress31/cve-2017-12945](https://github.com/aress31/cve-2017-12945) ### CVE-2017-13089 - [r1b/CVE-2017-13089](https://github.com/r1b/CVE-2017-13089) - [mzeyong/CVE-2017-13089](https://github.com/mzeyong/CVE-2017-13089) ### CVE-2017-13156 - [xyzAsian/Janus-CVE-2017-13156](https://github.com/xyzAsian/Janus-CVE-2017-13156) - [caxmd/CVE-2017-13156](https://github.com/caxmd/CVE-2017-13156) - [giacomoferretti/janus-toolkit](https://github.com/giacomoferretti/janus-toolkit) ### CVE-2017-13253 - [tamirzb/CVE-2017-13253](https://github.com/tamirzb/CVE-2017-13253) ### CVE-2017-13672 - [DavidBuchanan314/CVE-2017-13672](https://github.com/DavidBuchanan314/CVE-2017-13672) ### CVE-2017-13868 - [bazad/ctl_ctloutput-leak](https://github.com/bazad/ctl_ctloutput-leak) ### CVE-2017-13872 - [hageok/CVE-2017-13872-Patch](https://github.com/hageok/CVE-2017-13872-Patch) ### CVE-2017-14105 - [theguly/CVE-2017-14105](https://github.com/theguly/CVE-2017-14105) ### CVE-2017-14262 - [zzz66686/CVE-2017-14262](https://github.com/zzz66686/CVE-2017-14262) ### CVE-2017-14263 - [zzz66686/CVE-2017-14263](https://github.com/zzz66686/CVE-2017-14263) ### CVE-2017-14322 - [joesmithjaffa/CVE-2017-14322](https://github.com/joesmithjaffa/CVE-2017-14322) ### CVE-2017-14491 - [YIHSUEHTsai/dnsmasq-2.4.1-fix-CVE-2017-14491](https://github.com/YIHSUEHTsai/dnsmasq-2.4.1-fix-CVE-2017-14491) ### CVE-2017-14493 - [pupiles/bof-dnsmasq-cve-2017-14493](https://github.com/pupiles/bof-dnsmasq-cve-2017-14493) ### CVE-2017-14719 - [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8) ### CVE-2017-14948 - [badnack/d_link_880_bug](https://github.com/badnack/d_link_880_bug) ### CVE-2017-15120 - [shutingrz/CVE-2017-15120_PoC](https://github.com/shutingrz/CVE-2017-15120_PoC) ### CVE-2017-15277 - [tacticthreat/ImageMagick-CVE-2017-15277](https://github.com/tacticthreat/ImageMagick-CVE-2017-15277) ### CVE-2017-15303 - [hfiref0x/Stryker](https://github.com/hfiref0x/Stryker) ### CVE-2017-15361 - [lva/Infineon-CVE-2017-15361](https://github.com/lva/Infineon-CVE-2017-15361) - [titanous/rocacheck](https://github.com/titanous/rocacheck) - [jnpuskar/RocaCmTest](https://github.com/jnpuskar/RocaCmTest) - [nsacyber/Detect-CVE-2017-15361-TPM](https://github.com/nsacyber/Detect-CVE-2017-15361-TPM) - [0xxon/zeek-plugin-roca](https://github.com/0xxon/zeek-plugin-roca) - [0xxon/roca](https://github.com/0xxon/roca) ### CVE-2017-15394 - [sudosammy/CVE-2017-15394](https://github.com/sudosammy/CVE-2017-15394) ### CVE-2017-15708 - [RealBearcat/CVE-2017-15708](https://github.com/RealBearcat/CVE-2017-15708) ### CVE-2017-15715 - [whisp1830/CVE-2017-15715](https://github.com/whisp1830/CVE-2017-15715) ### CVE-2017-15944 - [xxnbyy/CVE-2017-15944-POC](https://github.com/xxnbyy/CVE-2017-15944-POC) - [surajraghuvanshi/PaloAltoRceDetectionAndExploit](https://github.com/surajraghuvanshi/PaloAltoRceDetectionAndExploit) ### CVE-2017-16082 - [nulldreams/CVE-2017-16082](https://github.com/nulldreams/CVE-2017-16082) ### CVE-2017-16088 - [Flyy-yu/CVE-2017-16088](https://github.com/Flyy-yu/CVE-2017-16088) ### CVE-2017-16245 - [AOCorsaire/CVE-2017-16245](https://github.com/AOCorsaire/CVE-2017-16245) ### CVE-2017-1635 - [emcalv/tivoli-poc](https://github.com/emcalv/tivoli-poc) ### CVE-2017-16524 - [realistic-security/CVE-2017-16524](https://github.com/realistic-security/CVE-2017-16524) ### CVE-2017-16567 - [dewankpant/CVE-2017-16567](https://github.com/dewankpant/CVE-2017-16567) ### CVE-2017-16568 - [dewankpant/CVE-2017-16568](https://github.com/dewankpant/CVE-2017-16568) ### CVE-2017-16744 - [GainSec/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara](https://github.com/GainSec/CVE-2017-16744-and-CVE-2017-16748-Tridium-Niagara) ### CVE-2017-16778 - [breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection](https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection) ### CVE-2017-16806 - [rickoooooo/ulteriusExploit](https://github.com/rickoooooo/ulteriusExploit) ### CVE-2017-16943 - [beraphin/CVE-2017-16943](https://github.com/beraphin/CVE-2017-16943) ### CVE-2017-16995 - [RealBearcat/CVE-2017-16995](https://github.com/RealBearcat/CVE-2017-16995) - [Al1ex/CVE-2017-16995](https://github.com/Al1ex/CVE-2017-16995) - [gugronnier/CVE-2017-16995](https://github.com/gugronnier/CVE-2017-16995) - [senyuuri/cve-2017-16995](https://github.com/senyuuri/cve-2017-16995) - [vnik5287/CVE-2017-16995](https://github.com/vnik5287/CVE-2017-16995) - [littlebin404/CVE-2017-16995](https://github.com/littlebin404/CVE-2017-16995) ### CVE-2017-16997 - [Xiami2012/CVE-2017-16997-poc](https://github.com/Xiami2012/CVE-2017-16997-poc) ### CVE-2017-17099 - [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development) ### CVE-2017-17215 - [1337g/CVE-2017-17215](https://github.com/1337g/CVE-2017-17215) ### CVE-2017-17309 - [exploit-labs/huawei_hg255s_exploit](https://github.com/exploit-labs/huawei_hg255s_exploit) ### CVE-2017-17485 - [RealBearcat/Jackson-CVE-2017-17485](https://github.com/RealBearcat/Jackson-CVE-2017-17485) - [tafamace/CVE-2017-17485](https://github.com/tafamace/CVE-2017-17485) - [x7iaob/cve-2017-17485](https://github.com/x7iaob/cve-2017-17485) ### CVE-2017-17562 - [1337g/CVE-2017-17562](https://github.com/1337g/CVE-2017-17562) - [ivanitlearning/CVE-2017-17562](https://github.com/ivanitlearning/CVE-2017-17562) - [crispy-peppers/Goahead-CVE-2017-17562](https://github.com/crispy-peppers/Goahead-CVE-2017-17562) ### CVE-2017-17692 - [lr3800/CVE-2017-17692](https://github.com/lr3800/CVE-2017-17692) ### CVE-2017-18044 - [securifera/CVE-2017-18044-Exploit](https://github.com/securifera/CVE-2017-18044-Exploit) ### CVE-2017-18345 - [Luth1er/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD](https://github.com/Luth1er/CVE-2017-18345-COM_JOOMANAGER-ARBITRARY-FILE-DOWNLOAD) ### CVE-2017-18486 - [Kc57/JitBit_Helpdesk_Auth_Bypass](https://github.com/Kc57/JitBit_Helpdesk_Auth_Bypass) ### CVE-2017-18635 - [ShielderSec/cve-2017-18635](https://github.com/ShielderSec/cve-2017-18635) ### CVE-2017-2368 - [vincedes3/CVE-2017-2368](https://github.com/vincedes3/CVE-2017-2368) ### CVE-2017-2370 - [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe) - [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe) - [Rootkitsmm/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm/extra_recipe-iOS-10.2) - [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370) ### CVE-2017-2388 - [bazad/IOFireWireFamily-null-deref](https://github.com/bazad/IOFireWireFamily-null-deref) ### CVE-2017-2636 - [alexzorin/cve-2017-2636-el](https://github.com/alexzorin/cve-2017-2636-el) ### CVE-2017-2666 - [tafamace/CVE-2017-2666](https://github.com/tafamace/CVE-2017-2666) ### CVE-2017-2671 - [homjxi0e/CVE-2017-2671](https://github.com/homjxi0e/CVE-2017-2671) ### CVE-2017-2751 - [BaderSZ/CVE-2017-2751](https://github.com/BaderSZ/CVE-2017-2751) ### CVE-2017-2793 - [r0otshell/Detection-for-CVE-2017-2793](https://github.com/r0otshell/Detection-for-CVE-2017-2793) ### CVE-2017-3000 - [dangokyo/CVE-2017-3000](https://github.com/dangokyo/CVE-2017-3000) ### CVE-2017-3066 - [codewhitesec/ColdFusionPwn](https://github.com/codewhitesec/ColdFusionPwn) - [cucadili/CVE-2017-3066](https://github.com/cucadili/CVE-2017-3066) ### CVE-2017-3078 - [homjxi0e/CVE-2017-3078](https://github.com/homjxi0e/CVE-2017-3078) ### CVE-2017-3143 - [saaph/CVE-2017-3143](https://github.com/saaph/CVE-2017-3143) ### CVE-2017-3241 - [xfei3/CVE-2017-3241-POC](https://github.com/xfei3/CVE-2017-3241-POC) ### CVE-2017-3248 - [ianxtianxt/CVE-2017-3248](https://github.com/ianxtianxt/CVE-2017-3248) ### CVE-2017-3506 - [ianxtianxt/CVE-2017-3506](https://github.com/ianxtianxt/CVE-2017-3506) ### CVE-2017-3599 - [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599) ### CVE-2017-3730 - [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730) - [ymmah/OpenSSL-CVE-2017-3730](https://github.com/ymmah/OpenSSL-CVE-2017-3730) ### CVE-2017-3881 - [artkond/cisco-rce](https://github.com/artkond/cisco-rce) - [homjxi0e/CVE-2017-3881-exploit-cisco-](https://github.com/homjxi0e/CVE-2017-3881-exploit-cisco-) - [homjxi0e/CVE-2017-3881-Cisco](https://github.com/homjxi0e/CVE-2017-3881-Cisco) - [zakybstrd21215/PoC-CVE-2017-3881](https://github.com/zakybstrd21215/PoC-CVE-2017-3881) - [1337g/CVE-2017-3881](https://github.com/1337g/CVE-2017-3881) ### CVE-2017-4490 - [homjxi0e/CVE-2017-4490-](https://github.com/homjxi0e/CVE-2017-4490-) - [homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-](https://github.com/homjxi0e/CVE-2017-4490-install-Script-Python-in-Terminal-) ### CVE-2017-4878 - [brianwrf/CVE-2017-4878-Samples](https://github.com/brianwrf/CVE-2017-4878-Samples) ### CVE-2017-4971 - [cved-sources/cve-2017-4971](https://github.com/cved-sources/cve-2017-4971) ### CVE-2017-5005 - [payatu/QuickHeal](https://github.com/payatu/QuickHeal) ### CVE-2017-5007 - [Ang-YC/CVE-2017-5007](https://github.com/Ang-YC/CVE-2017-5007) ### CVE-2017-5123 - [FloatingGuy/CVE-2017-5123](https://github.com/FloatingGuy/CVE-2017-5123) - [0x5068656e6f6c/CVE-2017-5123](https://github.com/0x5068656e6f6c/CVE-2017-5123) - [Synacktiv-contrib/exploiting-cve-2017-5123](https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123) - [teawater/CVE-2017-5123](https://github.com/teawater/CVE-2017-5123) ### CVE-2017-5124 - [Bo0oM/CVE-2017-5124](https://github.com/Bo0oM/CVE-2017-5124) ### CVE-2017-5223 - [cscli/CVE-2017-5223](https://github.com/cscli/CVE-2017-5223) ### CVE-2017-5415 - [649/CVE-2017-5415](https://github.com/649/CVE-2017-5415) ### CVE-2017-5487 - [teambugsbunny/wpUsersScan](https://github.com/teambugsbunny/wpUsersScan) - [R3K1NG/wpUsersScan](https://github.com/R3K1NG/wpUsersScan) - [GeunSam2/CVE-2017-5487](https://github.com/GeunSam2/CVE-2017-5487) ### CVE-2017-5633 - [cardangi/Exploit-CVE-2017-5633](https://github.com/cardangi/Exploit-CVE-2017-5633) ### CVE-2017-5638 - [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045) - [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp) - [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638) - [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS) - [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro) - [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638) - [immunio/apache-struts2-CVE-2017-5638](https://github.com/immunio/apache-struts2-CVE-2017-5638) - [Masahiro-Yamada/OgnlContentTypeRejectorValve](https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve) - [aljazceru/CVE-2017-5638-Apache-Struts2](https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2) - [sjitech/test_struts2_vulnerability_CVE-2017-5638](https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638) - [jrrombaldo/CVE-2017-5638](https://github.com/jrrombaldo/CVE-2017-5638) - [random-robbie/CVE-2017-5638](https://github.com/random-robbie/CVE-2017-5638) - [initconf/CVE-2017-5638_struts](https://github.com/initconf/CVE-2017-5638_struts) - [mazen160/struts-pwn](https://github.com/mazen160/struts-pwn) - [ret2got/Struts-Apache-ExploitPack](https://github.com/ret2got/Struts-Apache-ExploitPack) - [lolwaleet/ExpStruts](https://github.com/lolwaleet/ExpStruts) - [oktavianto/CVE-2017-5638-Apache-Struts2](https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2) - [jrrdev/cve-2017-5638](https://github.com/jrrdev/cve-2017-5638) - [opt9/Strutshock](https://github.com/opt9/Strutshock) - [falcon-lnhg/StrutsShell](https://github.com/falcon-lnhg/StrutsShell) - [bhagdave/CVE-2017-5638](https://github.com/bhagdave/CVE-2017-5638) - [jas502n/st2-046-poc](https://github.com/jas502n/st2-046-poc) - [KarzsGHR/S2-046_S2-045_POC](https://github.com/KarzsGHR/S2-046_S2-045_POC) - [gsfish/S2-Reaper](https://github.com/gsfish/S2-Reaper) - [mcassano/cve-2017-5638](https://github.com/mcassano/cve-2017-5638) - [opt9/Strutscli](https://github.com/opt9/Strutscli) - [tahmed11/strutsy](https://github.com/tahmed11/strutsy) - [payatu/CVE-2017-5638](https://github.com/payatu/CVE-2017-5638) - [Aasron/Struts2-045-Exp](https://github.com/Aasron/Struts2-045-Exp) - [SpiderMate/Stutsfi](https://github.com/SpiderMate/Stutsfi) - [jpacora/Struts2Shell](https://github.com/jpacora/Struts2Shell) - [Reslient/Apache-Struts](https://github.com/Reslient/Apache-Struts) - [AndreasKl/CVE-2017-5638](https://github.com/AndreasKl/CVE-2017-5638) - [riyazwalikar/struts-rce-cve-2017-5638](https://github.com/riyazwalikar/struts-rce-cve-2017-5638) - [homjxi0e/CVE-2017-5638](https://github.com/homjxi0e/CVE-2017-5638) - [eeehit/CVE-2017-5638](https://github.com/eeehit/CVE-2017-5638) - [r0otshell/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/r0otshell/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner) - [r0otshell/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638](https://github.com/r0otshell/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638) - [R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-](https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-) - [Xhendos/CVE-2017-5638](https://github.com/Xhendos/CVE-2017-5638) - [TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner](https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner) - [RealBearcat/S2-045](https://github.com/RealBearcat/S2-045) - [invisiblethreat/strutser](https://github.com/invisiblethreat/strutser) - [lizhi16/CVE-2017-5638](https://github.com/lizhi16/CVE-2017-5638) - [donaldashdown/Common-Vulnerability-and-Exploit](https://github.com/donaldashdown/Common-Vulnerability-and-Exploit) - [grant100/cybersecurity-struts2](https://github.com/grant100/cybersecurity-struts2) - [cafnet/apache-struts-v2-CVE-2017-5638](https://github.com/cafnet/apache-struts-v2-CVE-2017-5638) - [0x00-0x00/CVE-2017-5638](https://github.com/0x00-0x00/CVE-2017-5638) - [m3ssap0/struts2_cve-2017-5638](https://github.com/m3ssap0/struts2_cve-2017-5638) - [Greynad/struts2-jakarta-inject](https://github.com/Greynad/struts2-jakarta-inject) - [ggolawski/struts-rce](https://github.com/ggolawski/struts-rce) - [win3zz/CVE-2017-5638](https://github.com/win3zz/CVE-2017-5638) - [leandrocamposcardoso/CVE-2017-5638-Mass-Exploit](https://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-Exploit) - [Iletee/struts2-rce](https://github.com/Iletee/struts2-rce) - [andypitcher/check_struts](https://github.com/andypitcher/check_struts) - [un4ckn0wl3z/CVE-2017-5638](https://github.com/un4ckn0wl3z/CVE-2017-5638) - [colorblindpentester/CVE-2017-5638](https://github.com/colorblindpentester/CVE-2017-5638) - [injcristianrojas/cve-2017-5638](https://github.com/injcristianrojas/cve-2017-5638) ### CVE-2017-5645 - [pimps/CVE-2017-5645](https://github.com/pimps/CVE-2017-5645) ### CVE-2017-5689 - [CerberusSecurity/CVE-2017-5689](https://github.com/CerberusSecurity/CVE-2017-5689) - [x1sec/amthoneypot](https://github.com/x1sec/amthoneypot) - [Bijaye/intel_amt_bypass](https://github.com/Bijaye/intel_amt_bypass) - [prototux/amt-bypass-test](https://github.com/prototux/amt-bypass-test) - [embedi/amt_auth_bypass_poc](https://github.com/embedi/amt_auth_bypass_poc) ### CVE-2017-5693 - [nallar/Puma6Fail](https://github.com/nallar/Puma6Fail) ### CVE-2017-5715 - [opsxcq/exploit-cve-2017-5715](https://github.com/opsxcq/exploit-cve-2017-5715) - [mathse/meltdown-spectre-bios-list](https://github.com/mathse/meltdown-spectre-bios-list) - [GregAskew/SpeculativeExecutionAssessment](https://github.com/GregAskew/SpeculativeExecutionAssessment) - [dmo2118/retpoline-audit](https://github.com/dmo2118/retpoline-audit) ### CVE-2017-5721 - [embedi/smm_usbrt_poc](https://github.com/embedi/smm_usbrt_poc) ### CVE-2017-5753 - [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack) - [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC) - [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example) - [xsscx/cve-2017-5753](https://github.com/xsscx/cve-2017-5753) - [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo) - [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope) ### CVE-2017-5754 - [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck) - [raphaelsc/Am-I-affected-by-Meltdown](https://github.com/raphaelsc/Am-I-affected-by-Meltdown) - [Viralmaniar/In-Spectre-Meltdown](https://github.com/Viralmaniar/In-Spectre-Meltdown) - [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown) - [zzado/Meltdown](https://github.com/zzado/Meltdown) - [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner) ### CVE-2017-5792 - [RealBearcat/HPE-iMC-7.3-RMI-Java-Deserialization](https://github.com/RealBearcat/HPE-iMC-7.3-RMI-Java-Deserialization) ### CVE-2017-6008 - [cbayet/Exploit-CVE-2017-6008](https://github.com/cbayet/Exploit-CVE-2017-6008) ### CVE-2017-6074 - [node1392/Linux-Kernel-Vulnerability](https://github.com/node1392/Linux-Kernel-Vulnerability) ### CVE-2017-6079 - [MostafaSoliman/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit](https://github.com/MostafaSoliman/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit) ### CVE-2017-6090 - [jlk/exploit-CVE-2017-6090](https://github.com/jlk/exploit-CVE-2017-6090) ### CVE-2017-6206 - [varangamin/CVE-2017-6206](https://github.com/varangamin/CVE-2017-6206) ### CVE-2017-6370 - [faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request](https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request) ### CVE-2017-6558 - [GemGeorge/iBall-UTStar-CVEChecker](https://github.com/GemGeorge/iBall-UTStar-CVEChecker) ### CVE-2017-6736 - [GarnetSunset/CiscoSpectreTakeover](https://github.com/GarnetSunset/CiscoSpectreTakeover) - [GarnetSunset/CiscoIOSSNMPToolkit](https://github.com/GarnetSunset/CiscoIOSSNMPToolkit) ### CVE-2017-6913 - [gquere/CVE-2017-6913](https://github.com/gquere/CVE-2017-6913) ### CVE-2017-6971 - [patrickfreed/nfsen-exploit](https://github.com/patrickfreed/nfsen-exploit) - [KeyStrOke95/nfsen_1.3.7_CVE-2017-6971](https://github.com/KeyStrOke95/nfsen_1.3.7_CVE-2017-6971) ### CVE-2017-7038 - [ansjdnakjdnajkd/CVE-2017-7038](https://github.com/ansjdnakjdnajkd/CVE-2017-7038) ### CVE-2017-7047 - [JosephShenton/Triple_Fetch-Kernel-Creds](https://github.com/JosephShenton/Triple_Fetch-Kernel-Creds) - [q1f3/Triple_fetch](https://github.com/q1f3/Triple_fetch) ### CVE-2017-7061 - [TheLoneHaxor/jailbreakme103](https://github.com/TheLoneHaxor/jailbreakme103) ### CVE-2017-7089 - [Bo0oM/CVE-2017-7089](https://github.com/Bo0oM/CVE-2017-7089) - [aymankhalfatni/Safari_Mac](https://github.com/aymankhalfatni/Safari_Mac) ### CVE-2017-7092 - [xuechiyaobai/CVE-2017-7092-PoC](https://github.com/xuechiyaobai/CVE-2017-7092-PoC) ### CVE-2017-7173 - [bazad/sysctl_coalition_get_pid_list-dos](https://github.com/bazad/sysctl_coalition_get_pid_list-dos) ### CVE-2017-7184 - [rockl/cve-2017-7184](https://github.com/rockl/cve-2017-7184) - [rockl/cve-2017-7184-bak](https://github.com/rockl/cve-2017-7184-bak) ### CVE-2017-7188 - [faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC](https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC) ### CVE-2017-7269 - [eliuha/webdav_exploit](https://github.com/eliuha/webdav_exploit) - [lcatro/CVE-2017-7269-Echo-PoC](https://github.com/lcatro/CVE-2017-7269-Echo-PoC) - [caicai1355/CVE-2017-7269-exploit](https://github.com/caicai1355/CVE-2017-7269-exploit) - [M1a0rz/CVE-2017-7269](https://github.com/M1a0rz/CVE-2017-7269) - [whiteHat001/cve-2017-7269picture](https://github.com/whiteHat001/cve-2017-7269picture) - [zcgonvh/cve-2017-7269](https://github.com/zcgonvh/cve-2017-7269) - [jrrombaldo/CVE-2017-7269](https://github.com/jrrombaldo/CVE-2017-7269) - [g0rx/iis6-exploit-2017-CVE-2017-7269](https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269) - [slimpagey/IIS_6.0_WebDAV_Ruby](https://github.com/slimpagey/IIS_6.0_WebDAV_Ruby) - [homjxi0e/cve-2017-7269](https://github.com/homjxi0e/cve-2017-7269) - [xiaovpn/CVE-2017-7269](https://github.com/xiaovpn/CVE-2017-7269) - [zcgonvh/cve-2017-7269-tool](https://github.com/zcgonvh/cve-2017-7269-tool) - [mirrorblack/CVE-2017-7269](https://github.com/mirrorblack/CVE-2017-7269) - [Al1ex/CVE-2017-7269](https://github.com/Al1ex/CVE-2017-7269) ### CVE-2017-7374 - [ww9210/cve-2017-7374](https://github.com/ww9210/cve-2017-7374) ### CVE-2017-7472 - [homjxi0e/CVE-2017-7472](https://github.com/homjxi0e/CVE-2017-7472) ### CVE-2017-7494 - [omri9741/cve-2017-7494](https://github.com/omri9741/cve-2017-7494) - [homjxi0e/CVE-2017-7494](https://github.com/homjxi0e/CVE-2017-7494) - [opsxcq/exploit-CVE-2017-7494](https://github.com/opsxcq/exploit-CVE-2017-7494) - [Waffles-2/SambaCry](https://github.com/Waffles-2/SambaCry) - [brianwrf/SambaHunter](https://github.com/brianwrf/SambaHunter) - [joxeankoret/CVE-2017-7494](https://github.com/joxeankoret/CVE-2017-7494) - [Zer0d0y/Samba-CVE-2017-7494](https://github.com/Zer0d0y/Samba-CVE-2017-7494) - [incredible1yu/CVE-2017-7494](https://github.com/incredible1yu/CVE-2017-7494) - [cved-sources/cve-2017-7494](https://github.com/cved-sources/cve-2017-7494) - [john-80/cve-2017-7494](https://github.com/john-80/cve-2017-7494) ### CVE-2017-7525 - [SecureSkyTechnology/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095](https://github.com/SecureSkyTechnology/study-struts2-s2-054_055-jackson-cve-2017-7525_cve-2017-15095) - [RealBearcat/S2-055](https://github.com/RealBearcat/S2-055) - [JavanXD/Demo-Exploit-Jackson-RCE](https://github.com/JavanXD/Demo-Exploit-Jackson-RCE) - [47bwy/CVE-2017-7525](https://github.com/47bwy/CVE-2017-7525) - [BassinD/jackson-RCE](https://github.com/BassinD/jackson-RCE) ### CVE-2017-7529 - [liusec/CVE-2017-7529](https://github.com/liusec/CVE-2017-7529) - [en0f/CVE-2017-7529_PoC](https://github.com/en0f/CVE-2017-7529_PoC) - [cved-sources/cve-2017-7529](https://github.com/cved-sources/cve-2017-7529) - [mpalonso/ferni](https://github.com/mpalonso/ferni) - [MaxSecurity/CVE-2017-7529-POC](https://github.com/MaxSecurity/CVE-2017-7529-POC) ### CVE-2017-7648 - [notmot/CVE-2017-7648.](https://github.com/notmot/CVE-2017-7648.) ### CVE-2017-7679 - [snknritr/CVE-2017-7679-in-python](https://github.com/snknritr/CVE-2017-7679-in-python) ### CVE-2017-7912 - [homjxi0e/CVE-2017-7912_Sneak](https://github.com/homjxi0e/CVE-2017-7912_Sneak) ### CVE-2017-7998 - [homjxi0e/CVE-2017-7998](https://github.com/homjxi0e/CVE-2017-7998) ### CVE-2017-8046 - [Soontao/CVE-2017-8046-DEMO](https://github.com/Soontao/CVE-2017-8046-DEMO) - [sj/spring-data-rest-CVE-2017-8046](https://github.com/sj/spring-data-rest-CVE-2017-8046) - [m3ssap0/SpringBreakVulnerableApp](https://github.com/m3ssap0/SpringBreakVulnerableApp) - [m3ssap0/spring-break_cve-2017-8046](https://github.com/m3ssap0/spring-break_cve-2017-8046) - [FixYourFace/SpringBreakPoC](https://github.com/FixYourFace/SpringBreakPoC) - [jkutner/spring-break-cve-2017-8046](https://github.com/jkutner/spring-break-cve-2017-8046) - [bkhablenko/CVE-2017-8046](https://github.com/bkhablenko/CVE-2017-8046) - [cved-sources/cve-2017-8046](https://github.com/cved-sources/cve-2017-8046) - [jsotiro/VulnerableSpringDataRest](https://github.com/jsotiro/VulnerableSpringDataRest) ### CVE-2017-8295 - [homjxi0e/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset](https://github.com/homjxi0e/CVE-2017-8295-WordPress-4.7.4---Unauthorized-Password-Reset) - [alash3al/wp-allowed-hosts](https://github.com/alash3al/wp-allowed-hosts) - [cyberheartmi9/CVE-2017-8295](https://github.com/cyberheartmi9/CVE-2017-8295) ### CVE-2017-8382 - [faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc](https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc) ### CVE-2017-8464 - [Elm0D/CVE-2017-8464](https://github.com/Elm0D/CVE-2017-8464) - [3gstudent/CVE-2017-8464-EXP](https://github.com/3gstudent/CVE-2017-8464-EXP) - [Securitykid/CVE-2017-8464-exp-generator](https://github.com/Securitykid/CVE-2017-8464-exp-generator) - [X-Vector/usbhijacking](https://github.com/X-Vector/usbhijacking) - [xssfile/CVE-2017-8464-EXP](https://github.com/xssfile/CVE-2017-8464-EXP) ### CVE-2017-8465 - [nghiadt1098/CVE-2017-8465](https://github.com/nghiadt1098/CVE-2017-8465) ### CVE-2017-8529 - [Lynggaard91/windows2016fixCVE-2017-8529](https://github.com/Lynggaard91/windows2016fixCVE-2017-8529) - [sfitpro/cve-2017-8529](https://github.com/sfitpro/cve-2017-8529) ### CVE-2017-8543 - [americanhanko/windows-security-cve-2017-8543](https://github.com/americanhanko/windows-security-cve-2017-8543) ### CVE-2017-8570 - [temesgeny/ppsx-file-generator](https://github.com/temesgeny/ppsx-file-generator) - [rxwx/CVE-2017-8570](https://github.com/rxwx/CVE-2017-8570) - [MaxSecurity/Office-CVE-2017-8570](https://github.com/MaxSecurity/Office-CVE-2017-8570) - [SwordSheath/CVE-2017-8570](https://github.com/SwordSheath/CVE-2017-8570) - [Drac0nids/CVE-2017-8570](https://github.com/Drac0nids/CVE-2017-8570) - [930201676/CVE-2017-8570](https://github.com/930201676/CVE-2017-8570) ### CVE-2017-8625 - [homjxi0e/CVE-2017-8625_Bypass_UMCI](https://github.com/homjxi0e/CVE-2017-8625_Bypass_UMCI) ### CVE-2017-8641 - [homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject](https://github.com/homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject) ### CVE-2017-8759 - [Voulnet/CVE-2017-8759-Exploit-sample](https://github.com/Voulnet/CVE-2017-8759-Exploit-sample) - [nccgroup/CVE-2017-8759](https://github.com/nccgroup/CVE-2017-8759) - [vysecurity/CVE-2017-8759](https://github.com/vysecurity/CVE-2017-8759) - [BasuCert/CVE-2017-8759](https://github.com/BasuCert/CVE-2017-8759) - [tahisaad6/CVE-2017-8759-Exploit-sample2](https://github.com/tahisaad6/CVE-2017-8759-Exploit-sample2) - [homjxi0e/CVE-2017-8759_-SOAP_WSDL](https://github.com/homjxi0e/CVE-2017-8759_-SOAP_WSDL) - [bhdresh/CVE-2017-8759](https://github.com/bhdresh/CVE-2017-8759) - [Lz1y/CVE-2017-8759](https://github.com/Lz1y/CVE-2017-8759) - [JonasUliana/CVE-2017-8759](https://github.com/JonasUliana/CVE-2017-8759) - [Securitykid/CVE-2017-8759](https://github.com/Securitykid/CVE-2017-8759) - [ashr/CVE-2017-8759-exploits](https://github.com/ashr/CVE-2017-8759-exploits) - [l0n3rs/CVE-2017-8759](https://github.com/l0n3rs/CVE-2017-8759) - [ChaitanyaHaritash/CVE-2017-8759](https://github.com/ChaitanyaHaritash/CVE-2017-8759) - [smashinu/CVE-2017-8759Expoit](https://github.com/smashinu/CVE-2017-8759Expoit) - [adeljck/CVE-2017-8759](https://github.com/adeljck/CVE-2017-8759) - [zhengkook/CVE-2017-8759](https://github.com/zhengkook/CVE-2017-8759) ### CVE-2017-8760 - [Voraka/cve-2017-8760](https://github.com/Voraka/cve-2017-8760) ### CVE-2017-8779 - [drbothen/GO-RPCBOMB](https://github.com/drbothen/GO-RPCBOMB) ### CVE-2017-8802 - [ozzi-/Zimbra-CVE-2017-8802-Hotifx](https://github.com/ozzi-/Zimbra-CVE-2017-8802-Hotifx) ### CVE-2017-8809 - [motikan2010/CVE-2017-8809_MediaWiki_RFD](https://github.com/motikan2010/CVE-2017-8809_MediaWiki_RFD) ### CVE-2017-8890 - [beraphin/CVE-2017-8890](https://github.com/beraphin/CVE-2017-8890) - [thinkycx/CVE-2017-8890](https://github.com/thinkycx/CVE-2017-8890) - [7043mcgeep/cve-2017-8890-msf](https://github.com/7043mcgeep/cve-2017-8890-msf) ### CVE-2017-8917 - [brianwrf/Joomla3.7-SQLi-CVE-2017-8917](https://github.com/brianwrf/Joomla3.7-SQLi-CVE-2017-8917) - [stefanlucas/Exploit-Joomla](https://github.com/stefanlucas/Exploit-Joomla) - [cved-sources/cve-2017-8917](https://github.com/cved-sources/cve-2017-8917) ### CVE-2017-9097 - [ezelf/AntiWeb_testing-Suite](https://github.com/ezelf/AntiWeb_testing-Suite) ### CVE-2017-9101 - [jasperla/CVE-2017-9101](https://github.com/jasperla/CVE-2017-9101) ### CVE-2017-9248 - [bao7uo/dp_crypto](https://github.com/bao7uo/dp_crypto) - [capt-meelo/Telewreck](https://github.com/capt-meelo/Telewreck) - [ictnamanh/CVE-2017-9248](https://github.com/ictnamanh/CVE-2017-9248) - [shacojx/dp](https://github.com/shacojx/dp) ### CVE-2017-9417 - [mailinneberg/Broadpwn](https://github.com/mailinneberg/Broadpwn) ### CVE-2017-9430 - [homjxi0e/CVE-2017-9430](https://github.com/homjxi0e/CVE-2017-9430) - [j0lama/Dnstracer-1.9-Fix](https://github.com/j0lama/Dnstracer-1.9-Fix) ### CVE-2017-9476 - [wiire-a/CVE-2017-9476](https://github.com/wiire-a/CVE-2017-9476) ### CVE-2017-9506 - [random-robbie/Jira-Scan](https://github.com/random-robbie/Jira-Scan) - [pwn1sher/jira-ssrf](https://github.com/pwn1sher/jira-ssrf) ### CVE-2017-9544 - [adenkiewicz/CVE-2017-9544](https://github.com/adenkiewicz/CVE-2017-9544) ### CVE-2017-9554 - [rfcl/Synology-DiskStation-User-Enumeration-CVE-2017-9554-](https://github.com/rfcl/Synology-DiskStation-User-Enumeration-CVE-2017-9554-) ### CVE-2017-9606 - [Houl777/CVE-2017-9606](https://github.com/Houl777/CVE-2017-9606) ### CVE-2017-9609 - [faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc) ### CVE-2017-9779 - [homjxi0e/CVE-2017-9779](https://github.com/homjxi0e/CVE-2017-9779) ### CVE-2017-9791 - [IanSmith123/s2-048](https://github.com/IanSmith123/s2-048) - [dragoneeg/Struts2-048](https://github.com/dragoneeg/Struts2-048) - [xfer0/CVE-2017-9791](https://github.com/xfer0/CVE-2017-9791) ### CVE-2017-9798 - [nitrado/CVE-2017-9798](https://github.com/nitrado/CVE-2017-9798) - [pabloec20/optionsbleed](https://github.com/pabloec20/optionsbleed) - [l0n3rs/CVE-2017-9798](https://github.com/l0n3rs/CVE-2017-9798) - [brokensound77/OptionsBleed-POC-Scanner](https://github.com/brokensound77/OptionsBleed-POC-Scanner) ### CVE-2017-9805 - [luc10/struts-rce-cve-2017-9805](https://github.com/luc10/struts-rce-cve-2017-9805) - [hahwul/struts2-rce-cve-2017-9805-ruby](https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby) - [mazen160/struts-pwn_CVE-2017-9805](https://github.com/mazen160/struts-pwn_CVE-2017-9805) - [Lone-Ranger/apache-struts-pwn_CVE-2017-9805](https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805) - [RealBearcat/S2-052](https://github.com/RealBearcat/S2-052) - [0x00-0x00/-CVE-2017-9805](https://github.com/0x00-0x00/-CVE-2017-9805) - [chrisjd20/cve-2017-9805.py](https://github.com/chrisjd20/cve-2017-9805.py) - [UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-](https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-) - [UbuntuStrike/CVE-2017-9805_Struts_Fuzz_N_Sploit](https://github.com/UbuntuStrike/CVE-2017-9805_Struts_Fuzz_N_Sploit) ### CVE-2017-9830 - [securifera/CVE-2017-9830](https://github.com/securifera/CVE-2017-9830) ### CVE-2017-9841 - [b3rksecurity/CVE-2017-9841](https://github.com/b3rksecurity/CVE-2017-9841) - [mbrasile/CVE-2017-9841](https://github.com/mbrasile/CVE-2017-9841) ### CVE-2017-98505 - [mike-williams/Struts2Vuln](https://github.com/mike-williams/Struts2Vuln) ### CVE-2017-9934 - [xyringe/CVE-2017-9934](https://github.com/xyringe/CVE-2017-9934) ### CVE-2017-9999 - [homjxi0e/CVE-2017-9999_bypassing_General_Firefox](https://github.com/homjxi0e/CVE-2017-9999_bypassing_General_Firefox) ## 2018 ### CVE-2018-0101 - [1337g/CVE-2018-0101-DOS-POC](https://github.com/1337g/CVE-2018-0101-DOS-POC) - [Cymmetria/ciscoasa_honeypot](https://github.com/Cymmetria/ciscoasa_honeypot) ### CVE-2018-0114 - [zi0Black/POC-CVE-2018-0114](https://github.com/zi0Black/POC-CVE-2018-0114) ### CVE-2018-0202 - [jaychowjingjie/CVE-2018-0202](https://github.com/jaychowjingjie/CVE-2018-0202) ### CVE-2018-0296 - [milo2012/CVE-2018-0296](https://github.com/milo2012/CVE-2018-0296) - [yassineaboukir/CVE-2018-0296](https://github.com/yassineaboukir/CVE-2018-0296) - [bhenner1/CVE-2018-0296](https://github.com/bhenner1/CVE-2018-0296) - [irbishop/CVE-2018-0296](https://github.com/irbishop/CVE-2018-0296) - [qiantu88/CVE-2018-0296](https://github.com/qiantu88/CVE-2018-0296) ### CVE-2018-0708 - [ntkernel0/CVE-2019-0708](https://github.com/ntkernel0/CVE-2019-0708) ### CVE-2018-0802 - [zldww2011/CVE-2018-0802_POC](https://github.com/zldww2011/CVE-2018-0802_POC) - [rxwx/CVE-2018-0802](https://github.com/rxwx/CVE-2018-0802) - [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802) - [denmilu/CVE-2018-0802_CVE-2017-11882](https://github.com/denmilu/CVE-2018-0802_CVE-2017-11882) ### CVE-2018-0824 - [codewhitesec/UnmarshalPwn](https://github.com/codewhitesec/UnmarshalPwn) ### CVE-2018-0833 - [RealBearcat/CVE-2018-0833](https://github.com/RealBearcat/CVE-2018-0833) ### CVE-2018-0886 - [preempt/credssp](https://github.com/preempt/credssp) ### CVE-2018-0952 - [atredispartners/CVE-2018-0952-SystemCollector](https://github.com/atredispartners/CVE-2018-0952-SystemCollector) ### CVE-2018-1000001 - [0x00-0x00/CVE-2018-1000001](https://github.com/0x00-0x00/CVE-2018-1000001) ### CVE-2018-1000006 - [CHYbeta/CVE-2018-1000006-DEMO](https://github.com/CHYbeta/CVE-2018-1000006-DEMO) ### CVE-2018-1000007 - [0xThiebaut/CVE-2018-1000007](https://github.com/0xThiebaut/CVE-2018-1000007) ### CVE-2018-1000030 - [tylepr96/CVE-2018-1000030](https://github.com/tylepr96/CVE-2018-1000030) ### CVE-2018-1000082 - [SECFORCE/CVE-2018-1000082-exploit](https://github.com/SECFORCE/CVE-2018-1000082-exploit) ### CVE-2018-1000117 - [1337r00t/CVE-2018-1000117-Exploit](https://github.com/1337r00t/CVE-2018-1000117-Exploit) ### CVE-2018-1000134 - [dragotime/cve-2018-1000134](https://github.com/dragotime/cve-2018-1000134) ### CVE-2018-1000140 - [s0/rsyslog-librelp-CVE-2018-1000140](https://github.com/s0/rsyslog-librelp-CVE-2018-1000140) - [s0/rsyslog-librelp-CVE-2018-1000140-fixed](https://github.com/s0/rsyslog-librelp-CVE-2018-1000140-fixed) ### CVE-2018-1000199 - [dsfau/CVE-2018-1000199](https://github.com/dsfau/CVE-2018-1000199) ### CVE-2018-1000224 - [zann1x/ITS](https://github.com/zann1x/ITS) ### CVE-2018-1000529 - [martinfrancois/CVE-2018-1000529](https://github.com/martinfrancois/CVE-2018-1000529) ### CVE-2018-1000802 - [tna0y/CVE-2018-1000802-PoC](https://github.com/tna0y/CVE-2018-1000802-PoC) ### CVE-2018-1000861 - [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION) ### CVE-2018-1002105 - [gravitational/cve-2018-1002105](https://github.com/gravitational/cve-2018-1002105) - [evict/poc_CVE-2018-1002105](https://github.com/evict/poc_CVE-2018-1002105) - [imlzw/Kubernetes-1.12.3-all-auto-install](https://github.com/imlzw/Kubernetes-1.12.3-all-auto-install) - [bgeesaman/cve-2018-1002105](https://github.com/bgeesaman/cve-2018-1002105) - [mdnix/cve-2018-1002105](https://github.com/mdnix/cve-2018-1002105) ### CVE-2018-1010 - [ymgh96/Detecting-the-patch-of-CVE-2018-1010](https://github.com/ymgh96/Detecting-the-patch-of-CVE-2018-1010) ### CVE-2018-10118 - [GeunSam2/CVE-2018-10118](https://github.com/GeunSam2/CVE-2018-10118) ### CVE-2018-1026 - [ymgh96/Detecting-the-CVE-2018-1026-and-its-patch](https://github.com/ymgh96/Detecting-the-CVE-2018-1026-and-its-patch) ### CVE-2018-10299 - [phzietsman/batchOverflow](https://github.com/phzietsman/batchOverflow) ### CVE-2018-10467 - [alt3kx/CVE-2018-10467](https://github.com/alt3kx/CVE-2018-10467) ### CVE-2018-10517 - [0x00-0x00/CVE-2018-10517](https://github.com/0x00-0x00/CVE-2018-10517) ### CVE-2018-10546 - [dsfau/CVE-2018-10546](https://github.com/dsfau/CVE-2018-10546) ### CVE-2018-1056 - [pollonegro/Gpon-Routers](https://github.com/pollonegro/Gpon-Routers) ### CVE-2018-10561 - [vhackor/GPON-home-routers-Exploit](https://github.com/vhackor/GPON-home-routers-Exploit) ### CVE-2018-10562 - [f3d0x0/GPON](https://github.com/f3d0x0/GPON) - [649/Pingpon-Exploit](https://github.com/649/Pingpon-Exploit) - [Choudai/GPON-LOADER](https://github.com/Choudai/GPON-LOADER) - [c0ld1/GPON_RCE](https://github.com/c0ld1/GPON_RCE) - [ATpiu/CVE-2018-10562](https://github.com/ATpiu/CVE-2018-10562) ### CVE-2018-10583 - [TaharAmine/CVE-2018-10583](https://github.com/TaharAmine/CVE-2018-10583) ### CVE-2018-10715 - [alt3kx/CVE-2018-10715](https://github.com/alt3kx/CVE-2018-10715) ### CVE-2018-10732 - [alt3kx/CVE-2018-10732](https://github.com/alt3kx/CVE-2018-10732) ### CVE-2018-10821 - [BalvinderSingh23/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3](https://github.com/BalvinderSingh23/Cross-Site-Scripting-Reflected-XSS-Vulnerability-in-blackcatcms_v1.3) ### CVE-2018-1088 - [MauroEldritch/GEVAUDAN](https://github.com/MauroEldritch/GEVAUDAN) ### CVE-2018-10920 - [shutingrz/CVE-2018-10920_PoC](https://github.com/shutingrz/CVE-2018-10920_PoC) ### CVE-2018-10933 - [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933) - [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933) - [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933) - [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933) - [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner) - [denmilu/CVE-2018-10933_ssh](https://github.com/denmilu/CVE-2018-10933_ssh) - [trbpnd/bpnd-libssh](https://github.com/trbpnd/bpnd-libssh) - [denmilu/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/denmilu/CVE-2018-10933-libSSH-Authentication-Bypass) - [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933) - [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933) - [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933) - [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933) - [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc) - [IDX4CKS/CVE-2018-10933_Scanner](https://github.com/IDX4CKS/CVE-2018-10933_Scanner) - [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933) - [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933) - [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933) - [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933) - [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933) - [ivanacostarubio/libssh-scanner](https://github.com/ivanacostarubio/libssh-scanner) - [throwawayaccount12312312/precompiled-CVE-2018-10933](https://github.com/throwawayaccount12312312/precompiled-CVE-2018-10933) - [ensimag-security/CVE-2018-10933](https://github.com/ensimag-security/CVE-2018-10933) - [Ad1bDaw/libSSH-bypass](https://github.com/Ad1bDaw/libSSH-bypass) - [sambiyal/CVE-2018-10933-POC](https://github.com/sambiyal/CVE-2018-10933-POC) - [nikhil1232/LibSSH-Authentication-Bypass](https://github.com/nikhil1232/LibSSH-Authentication-Bypass) - [Kurlee/LibSSH-exploit](https://github.com/Kurlee/LibSSH-exploit) - [crispy-peppers/Libssh-server-CVE-2018-10933](https://github.com/crispy-peppers/Libssh-server-CVE-2018-10933) ### CVE-2018-10936 - [tafamace/CVE-2018-10936](https://github.com/tafamace/CVE-2018-10936) ### CVE-2018-10949 - [0x00-0x00/CVE-2018-10949](https://github.com/0x00-0x00/CVE-2018-10949) ### CVE-2018-1111 - [knqyf263/CVE-2018-1111](https://github.com/knqyf263/CVE-2018-1111) - [kkirsche/CVE-2018-1111](https://github.com/kkirsche/CVE-2018-1111) ### CVE-2018-11235 - [Rogdham/CVE-2018-11235](https://github.com/Rogdham/CVE-2018-11235) - [vmotos/CVE-2018-11235](https://github.com/vmotos/CVE-2018-11235) - [Choihosu/cve-2018-11235](https://github.com/Choihosu/cve-2018-11235) - [CHYbeta/CVE-2018-11235-DEMO](https://github.com/CHYbeta/CVE-2018-11235-DEMO) - [Kiss-sh0t/CVE-2018-11235-poc](https://github.com/Kiss-sh0t/CVE-2018-11235-poc) - [H0K5/clone_and_pwn](https://github.com/H0K5/clone_and_pwn) - [knqyf263/CVE-2018-11235](https://github.com/knqyf263/CVE-2018-11235) - [excfergodst/git-RCE](https://github.com/excfergodst/git-RCE) - [ygouzerh/CVE-2018-11235](https://github.com/ygouzerh/CVE-2018-11235) - [qweraqq/CVE-2018-11235-Git-Submodule-CE](https://github.com/qweraqq/CVE-2018-11235-Git-Submodule-CE) - [jhswartz/CVE-2018-11235](https://github.com/jhswartz/CVE-2018-11235) - [AnonymKing/CVE-2018-11235](https://github.com/AnonymKing/CVE-2018-11235) - [morhax/CVE-2018-11235](https://github.com/morhax/CVE-2018-11235) - [cchang27/CVE-2018-11235-test](https://github.com/cchang27/CVE-2018-11235-test) ### CVE-2018-11236 - [evilmiracle/CVE-2018-11236](https://github.com/evilmiracle/CVE-2018-11236) ### CVE-2018-11311 - [EmreOvunc/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password](https://github.com/EmreOvunc/mySCADA-myPRO-7-Hardcoded-FTP-Username-and-Password) ### CVE-2018-1133 - [darrynten/MoodleExploit](https://github.com/darrynten/MoodleExploit) - [M4LV0/MOODLE-3.X-Remote-Code-Execution](https://github.com/M4LV0/MOODLE-3.X-Remote-Code-Execution) ### CVE-2018-11450 - [LucvanDonk/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability](https://github.com/LucvanDonk/Siemens-Siemens-PLM-Software-TEAMCENTER-Reflected-Cross-Site-Scripting-XSS-vulnerability) ### CVE-2018-11510 - [mefulton/CVE-2018-11510](https://github.com/mefulton/CVE-2018-11510) ### CVE-2018-11517 - [EmreOvunc/mySCADA-myPRO-7-projectID-Disclosure](https://github.com/EmreOvunc/mySCADA-myPRO-7-projectID-Disclosure) ### CVE-2018-11564 - [GeunSam2/CVE-2018-11564](https://github.com/GeunSam2/CVE-2018-11564) ### CVE-2018-11631 - [xMagass/bandexploit](https://github.com/xMagass/bandexploit) ### CVE-2018-11686 - [mpgn/CVE-2018-11686](https://github.com/mpgn/CVE-2018-11686) ### CVE-2018-11759 - [immunIT/CVE-2018-11759](https://github.com/immunIT/CVE-2018-11759) - [Jul10l1r4/Identificador-CVE-2018-11759](https://github.com/Jul10l1r4/Identificador-CVE-2018-11759) ### CVE-2018-11761 - [brianwrf/CVE-2018-11761](https://github.com/brianwrf/CVE-2018-11761) ### CVE-2018-11770 - [ivanitlearning/CVE-2018-11770](https://github.com/ivanitlearning/CVE-2018-11770) ### CVE-2018-11776 - [trbpnd/CVE-2018-11776](https://github.com/trbpnd/CVE-2018-11776) - [xfox64x/CVE-2018-11776](https://github.com/xfox64x/CVE-2018-11776) - [jiguangin/CVE-2018-11776](https://github.com/jiguangin/CVE-2018-11776) - [hook-s3c/CVE-2018-11776-Python-PoC](https://github.com/hook-s3c/CVE-2018-11776-Python-PoC) - [mazen160/struts-pwn_CVE-2018-11776](https://github.com/mazen160/struts-pwn_CVE-2018-11776) - [bhdresh/CVE-2018-11776](https://github.com/bhdresh/CVE-2018-11776) - [knqyf263/CVE-2018-11776](https://github.com/knqyf263/CVE-2018-11776) - [Ekultek/Strutter](https://github.com/Ekultek/Strutter) - [tuxotron/cve-2018-11776-docker](https://github.com/tuxotron/cve-2018-11776-docker) - [brianwrf/S2-057-CVE-2018-11776](https://github.com/brianwrf/S2-057-CVE-2018-11776) - [649/Apache-Struts-Shodan-Exploit](https://github.com/649/Apache-Struts-Shodan-Exploit) - [jezzus/CVE-2018-11776-Python-PoC](https://github.com/jezzus/CVE-2018-11776-Python-PoC) - [cved-sources/cve-2018-11776](https://github.com/cved-sources/cve-2018-11776) - [OzNetNerd/apche-struts-vuln-demo-cve-2018-11776](https://github.com/OzNetNerd/apche-struts-vuln-demo-cve-2018-11776) - [cucadili/CVE-2018-11776](https://github.com/cucadili/CVE-2018-11776) - [LightC0der/Apache-Struts-0Day-Exploit](https://github.com/LightC0der/Apache-Struts-0Day-Exploit) ### CVE-2018-11788 - [brianwrf/CVE-2018-11788](https://github.com/brianwrf/CVE-2018-11788) ### CVE-2018-11882 - [jguard01/cve-2018-11882](https://github.com/jguard01/cve-2018-11882) ### CVE-2018-12018 - [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018) ### CVE-2018-12031 - [EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion](https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion) ### CVE-2018-12038 - [gdraperi/remote-bitlocker-encryption-report](https://github.com/gdraperi/remote-bitlocker-encryption-report) ### CVE-2018-12086 - [kevinherron/stack-overflow-poc](https://github.com/kevinherron/stack-overflow-poc) ### CVE-2018-1235 - [AbsoZed/CVE-2018-1235](https://github.com/AbsoZed/CVE-2018-1235) ### CVE-2018-12386 - [asri3l/cve-2018-12386](https://github.com/asri3l/cve-2018-12386) ### CVE-2018-12418 - [tafamace/CVE-2018-12418](https://github.com/tafamace/CVE-2018-12418) ### CVE-2018-12463 - [alt3kx/CVE-2018-12463](https://github.com/alt3kx/CVE-2018-12463) ### CVE-2018-12533 - [TheKalin/CVE-2018-12533](https://github.com/TheKalin/CVE-2018-12533) ### CVE-2018-12537 - [tafamace/CVE-2018-12537](https://github.com/tafamace/CVE-2018-12537) ### CVE-2018-12540 - [tafamace/CVE-2018-12540](https://github.com/tafamace/CVE-2018-12540) ### CVE-2018-1259 - [tafamace/CVE-2018-1259](https://github.com/tafamace/CVE-2018-1259) ### CVE-2018-12596 - [alt3kx/CVE-2018-12596](https://github.com/alt3kx/CVE-2018-12596) ### CVE-2018-12597 - [alt3kx/CVE-2018-12597](https://github.com/alt3kx/CVE-2018-12597) ### CVE-2018-12598 - [alt3kx/CVE-2018-12598](https://github.com/alt3kx/CVE-2018-12598) ### CVE-2018-12613 - [0x00-0x00/CVE-2018-12613](https://github.com/0x00-0x00/CVE-2018-12613) - [ivanitlearning/CVE-2018-12613](https://github.com/ivanitlearning/CVE-2018-12613) ### CVE-2018-1270 - [CaledoniaProject/CVE-2018-1270](https://github.com/CaledoniaProject/CVE-2018-1270) - [genxor/CVE-2018-1270_EXP](https://github.com/genxor/CVE-2018-1270_EXP) - [tafamace/CVE-2018-1270](https://github.com/tafamace/CVE-2018-1270) - [Venscor/CVE-2018-1270](https://github.com/Venscor/CVE-2018-1270) ### CVE-2018-1273 - [knqyf263/CVE-2018-1273](https://github.com/knqyf263/CVE-2018-1273) - [wearearima/poc-cve-2018-1273](https://github.com/wearearima/poc-cve-2018-1273) - [webr0ck/poc-cve-2018-1273](https://github.com/webr0ck/poc-cve-2018-1273) - [cved-sources/cve-2018-1273](https://github.com/cved-sources/cve-2018-1273) - [jas502n/cve-2018-1273](https://github.com/jas502n/cve-2018-1273) ### CVE-2018-12798 - [sharmasandeepkr/cve-2018-12798](https://github.com/sharmasandeepkr/cve-2018-12798) ### CVE-2018-12895 - [bloom-ux/cve-2018-12895-hotfix](https://github.com/bloom-ux/cve-2018-12895-hotfix) ### CVE-2018-12914 - [RealBearcat/CVE-2018-12914](https://github.com/RealBearcat/CVE-2018-12914) ### CVE-2018-1297 - [RealBearcat/CVE-2018-1297](https://github.com/RealBearcat/CVE-2018-1297) ### CVE-2018-1304 - [knqyf263/CVE-2018-1304](https://github.com/knqyf263/CVE-2018-1304) - [thariyarox/tomcat_CVE-2018-1304_testing](https://github.com/thariyarox/tomcat_CVE-2018-1304_testing) ### CVE-2018-1305 - [RealBearcat/CVE-2018-1305](https://github.com/RealBearcat/CVE-2018-1305) ### CVE-2018-1313 - [tafamace/CVE-2018-1313](https://github.com/tafamace/CVE-2018-1313) ### CVE-2018-1324 - [tafamace/CVE-2018-1324](https://github.com/tafamace/CVE-2018-1324) ### CVE-2018-13257 - [gluxon/CVE-2018-13257](https://github.com/gluxon/CVE-2018-13257) ### CVE-2018-1327 - [RealBearcat/S2-056-XStream](https://github.com/RealBearcat/S2-056-XStream) ### CVE-2018-13341 - [axcheron/crestron_getsudopwd](https://github.com/axcheron/crestron_getsudopwd) ### CVE-2018-1335 - [SkyBlueEternal/CVE-2018-1335-EXP-GUI](https://github.com/SkyBlueEternal/CVE-2018-1335-EXP-GUI) - [GEIGEI123/CVE-2018-1335-Python3](https://github.com/GEIGEI123/CVE-2018-1335-Python3) ### CVE-2018-13379 - [milo2012/CVE-2018-13379](https://github.com/milo2012/CVE-2018-13379) - [jpiechowka/at-doom-fortigate](https://github.com/jpiechowka/at-doom-fortigate) - [0xHunter/FortiOS-Credentials-Disclosure](https://github.com/0xHunter/FortiOS-Credentials-Disclosure) - [Blazz3/cve2018-13379-nmap-script](https://github.com/Blazz3/cve2018-13379-nmap-script) ### CVE-2018-13382 - [milo2012/CVE-2018-13382](https://github.com/milo2012/CVE-2018-13382) ### CVE-2018-13410 - [shinecome/zip](https://github.com/shinecome/zip) ### CVE-2018-13784 - [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits) ### CVE-2018-13864 - [tafamace/CVE-2018-13864](https://github.com/tafamace/CVE-2018-13864) ### CVE-2018-14 - [lckJack/legacySymfony](https://github.com/lckJack/legacySymfony) ### CVE-2018-14083 - [pudding2/CVE-2018-14083](https://github.com/pudding2/CVE-2018-14083) ### CVE-2018-14442 - [payatu/CVE-2018-14442](https://github.com/payatu/CVE-2018-14442) - [sharmasandeepkr/PS-2018-002---CVE-2018-14442](https://github.com/sharmasandeepkr/PS-2018-002---CVE-2018-14442) ### CVE-2018-14634 - [luan0ap/cve-2018-14634](https://github.com/luan0ap/cve-2018-14634) ### CVE-2018-14665 - [jas502n/CVE-2018-14665](https://github.com/jas502n/CVE-2018-14665) - [bolonobolo/CVE-2018-14665](https://github.com/bolonobolo/CVE-2018-14665) - [0x1CA3/cve-2018-14665](https://github.com/0x1CA3/cve-2018-14665) ### CVE-2018-14667 - [greekn/cve-2018-14667](https://github.com/greekn/cve-2018-14667) - [zeroto01/CVE-2018-14667](https://github.com/zeroto01/CVE-2018-14667) - [r00t4dm/CVE-2018-14667](https://github.com/r00t4dm/CVE-2018-14667) - [syriusbughunt/CVE-2018-14667](https://github.com/syriusbughunt/CVE-2018-14667) - [quandqn/cve-2018-14667](https://github.com/quandqn/cve-2018-14667) - [Venscor/CVE-2018-14667-poc](https://github.com/Venscor/CVE-2018-14667-poc) ### CVE-2018-14729 - [FoolMitAh/CVE-2018-14729](https://github.com/FoolMitAh/CVE-2018-14729) ### CVE-2018-14772 - [spencerdodd/CVE-2018-14772](https://github.com/spencerdodd/CVE-2018-14772) ### CVE-2018-14847 - [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC) - [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit) - [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot) - [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847) - [th3f3n1x87/winboxPOC](https://github.com/th3f3n1x87/winboxPOC) - [krnull/mikrotik-beast](https://github.com/krnull/mikrotik-beast) - [sinichi449/Python-MikrotikLoginExploit](https://github.com/sinichi449/Python-MikrotikLoginExploit) ### CVE-2018-15131 - [0x00-0x00/CVE-2018-15131](https://github.com/0x00-0x00/CVE-2018-15131) ### CVE-2018-15133 - [kozmic/laravel-poc-CVE-2018-15133](https://github.com/kozmic/laravel-poc-CVE-2018-15133) - [sKirua/Laravel-CVE-2018-15133](https://github.com/sKirua/Laravel-CVE-2018-15133) ### CVE-2018-15365 - [nixwizard/CVE-2018-15365](https://github.com/nixwizard/CVE-2018-15365) ### CVE-2018-15473 - [trimstray/massh-enum](https://github.com/trimstray/massh-enum) - [gbonacini/opensshenum](https://github.com/gbonacini/opensshenum) - [Rhynorater/CVE-2018-15473-Exploit](https://github.com/Rhynorater/CVE-2018-15473-Exploit) - [epi052/cve-2018-15473](https://github.com/epi052/cve-2018-15473) - [pyperanger/CVE-2018-15473_exploit](https://github.com/pyperanger/CVE-2018-15473_exploit) - [r3dxpl0it/CVE-2018-15473](https://github.com/r3dxpl0it/CVE-2018-15473) - [JoeBlackSecurity/CrappyCode](https://github.com/JoeBlackSecurity/CrappyCode) - [JoeBlackSecurity/SSHUsernameBruter-SSHUB](https://github.com/JoeBlackSecurity/SSHUsernameBruter-SSHUB) - [cved-sources/cve-2018-15473](https://github.com/cved-sources/cve-2018-15473) - [LINYIKAI/CVE-2018-15473-exp](https://github.com/LINYIKAI/CVE-2018-15473-exp) - [securemode/enumpossible](https://github.com/securemode/enumpossible) - [trickster1103/-](https://github.com/trickster1103/-) - [NHPT/SSH-account-enumeration-verification-script](https://github.com/NHPT/SSH-account-enumeration-verification-script) - [CaioCGH/EP4-redes](https://github.com/CaioCGH/EP4-redes) ### CVE-2018-15499 - [DownWithUp/CVE-2018-15499](https://github.com/DownWithUp/CVE-2018-15499) ### CVE-2018-15686 - [hpcprofessional/remediate_cesa_2019_2091](https://github.com/hpcprofessional/remediate_cesa_2019_2091) ### CVE-2018-15727 - [u238/grafana-CVE-2018-15727](https://github.com/u238/grafana-CVE-2018-15727) ### CVE-2018-15832 - [JacksonKuo/Ubisoft-Uplay-Desktop-Client-63.0.5699.0](https://github.com/JacksonKuo/Ubisoft-Uplay-Desktop-Client-63.0.5699.0) ### CVE-2018-15877 - [cved-sources/cve-2018-15877](https://github.com/cved-sources/cve-2018-15877) ### CVE-2018-15912 - [coderobe/CVE-2018-15912-PoC](https://github.com/coderobe/CVE-2018-15912-PoC) ### CVE-2018-15961 - [vah13/CVE-2018-15961](https://github.com/vah13/CVE-2018-15961) - [cved-sources/cve-2018-15961](https://github.com/cved-sources/cve-2018-15961) ### CVE-2018-15968 - [sharmasandeepkr/cve-2018-15968](https://github.com/sharmasandeepkr/cve-2018-15968) ### CVE-2018-15982 - [FlatL1neAPT/CVE-2018-15982](https://github.com/FlatL1neAPT/CVE-2018-15982) - [AirEvan/CVE-2018-15982_PoC](https://github.com/AirEvan/CVE-2018-15982_PoC) - [Ridter/CVE-2018-15982_EXP](https://github.com/Ridter/CVE-2018-15982_EXP) - [kphongagsorn/adobe-flash-cve2018-15982](https://github.com/kphongagsorn/adobe-flash-cve2018-15982) - [jas502n/CVE-2018-15982_EXP_IE](https://github.com/jas502n/CVE-2018-15982_EXP_IE) - [scanfsec/CVE-2018-15982](https://github.com/scanfsec/CVE-2018-15982) - [SyFi/CVE-2018-15982](https://github.com/SyFi/CVE-2018-15982) - [create12138/CVE-2018-15982](https://github.com/create12138/CVE-2018-15982) ### CVE-2018-16119 - [hdbreaker/CVE-2018-16119](https://github.com/hdbreaker/CVE-2018-16119) ### CVE-2018-16135 - [c0d3G33k/CVE-2018-16135](https://github.com/c0d3G33k/CVE-2018-16135) ### CVE-2018-16156 - [securifera/CVE-2018-16156-Exploit](https://github.com/securifera/CVE-2018-16156-Exploit) ### CVE-2018-16283 - [cved-sources/cve-2018-16283](https://github.com/cved-sources/cve-2018-16283) ### CVE-2018-16323 - [ttffdd/XBadManners](https://github.com/ttffdd/XBadManners) ### CVE-2018-16341 - [mpgn/CVE-2018-16341](https://github.com/mpgn/CVE-2018-16341) ### CVE-2018-16370 - [snappyJack/CVE-2018-16370](https://github.com/snappyJack/CVE-2018-16370) ### CVE-2018-16373 - [snappyJack/CVE-2018-16373](https://github.com/snappyJack/CVE-2018-16373) ### CVE-2018-16447 - [security-breachlock/CVE-2018-16447](https://github.com/security-breachlock/CVE-2018-16447) ### CVE-2018-16509 - [farisv/PIL-RCE-Ghostscript-CVE-2018-16509](https://github.com/farisv/PIL-RCE-Ghostscript-CVE-2018-16509) - [knqyf263/CVE-2018-16509](https://github.com/knqyf263/CVE-2018-16509) - [cved-sources/cve-2018-16509](https://github.com/cved-sources/cve-2018-16509) - [rhpco/CVE-2018-16509](https://github.com/rhpco/CVE-2018-16509) ### CVE-2018-16623 - [security-breachlock/CVE-2018-16623](https://github.com/security-breachlock/CVE-2018-16623) ### CVE-2018-16624 - [security-breachlock/CVE-2018-16624](https://github.com/security-breachlock/CVE-2018-16624) ### CVE-2018-16625 - [security-breachlock/CVE-2018-16625](https://github.com/security-breachlock/CVE-2018-16625) ### CVE-2018-16626 - [security-breachlock/CVE-2018-16626](https://github.com/security-breachlock/CVE-2018-16626) ### CVE-2018-16627 - [security-breachlock/CVE-2018-16627](https://github.com/security-breachlock/CVE-2018-16627) ### CVE-2018-16628 - [security-breachlock/CVE-2018-16628](https://github.com/security-breachlock/CVE-2018-16628) ### CVE-2018-16629 - [security-breachlock/CVE-2018-16629](https://github.com/security-breachlock/CVE-2018-16629) ### CVE-2018-16630 - [security-breachlock/CVE-2018-16630](https://github.com/security-breachlock/CVE-2018-16630) ### CVE-2018-16631 - [security-breachlock/CVE-2018-16631](https://github.com/security-breachlock/CVE-2018-16631) ### CVE-2018-16632 - [security-breachlock/CVE-2018-16632](https://github.com/security-breachlock/CVE-2018-16632) ### CVE-2018-16633 - [security-breachlock/CVE-2018-16633](https://github.com/security-breachlock/CVE-2018-16633) ### CVE-2018-16634 - [security-breachlock/CVE-2018-16634](https://github.com/security-breachlock/CVE-2018-16634) ### CVE-2018-16635 - [security-breachlock/CVE-2018-16635](https://github.com/security-breachlock/CVE-2018-16635) ### CVE-2018-16636 - [security-breachlock/CVE-2018-16636](https://github.com/security-breachlock/CVE-2018-16636) ### CVE-2018-16637 - [security-breachlock/CVE-2018-16637](https://github.com/security-breachlock/CVE-2018-16637) ### CVE-2018-16638 - [security-breachlock/CVE-2018-16638](https://github.com/security-breachlock/CVE-2018-16638) ### CVE-2018-16639 - [security-breachlock/CVE-2018-16639](https://github.com/security-breachlock/CVE-2018-16639) ### CVE-2018-16706 - [Nurdilin/CVE-2018-16706](https://github.com/Nurdilin/CVE-2018-16706) ### CVE-2018-16711 - [DownWithUp/CVE-2018-16711](https://github.com/DownWithUp/CVE-2018-16711) ### CVE-2018-16712 - [DownWithUp/CVE-2018-16712](https://github.com/DownWithUp/CVE-2018-16712) ### CVE-2018-16713 - [DownWithUp/CVE-2018-16713](https://github.com/DownWithUp/CVE-2018-16713) ### CVE-2018-16854 - [danielthatcher/moodle-login-csrf](https://github.com/danielthatcher/moodle-login-csrf) ### CVE-2018-16858 - [4nimanegra/libreofficeExploit1](https://github.com/4nimanegra/libreofficeExploit1) - [k0o97/detect-cve-2018-16858](https://github.com/k0o97/detect-cve-2018-16858) ### CVE-2018-16875 - [alexzorin/poc-cve-2018-16875](https://github.com/alexzorin/poc-cve-2018-16875) ### CVE-2018-16890 - [zjw88282740/CVE-2018-16890](https://github.com/zjw88282740/CVE-2018-16890) ### CVE-2018-16987 - [gquere/CVE-2018-16987](https://github.com/gquere/CVE-2018-16987) ### CVE-2018-17024 - [security-breachlock/CVE-2018-17024](https://github.com/security-breachlock/CVE-2018-17024) ### CVE-2018-17144 - [iioch/ban-exploitable-bitcoin-nodes](https://github.com/iioch/ban-exploitable-bitcoin-nodes) - [hikame/CVE-2018-17144_POC](https://github.com/hikame/CVE-2018-17144_POC) ### CVE-2018-17182 - [jas502n/CVE-2018-17182](https://github.com/jas502n/CVE-2018-17182) - [denmilu/CVE-2018-17182](https://github.com/denmilu/CVE-2018-17182) - [denmilu/vmacache_CVE-2018-17182](https://github.com/denmilu/vmacache_CVE-2018-17182) ### CVE-2018-17207 - [cved-sources/cve-2018-17207](https://github.com/cved-sources/cve-2018-17207) ### CVE-2018-17246 - [mpgn/CVE-2018-17246](https://github.com/mpgn/CVE-2018-17246) ### CVE-2018-17300 - [security-breachlock/CVE-2018-17300](https://github.com/security-breachlock/CVE-2018-17300) ### CVE-2018-17301 - [security-breachlock/CVE-2018-17301](https://github.com/security-breachlock/CVE-2018-17301) ### CVE-2018-17302 - [security-breachlock/CVE-2018-17302](https://github.com/security-breachlock/CVE-2018-17302) ### CVE-2018-17418 - [AlwaysHereFight/monstra_cms-3.0.4--getshell](https://github.com/AlwaysHereFight/monstra_cms-3.0.4--getshell) ### CVE-2018-17431 - [Fadavvi/CVE-2018-17431-PoC](https://github.com/Fadavvi/CVE-2018-17431-PoC) ### CVE-2018-17456 - [SeahunOh/CVE-2018-17456](https://github.com/SeahunOh/CVE-2018-17456) - [matlink/CVE-2018-17456](https://github.com/matlink/CVE-2018-17456) - [799600966/CVE-2018-17456](https://github.com/799600966/CVE-2018-17456) - [AnonymKing/CVE-2018-17456](https://github.com/AnonymKing/CVE-2018-17456) ### CVE-2018-17961 - [matlink/CVE-2018-17961](https://github.com/matlink/CVE-2018-17961) ### CVE-2018-18026 - [DownWithUp/CVE-2018-18026](https://github.com/DownWithUp/CVE-2018-18026) ### CVE-2018-18368 - [DimopoulosElias/SEPM-EoP](https://github.com/DimopoulosElias/SEPM-EoP) ### CVE-2018-18387 - [TheeBlind/CVE-2018-18387](https://github.com/TheeBlind/CVE-2018-18387) ### CVE-2018-18500 - [sophoslabs/CVE-2018-18500](https://github.com/sophoslabs/CVE-2018-18500) ### CVE-2018-18714 - [DownWithUp/CVE-2018-18714](https://github.com/DownWithUp/CVE-2018-18714) ### CVE-2018-18852 - [hook-s3c/CVE-2018-18852](https://github.com/hook-s3c/CVE-2018-18852) - [andripwn/CVE-2018-18852](https://github.com/andripwn/CVE-2018-18852) ### CVE-2018-19126 - [farisv/PrestaShop-CVE-2018-19126](https://github.com/farisv/PrestaShop-CVE-2018-19126) ### CVE-2018-19127 - [ab1gale/phpcms-2008-CVE-2018-19127](https://github.com/ab1gale/phpcms-2008-CVE-2018-19127) ### CVE-2018-19131 - [JonathanWilbur/CVE-2018-19131](https://github.com/JonathanWilbur/CVE-2018-19131) ### CVE-2018-19207 - [aeroot/WP-GDPR-Compliance-Plugin-Exploit](https://github.com/aeroot/WP-GDPR-Compliance-Plugin-Exploit) - [cved-sources/cve-2018-19207](https://github.com/cved-sources/cve-2018-19207) ### CVE-2018-19276 - [mpgn/CVE-2018-19276](https://github.com/mpgn/CVE-2018-19276) ### CVE-2018-19466 - [MauroEldritch/lempo](https://github.com/MauroEldritch/lempo) ### CVE-2018-19487 - [Antho59/wp-jobhunt-exploit](https://github.com/Antho59/wp-jobhunt-exploit) ### CVE-2018-19506 - [security-breachlock/CVE-2018-19506](https://github.com/security-breachlock/CVE-2018-19506) ### CVE-2018-19507 - [security-breachlock/CVE-2018-19507](https://github.com/security-breachlock/CVE-2018-19507) ### CVE-2018-19508 - [security-breachlock/CVE-2018-19508](https://github.com/security-breachlock/CVE-2018-19508) ### CVE-2018-19518 - [ensimag-security/CVE-2018-19518](https://github.com/ensimag-security/CVE-2018-19518) ### CVE-2018-19537 - [JackDoan/TP-Link-ArcherC5-RCE](https://github.com/JackDoan/TP-Link-ArcherC5-RCE) ### CVE-2018-19592 - [BradyDonovan/CVE-2018-19592](https://github.com/BradyDonovan/CVE-2018-19592) ### CVE-2018-19596 - [security-breachlock/CVE-2018-19596](https://github.com/security-breachlock/CVE-2018-19596) ### CVE-2018-19597 - [security-breachlock/CVE-2018-19597](https://github.com/security-breachlock/CVE-2018-19597) ### CVE-2018-19598 - [security-breachlock/CVE-2018-19598](https://github.com/security-breachlock/CVE-2018-19598) ### CVE-2018-19599 - [security-breachlock/CVE-2018-19599](https://github.com/security-breachlock/CVE-2018-19599) ### CVE-2018-19600 - [security-breachlock/CVE-2018-19600](https://github.com/security-breachlock/CVE-2018-19600) ### CVE-2018-19601 - [security-breachlock/CVE-2018-19601](https://github.com/security-breachlock/CVE-2018-19601) ### CVE-2018-19788 - [AbsoZed/CVE-2018-19788](https://github.com/AbsoZed/CVE-2018-19788) - [d4gh0s7/CVE-2018-19788](https://github.com/d4gh0s7/CVE-2018-19788) - [Ekultek/PoC](https://github.com/Ekultek/PoC) - [jhlongjr/CVE-2018-19788](https://github.com/jhlongjr/CVE-2018-19788) ### CVE-2018-19844 - [security-breachlock/CVE-2018-19844](https://github.com/security-breachlock/CVE-2018-19844) ### CVE-2018-19845 - [security-breachlock/CVE-2018-19845](https://github.com/security-breachlock/CVE-2018-19845) ### CVE-2018-19864 - [NotEth1calHack3r/CVE-2018-19864](https://github.com/NotEth1calHack3r/CVE-2018-19864) ### CVE-2018-19901 - [security-breachlock/CVE-2018-19901](https://github.com/security-breachlock/CVE-2018-19901) ### CVE-2018-19902 - [security-breachlock/CVE-2018-19902](https://github.com/security-breachlock/CVE-2018-19902) ### CVE-2018-19903 - [security-breachlock/CVE-2018-19903](https://github.com/security-breachlock/CVE-2018-19903) ### CVE-2018-19904 - [security-breachlock/CVE-2018-19904](https://github.com/security-breachlock/CVE-2018-19904) ### CVE-2018-19905 - [security-breachlock/CVE-2018-19905](https://github.com/security-breachlock/CVE-2018-19905) ### CVE-2018-19906 - [security-breachlock/CVE-2018-19906](https://github.com/security-breachlock/CVE-2018-19906) ### CVE-2018-19911 - [iSafeBlue/freeswitch_rce](https://github.com/iSafeBlue/freeswitch_rce) ### CVE-2018-19918 - [security-breachlock/CVE-2018-19918](https://github.com/security-breachlock/CVE-2018-19918) ### CVE-2018-19919 - [security-breachlock/CVE-2018-19919](https://github.com/security-breachlock/CVE-2018-19919) ### CVE-2018-1999002 - [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development) - [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins) - [0x6b7966/CVE-2018-1999002](https://github.com/0x6b7966/CVE-2018-1999002) ### CVE-2018-20062 - [NS-Sp4ce/thinkphp5.XRce](https://github.com/NS-Sp4ce/thinkphp5.XRce) ### CVE-2018-20162 - [stigtsp/CVE-2018-20162-digi-lr54-restricted-shell-escape](https://github.com/stigtsp/CVE-2018-20162-digi-lr54-restricted-shell-escape) ### CVE-2018-20165 - [hect0rS/Reflected-XSS-on-Opentext-Portal-v7.4.4](https://github.com/hect0rS/Reflected-XSS-on-Opentext-Portal-v7.4.4) ### CVE-2018-2019 - [attakercyebr/hack4lx_CVE-2018-2019](https://github.com/attakercyebr/hack4lx_CVE-2018-2019) ### CVE-2018-20250 - [WyAtu/CVE-2018-20250](https://github.com/WyAtu/CVE-2018-20250) - [QAX-A-Team/CVE-2018-20250](https://github.com/QAX-A-Team/CVE-2018-20250) - [nmweizi/CVE-2018-20250-poc-winrar](https://github.com/nmweizi/CVE-2018-20250-poc-winrar) - [blunden/UNACEV2.DLL-CVE-2018-20250](https://github.com/blunden/UNACEV2.DLL-CVE-2018-20250) - [easis/CVE-2018-20250-WinRAR-ACE](https://github.com/easis/CVE-2018-20250-WinRAR-ACE) - [STP5940/CVE-2018-20250](https://github.com/STP5940/CVE-2018-20250) - [n4r1b/WinAce-POC](https://github.com/n4r1b/WinAce-POC) - [technicaldada/hack-winrar](https://github.com/technicaldada/hack-winrar) - [Ektoplasma/ezwinrar](https://github.com/Ektoplasma/ezwinrar) - [arkangel-dev/CVE-2018-20250-WINRAR-ACE-GUI](https://github.com/arkangel-dev/CVE-2018-20250-WINRAR-ACE-GUI) - [AeolusTF/CVE-2018-20250](https://github.com/AeolusTF/CVE-2018-20250) - [joydragon/Detect-CVE-2018-20250](https://github.com/joydragon/Detect-CVE-2018-20250) - [DANIELVISPOBLOG/WinRar_ACE_exploit_CVE-2018-20250](https://github.com/DANIELVISPOBLOG/WinRar_ACE_exploit_CVE-2018-20250) - [denmilu/CVE-2018-20250](https://github.com/denmilu/CVE-2018-20250) - [930201676/CVE-2018-20250](https://github.com/930201676/CVE-2018-20250) ### CVE-2018-20343 - [Alexandre-Bartel/CVE-2018-20343](https://github.com/Alexandre-Bartel/CVE-2018-20343) ### CVE-2018-20434 - [mhaskar/CVE-2018-20434](https://github.com/mhaskar/CVE-2018-20434) ### CVE-2018-20555 - [fs0c131y/CVE-2018-20555](https://github.com/fs0c131y/CVE-2018-20555) ### CVE-2018-20580 - [gscamelo/CVE-2018-20580](https://github.com/gscamelo/CVE-2018-20580) ### CVE-2018-20718 - [us3r777/CVE-2018-20718](https://github.com/us3r777/CVE-2018-20718) ### CVE-2018-2380 - [erpscanteam/CVE-2018-2380](https://github.com/erpscanteam/CVE-2018-2380) ### CVE-2018-2628 - [forlin/CVE-2018-2628](https://github.com/forlin/CVE-2018-2628) - [shengqi158/CVE-2018-2628](https://github.com/shengqi158/CVE-2018-2628) - [skydarker/CVE-2018-2628](https://github.com/skydarker/CVE-2018-2628) - [jiansiting/weblogic-cve-2018-2628](https://github.com/jiansiting/weblogic-cve-2018-2628) - [zjxzjx/CVE-2018-2628-detect](https://github.com/zjxzjx/CVE-2018-2628-detect) - [aedoo/CVE-2018-2628-MultiThreading](https://github.com/aedoo/CVE-2018-2628-MultiThreading) - [hawk-tiger/CVE-2018-2628](https://github.com/hawk-tiger/CVE-2018-2628) - [9uest/CVE-2018-2628](https://github.com/9uest/CVE-2018-2628) - [Shadowshusky/CVE-2018-2628all](https://github.com/Shadowshusky/CVE-2018-2628all) - [shaoshore/CVE-2018-2628](https://github.com/shaoshore/CVE-2018-2628) - [tdy218/ysoserial-cve-2018-2628](https://github.com/tdy218/ysoserial-cve-2018-2628) - [s0wr0b1ndef/CVE-2018-2628](https://github.com/s0wr0b1ndef/CVE-2018-2628) - [wrysunny/cve-2018-2628](https://github.com/wrysunny/cve-2018-2628) - [jas502n/CVE-2018-2628](https://github.com/jas502n/CVE-2018-2628) - [stevenlinfeng/CVE-2018-2628](https://github.com/stevenlinfeng/CVE-2018-2628) - [denmilu/CVE-2018-2628](https://github.com/denmilu/CVE-2018-2628) - [Nervous/WebLogic-RCE-exploit](https://github.com/Nervous/WebLogic-RCE-exploit) - [Lighird/CVE-2018-2628](https://github.com/Lighird/CVE-2018-2628) - [0xMJ/CVE-2018-2628](https://github.com/0xMJ/CVE-2018-2628) ### CVE-2018-2636 - [erpscanteam/CVE-2018-2636](https://github.com/erpscanteam/CVE-2018-2636) - [Cymmetria/micros_honeypot](https://github.com/Cymmetria/micros_honeypot) ### CVE-2018-2844 - [renorobert/virtualbox-cve-2018-2844](https://github.com/renorobert/virtualbox-cve-2018-2844) ### CVE-2018-2879 - [MostafaSoliman/Oracle-OAM-Padding-Oracle-CVE-2018-2879-Exploit](https://github.com/MostafaSoliman/Oracle-OAM-Padding-Oracle-CVE-2018-2879-Exploit) - [AymanElSherif/oracle-oam-authentication-bypas-exploit](https://github.com/AymanElSherif/oracle-oam-authentication-bypas-exploit) - [redtimmy/OAMBuster](https://github.com/redtimmy/OAMBuster) ### CVE-2018-2893 - [anbai-inc/CVE-2018-2893](https://github.com/anbai-inc/CVE-2018-2893) - [ryanInf/CVE-2018-2893](https://github.com/ryanInf/CVE-2018-2893) - [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893) - [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893) - [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893) - [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893) - [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893) ### CVE-2018-2894 - [111ddea/cve-2018-2894](https://github.com/111ddea/cve-2018-2894) - [LandGrey/CVE-2018-2894](https://github.com/LandGrey/CVE-2018-2894) - [jas502n/CVE-2018-2894](https://github.com/jas502n/CVE-2018-2894) ### CVE-2018-3191 - [arongmh/CVE-2018-3191](https://github.com/arongmh/CVE-2018-3191) - [pyn3rd/CVE-2018-3191](https://github.com/pyn3rd/CVE-2018-3191) - [Libraggbond/CVE-2018-3191](https://github.com/Libraggbond/CVE-2018-3191) - [jas502n/CVE-2018-3191](https://github.com/jas502n/CVE-2018-3191) - [mackleadmire/CVE-2018-3191-Rce-Exploit](https://github.com/mackleadmire/CVE-2018-3191-Rce-Exploit) ### CVE-2018-3245 - [pyn3rd/CVE-2018-3245](https://github.com/pyn3rd/CVE-2018-3245) - [jas502n/CVE-2018-3245](https://github.com/jas502n/CVE-2018-3245) - [ianxtianxt/CVE-2018-3245](https://github.com/ianxtianxt/CVE-2018-3245) ### CVE-2018-3252 - [jas502n/CVE-2018-3252](https://github.com/jas502n/CVE-2018-3252) - [b1ueb0y/CVE-2018-3252](https://github.com/b1ueb0y/CVE-2018-3252) - [pyn3rd/CVE-2018-3252](https://github.com/pyn3rd/CVE-2018-3252) ### CVE-2018-3260 - [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck) ### CVE-2018-3295 - [ndureiss/e1000_vulnerability_exploit](https://github.com/ndureiss/e1000_vulnerability_exploit) ### CVE-2018-3608 - [ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC) ### CVE-2018-3639 - [tyhicks/ssbd-tools](https://github.com/tyhicks/ssbd-tools) - [malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate](https://github.com/malindarathnayake/Intel-CVE-2018-3639-Mitigation_RegistryUpdate) - [mmxsrup/CVE-2018-3639](https://github.com/mmxsrup/CVE-2018-3639) - [Shuiliusheng/CVE-2018-3639-specter-v4-](https://github.com/Shuiliusheng/CVE-2018-3639-specter-v4-) ### CVE-2018-3760 - [mpgn/CVE-2018-3760](https://github.com/mpgn/CVE-2018-3760) ### CVE-2018-3783 - [nisaruj/nosqli-flintcms](https://github.com/nisaruj/nosqli-flintcms) ### CVE-2018-3810 - [lucad93/CVE-2018-3810](https://github.com/lucad93/CVE-2018-3810) - [cved-sources/cve-2018-3810](https://github.com/cved-sources/cve-2018-3810) ### CVE-2018-3811 - [cved-sources/cve-2018-3811](https://github.com/cved-sources/cve-2018-3811) ### CVE-2018-4013 - [DoubleMice/cve-2018-4013](https://github.com/DoubleMice/cve-2018-4013) - [r3dxpl0it/RTSPServer-Code-Execution-Vulnerability](https://github.com/r3dxpl0it/RTSPServer-Code-Execution-Vulnerability) ### CVE-2018-4087 - [rani-i/bluetoothdPoC](https://github.com/rani-i/bluetoothdPoC) - [MTJailed/UnjailMe](https://github.com/MTJailed/UnjailMe) - [joedaguy/Exploit11.2](https://github.com/joedaguy/Exploit11.2) ### CVE-2018-4110 - [bencompton/ios11-cookie-set-expire-issue](https://github.com/bencompton/ios11-cookie-set-expire-issue) ### CVE-2018-4121 - [FSecureLABS/CVE-2018-4121](https://github.com/FSecureLABS/CVE-2018-4121) - [denmilu/CVE-2018-4121](https://github.com/denmilu/CVE-2018-4121) - [jezzus/CVE-2018-4121](https://github.com/jezzus/CVE-2018-4121) ### CVE-2018-4124 - [ZecOps/TELUGU_CVE-2018-4124_POC](https://github.com/ZecOps/TELUGU_CVE-2018-4124_POC) ### CVE-2018-4150 - [Jailbreaks/CVE-2018-4150](https://github.com/Jailbreaks/CVE-2018-4150) - [RPwnage/LovelySn0w](https://github.com/RPwnage/LovelySn0w) - [littlelailo/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-](https://github.com/littlelailo/incomplete-exploit-for-CVE-2018-4150-bpf-filter-poc-) ### CVE-2018-4185 - [bazad/x18-leak](https://github.com/bazad/x18-leak) ### CVE-2018-4193 - [Synacktiv-contrib/CVE-2018-4193](https://github.com/Synacktiv-contrib/CVE-2018-4193) ### CVE-2018-4233 - [saelo/cve-2018-4233](https://github.com/saelo/cve-2018-4233) ### CVE-2018-4241 - [0neday/multi_path](https://github.com/0neday/multi_path) ### CVE-2018-4242 - [yeonnic/Look-at-The-XNU-Through-A-Tube-CVE-2018-4242-Write-up-Translation-](https://github.com/yeonnic/Look-at-The-XNU-Through-A-Tube-CVE-2018-4242-Write-up-Translation-) ### CVE-2018-4243 - [Jailbreaks/empty_list](https://github.com/Jailbreaks/empty_list) ### CVE-2018-4248 - [bazad/xpc-string-leak](https://github.com/bazad/xpc-string-leak) ### CVE-2018-4280 - [bazad/launchd-portrep](https://github.com/bazad/launchd-portrep) - [bazad/blanket](https://github.com/bazad/blanket) ### CVE-2018-4327 - [omerporze/brokentooth](https://github.com/omerporze/brokentooth) - [harryanon/POC-CVE-2018-4327-and-CVE-2018-4330](https://github.com/harryanon/POC-CVE-2018-4327-and-CVE-2018-4330) ### CVE-2018-4330 - [omerporze/toothfairy](https://github.com/omerporze/toothfairy) ### CVE-2018-4331 - [bazad/gsscred-race](https://github.com/bazad/gsscred-race) ### CVE-2018-4343 - [bazad/gsscred-move-uaf](https://github.com/bazad/gsscred-move-uaf) ### CVE-2018-4407 - [Pa55w0rd/check_icmp_dos](https://github.com/Pa55w0rd/check_icmp_dos) - [unixpickle/cve-2018-4407](https://github.com/unixpickle/cve-2018-4407) - [s2339956/check_icmp_dos-CVE-2018-4407-](https://github.com/s2339956/check_icmp_dos-CVE-2018-4407-) - [farisv/AppleDOS](https://github.com/farisv/AppleDOS) - [WyAtu/CVE-2018-4407](https://github.com/WyAtu/CVE-2018-4407) - [zteeed/CVE-2018-4407-IOS](https://github.com/zteeed/CVE-2018-4407-IOS) - [SamDecrock/node-cve-2018-4407](https://github.com/SamDecrock/node-cve-2018-4407) - [r3dxpl0it/CVE-2018-4407](https://github.com/r3dxpl0it/CVE-2018-4407) - [lucagiovagnoli/CVE-2018-4407](https://github.com/lucagiovagnoli/CVE-2018-4407) - [anonymouz4/Apple-Remote-Crash-Tool-CVE-2018-4407](https://github.com/anonymouz4/Apple-Remote-Crash-Tool-CVE-2018-4407) - [soccercab/wifi](https://github.com/soccercab/wifi) - [zeng9t/CVE-2018-4407-iOS-exploit](https://github.com/zeng9t/CVE-2018-4407-iOS-exploit) - [5431/CVE-2018-4407](https://github.com/5431/CVE-2018-4407) - [NotEth1calHack3r/iOS-Kernel-Crash](https://github.com/NotEth1calHack3r/iOS-Kernel-Crash) ### CVE-2018-4411 - [dongyangwu/POC-CVE-2018-4411](https://github.com/dongyangwu/POC-CVE-2018-4411) ### CVE-2018-4415 - [T1V0h/CVE-2018-4415](https://github.com/T1V0h/CVE-2018-4415) ### CVE-2018-4431 - [ktiOSz/PoC_iOS12](https://github.com/ktiOSz/PoC_iOS12) ### CVE-2018-4441 - [Cryptogenic/PS4-6.20-WebKit-Code-Execution-Exploit](https://github.com/Cryptogenic/PS4-6.20-WebKit-Code-Execution-Exploit) ### CVE-2018-4878 - [ydl555/CVE-2018-4878-](https://github.com/ydl555/CVE-2018-4878-) - [mdsecactivebreach/CVE-2018-4878](https://github.com/mdsecactivebreach/CVE-2018-4878) - [hybridious/CVE-2018-4878](https://github.com/hybridious/CVE-2018-4878) - [vysecurity/CVE-2018-4878](https://github.com/vysecurity/CVE-2018-4878) - [anbai-inc/CVE-2018-4878](https://github.com/anbai-inc/CVE-2018-4878) - [Sch01ar/CVE-2018-4878](https://github.com/Sch01ar/CVE-2018-4878) - [SyFi/CVE-2018-4878](https://github.com/SyFi/CVE-2018-4878) - [ydl555/CVE-2018-4878](https://github.com/ydl555/CVE-2018-4878) - [B0fH/CVE-2018-4878](https://github.com/B0fH/CVE-2018-4878) - [Yable/CVE-2018-4878](https://github.com/Yable/CVE-2018-4878) - [HuanWoWeiLan/SoftwareSystemSecurity-2019](https://github.com/HuanWoWeiLan/SoftwareSystemSecurity-2019) ### CVE-2018-4901 - [bigric3/CVE-2018-4901](https://github.com/bigric3/CVE-2018-4901) ### CVE-2018-5234 - [embedi/ble_norton_core](https://github.com/embedi/ble_norton_core) ### CVE-2018-5711 - [huzhenghui/Test-7-2-0-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-0-PHP-CVE-2018-5711) - [huzhenghui/Test-7-2-1-PHP-CVE-2018-5711](https://github.com/huzhenghui/Test-7-2-1-PHP-CVE-2018-5711) ### CVE-2018-5724 - [gusrmsdlrh/Python-CVE-Code](https://github.com/gusrmsdlrh/Python-CVE-Code) ### CVE-2018-5728 - [ezelf/seatel_terminals](https://github.com/ezelf/seatel_terminals) ### CVE-2018-5740 - [sischkg/cve-2018-5740](https://github.com/sischkg/cve-2018-5740) ### CVE-2018-5951 - [Nat-Lab/CVE-2018-5951](https://github.com/Nat-Lab/CVE-2018-5951) ### CVE-2018-5955 - [cisp/GitStackRCE](https://github.com/cisp/GitStackRCE) - [YagamiiLight/Cerberus](https://github.com/YagamiiLight/Cerberus) ### CVE-2018-6242 - [DavidBuchanan314/NXLoader](https://github.com/DavidBuchanan314/NXLoader) - [reswitched/rcm-modchips](https://github.com/reswitched/rcm-modchips) - [switchjs/fusho](https://github.com/switchjs/fusho) ### CVE-2018-6376 - [knqyf263/CVE-2018-6376](https://github.com/knqyf263/CVE-2018-6376) ### CVE-2018-6389 - [yolabingo/wordpress-fix-cve-2018-6389](https://github.com/yolabingo/wordpress-fix-cve-2018-6389) - [WazeHell/CVE-2018-6389](https://github.com/WazeHell/CVE-2018-6389) - [rastating/modsecurity-cve-2018-6389](https://github.com/rastating/modsecurity-cve-2018-6389) - [knqyf263/CVE-2018-6389](https://github.com/knqyf263/CVE-2018-6389) - [JulienGadanho/cve-2018-6389-php-patcher](https://github.com/JulienGadanho/cve-2018-6389-php-patcher) - [dsfau/wordpress-CVE-2018-6389](https://github.com/dsfau/wordpress-CVE-2018-6389) - [Jetserver/CVE-2018-6389-FIX](https://github.com/Jetserver/CVE-2018-6389-FIX) - [thechrono13/PoC---CVE-2018-6389](https://github.com/thechrono13/PoC---CVE-2018-6389) - [BlackRouter/cve-2018-6389](https://github.com/BlackRouter/cve-2018-6389) - [alessiogilardi/PoC---CVE-2018-6389](https://github.com/alessiogilardi/PoC---CVE-2018-6389) - [JavierOlmedo/wordpress-cve-2018-6389](https://github.com/JavierOlmedo/wordpress-cve-2018-6389) - [m3ssap0/wordpress_cve-2018-6389](https://github.com/m3ssap0/wordpress_cve-2018-6389) - [s0md3v/Shiva](https://github.com/s0md3v/Shiva) - [mudhappy/Wordpress-Hack-CVE-2018-6389](https://github.com/mudhappy/Wordpress-Hack-CVE-2018-6389) - [armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389](https://github.com/armaanpathan12345/WP-DOS-Exploit-CVE-2018-6389) - [ItinerisLtd/trellis-cve-2018-6389](https://github.com/ItinerisLtd/trellis-cve-2018-6389) - [Zazzzles/Wordpress-DOS](https://github.com/Zazzzles/Wordpress-DOS) - [fakedob/tvsz](https://github.com/fakedob/tvsz) - [heisenberg-official/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/heisenberg-official/Wordpress-DOS-Attack-CVE-2018-6389) - [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389) ### CVE-2018-6396 - [JavierOlmedo/joomla-cve-2018-6396](https://github.com/JavierOlmedo/joomla-cve-2018-6396) ### CVE-2018-6407 - [dreadlocked/ConceptronicIPCam_MultipleVulnerabilities](https://github.com/dreadlocked/ConceptronicIPCam_MultipleVulnerabilities) ### CVE-2018-6479 - [dreadlocked/netwave-dosvulnerability](https://github.com/dreadlocked/netwave-dosvulnerability) ### CVE-2018-6518 - [faizzaidi/Composr-CMS-10.0.13-Cross-Site-Scripting-XSS](https://github.com/faizzaidi/Composr-CMS-10.0.13-Cross-Site-Scripting-XSS) ### CVE-2018-6546 - [securifera/CVE-2018-6546-Exploit](https://github.com/securifera/CVE-2018-6546-Exploit) - [YanZiShuang/CVE-2018-6546](https://github.com/YanZiShuang/CVE-2018-6546) ### CVE-2018-6574 - [acole76/cve-2018-6574](https://github.com/acole76/cve-2018-6574) - [neargle/CVE-2018-6574-POC](https://github.com/neargle/CVE-2018-6574-POC) - [willbo4r/go-get-rce](https://github.com/willbo4r/go-get-rce) - [ahmetmanga/go-get-rce](https://github.com/ahmetmanga/go-get-rce) - [ahmetmanga/cve-2018-6574](https://github.com/ahmetmanga/cve-2018-6574) - [michiiii/go-get-exploit](https://github.com/michiiii/go-get-exploit) - [kenprice/cve-2018-6574](https://github.com/kenprice/cve-2018-6574) - [redirected/cve-2018-6574](https://github.com/redirected/cve-2018-6574) - [20matan/CVE-2018-6574-POC](https://github.com/20matan/CVE-2018-6574-POC) - [zur250/Zur-Go-GET-RCE-Solution](https://github.com/zur250/Zur-Go-GET-RCE-Solution) - [mekhalleh/cve-2018-6574](https://github.com/mekhalleh/cve-2018-6574) - [veter069/go-get-rce](https://github.com/veter069/go-get-rce) - [duckzsc2/CVE-2018-6574-POC](https://github.com/duckzsc2/CVE-2018-6574-POC) - [ivnnn1/CVE-2018-6574](https://github.com/ivnnn1/CVE-2018-6574) - [bokanrb/CVE-2018-6574](https://github.com/bokanrb/CVE-2018-6574) - [dollyptm/cve-2018-6574](https://github.com/dollyptm/cve-2018-6574) - [qweraqq/CVE-2018-6574](https://github.com/qweraqq/CVE-2018-6574) - [d4rkshell/go-get-rce](https://github.com/d4rkshell/go-get-rce) - [chaosura/CVE-2018-6574](https://github.com/chaosura/CVE-2018-6574) - [french560/ptl6574](https://github.com/french560/ptl6574) - [jack-the-r1pper/CVE-2018-6574](https://github.com/jack-the-r1pper/CVE-2018-6574) - [asavior2/CVE-2018-6574](https://github.com/asavior2/CVE-2018-6574) - [drset/golang](https://github.com/drset/golang) - [frozenkp/CVE-2018-6574](https://github.com/frozenkp/CVE-2018-6574) - [kev-ho/cve-2018-6574-payload](https://github.com/kev-ho/cve-2018-6574-payload) - [sdosis/cve-2018-6574](https://github.com/sdosis/cve-2018-6574) - [No1zy/CVE-2018-6574-PoC](https://github.com/No1zy/CVE-2018-6574-PoC) ### CVE-2018-6622 - [kkamagui/napper-for-tpm](https://github.com/kkamagui/napper-for-tpm) ### CVE-2018-6643 - [undefinedmode/CVE-2018-6643](https://github.com/undefinedmode/CVE-2018-6643) ### CVE-2018-6789 - [c0llision/exim-vuln-poc](https://github.com/c0llision/exim-vuln-poc) - [beraphin/CVE-2018-6789](https://github.com/beraphin/CVE-2018-6789) - [synacktiv/Exim-CVE-2018-6789](https://github.com/synacktiv/Exim-CVE-2018-6789) ### CVE-2018-6791 - [rarar0/KDE_Vuln](https://github.com/rarar0/KDE_Vuln) ### CVE-2018-6890 - [pradeepjairamani/WolfCMS-XSS-POC](https://github.com/pradeepjairamani/WolfCMS-XSS-POC) ### CVE-2018-6892 - [manojcode/CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass](https://github.com/manojcode/CloudMe-Sync-1.10.9---Buffer-Overflow-SEH-DEP-Bypass) - [manojcode/-Win10-x64-CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass](https://github.com/manojcode/-Win10-x64-CloudMe-Sync-1.10.9-Buffer-Overflow-SEH-DEP-Bypass) ### CVE-2018-6905 - [pradeepjairamani/TYPO3-XSS-POC](https://github.com/pradeepjairamani/TYPO3-XSS-POC) ### CVE-2018-6961 - [bokanrb/CVE-2018-6961](https://github.com/bokanrb/CVE-2018-6961) - [r3dxpl0it/CVE-2018-6961](https://github.com/r3dxpl0it/CVE-2018-6961) ### CVE-2018-6981 - [heaphopopotamus/vmxnet3Hunter](https://github.com/heaphopopotamus/vmxnet3Hunter) ### CVE-2018-7171 - [mechanico/sharingIsCaring](https://github.com/mechanico/sharingIsCaring) ### CVE-2018-7197 - [Alyssa-o-Herrera/CVE-2018-7197](https://github.com/Alyssa-o-Herrera/CVE-2018-7197) ### CVE-2018-7211 - [c3r34lk1ll3r/CVE-2018-7211-PoC](https://github.com/c3r34lk1ll3r/CVE-2018-7211-PoC) ### CVE-2018-7249 - [Elvin9/NotSecDrv](https://github.com/Elvin9/NotSecDrv) ### CVE-2018-7250 - [Elvin9/SecDrvPoolLeak](https://github.com/Elvin9/SecDrvPoolLeak) ### CVE-2018-7260 - [g44m33r/ITS-CVE-2018-7260](https://github.com/g44m33r/ITS-CVE-2018-7260) ### CVE-2018-7284 - [Rodrigo-D/astDoS](https://github.com/Rodrigo-D/astDoS) ### CVE-2018-7422 - [0x00-0x00/CVE-2018-7422](https://github.com/0x00-0x00/CVE-2018-7422) ### CVE-2018-7489 - [tafamace/CVE-2018-7489](https://github.com/tafamace/CVE-2018-7489) ### CVE-2018-7600 - [g0rx/CVE-2018-7600-Drupal-RCE](https://github.com/g0rx/CVE-2018-7600-Drupal-RCE) - [a2u/CVE-2018-7600](https://github.com/a2u/CVE-2018-7600) - [dreadlocked/Drupalgeddon2](https://github.com/dreadlocked/Drupalgeddon2) - [knqyf263/CVE-2018-7600](https://github.com/knqyf263/CVE-2018-7600) - [dr-iman/CVE-2018-7600-Drupal-0day-RCE](https://github.com/dr-iman/CVE-2018-7600-Drupal-0day-RCE) - [jirojo2/drupalgeddon2](https://github.com/jirojo2/drupalgeddon2) - [dwisiswant0/CVE-2018-7600](https://github.com/dwisiswant0/CVE-2018-7600) - [thehappydinoa/CVE-2018-7600](https://github.com/thehappydinoa/CVE-2018-7600) - [sl4cky/CVE-2018-7600](https://github.com/sl4cky/CVE-2018-7600) - [sl4cky/CVE-2018-7600-Masschecker](https://github.com/sl4cky/CVE-2018-7600-Masschecker) - [FireFart/CVE-2018-7600](https://github.com/FireFart/CVE-2018-7600) - [pimps/CVE-2018-7600](https://github.com/pimps/CVE-2018-7600) - [lorddemon/drupalgeddon2](https://github.com/lorddemon/drupalgeddon2) - [Sch01ar/CVE-2018-7600](https://github.com/Sch01ar/CVE-2018-7600) - [Hestat/drupal-check](https://github.com/Hestat/drupal-check) - [fyraiga/CVE-2018-7600-drupalgeddon2-scanner](https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner) - [Damian972/drupalgeddon-2](https://github.com/Damian972/drupalgeddon-2) - [Jyozi/CVE-2018-7600](https://github.com/Jyozi/CVE-2018-7600) - [happynote3966/CVE-2018-7600](https://github.com/happynote3966/CVE-2018-7600) - [shellord/CVE-2018-7600-Drupal-RCE](https://github.com/shellord/CVE-2018-7600-Drupal-RCE) - [r3dxpl0it/CVE-2018-7600](https://github.com/r3dxpl0it/CVE-2018-7600) - [cved-sources/cve-2018-7600](https://github.com/cved-sources/cve-2018-7600) - [neal1991/drupalgeddon2](https://github.com/neal1991/drupalgeddon2) - [drugeddon/drupal-exploit](https://github.com/drugeddon/drupal-exploit) - [shellord/Drupalgeddon-Mass-Exploiter](https://github.com/shellord/Drupalgeddon-Mass-Exploiter) ### CVE-2018-7602 - [1337g/Drupalgedon3](https://github.com/1337g/Drupalgedon3) - [happynote3966/CVE-2018-7602](https://github.com/happynote3966/CVE-2018-7602) - [kastellanos/CVE-2018-7602](https://github.com/kastellanos/CVE-2018-7602) ### CVE-2018-7690 - [alt3kx/CVE-2018-7690](https://github.com/alt3kx/CVE-2018-7690) ### CVE-2018-7691 - [alt3kx/CVE-2018-7691](https://github.com/alt3kx/CVE-2018-7691) ### CVE-2018-7747 - [mindpr00f/CVE-2018-7747](https://github.com/mindpr00f/CVE-2018-7747) ### CVE-2018-7750 - [jm33-m0/CVE-2018-7750](https://github.com/jm33-m0/CVE-2018-7750) ### CVE-2018-7935 - [lawrenceamer/CVE-2018-7935](https://github.com/lawrenceamer/CVE-2018-7935) ### CVE-2018-8021 - [r3dxpl0it/Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021](https://github.com/r3dxpl0it/Apache-Superset-Remote-Code-Execution-PoC-CVE-2018-8021) ### CVE-2018-8038 - [tafamace/CVE-2018-8038](https://github.com/tafamace/CVE-2018-8038) ### CVE-2018-8039 - [tafamace/CVE-2018-8039](https://github.com/tafamace/CVE-2018-8039) ### CVE-2018-8045 - [luckybool1020/CVE-2018-8045](https://github.com/luckybool1020/CVE-2018-8045) ### CVE-2018-8060 - [otavioarj/SIOCtl](https://github.com/otavioarj/SIOCtl) ### CVE-2018-8065 - [EgeBalci/CVE-2018-8065](https://github.com/EgeBalci/CVE-2018-8065) ### CVE-2018-8078 - [AlwaysHereFight/YZMCMSxss](https://github.com/AlwaysHereFight/YZMCMSxss) ### CVE-2018-8090 - [kernelm0de/CVE-2018-8090](https://github.com/kernelm0de/CVE-2018-8090) ### CVE-2018-8108 - [zlgxzswjy/BUI-select-xss](https://github.com/zlgxzswjy/BUI-select-xss) ### CVE-2018-8115 - [aquasecurity/scan-cve-2018-8115](https://github.com/aquasecurity/scan-cve-2018-8115) ### CVE-2018-8120 - [bigric3/cve-2018-8120](https://github.com/bigric3/cve-2018-8120) - [unamer/CVE-2018-8120](https://github.com/unamer/CVE-2018-8120) - [ne1llee/cve-2018-8120](https://github.com/ne1llee/cve-2018-8120) - [alpha1ab/CVE-2018-8120](https://github.com/alpha1ab/CVE-2018-8120) - [areuu/CVE-2018-8120](https://github.com/areuu/CVE-2018-8120) - [EVOL4/CVE-2018-8120](https://github.com/EVOL4/CVE-2018-8120) - [ozkanbilge/CVE-2018-8120](https://github.com/ozkanbilge/CVE-2018-8120) - [qiantu88/CVE-2018-8120](https://github.com/qiantu88/CVE-2018-8120) - [Y0n0Y/cve-2018-8120-exp](https://github.com/Y0n0Y/cve-2018-8120-exp) ### CVE-2018-8172 - [SyFi/CVE-2018-8172](https://github.com/SyFi/CVE-2018-8172) ### CVE-2018-8174 - [0x09AL/CVE-2018-8174-msf](https://github.com/0x09AL/CVE-2018-8174-msf) - [Yt1g3r/CVE-2018-8174_EXP](https://github.com/Yt1g3r/CVE-2018-8174_EXP) - [SyFi/CVE-2018-8174](https://github.com/SyFi/CVE-2018-8174) - [orf53975/Rig-Exploit-for-CVE-2018-8174](https://github.com/orf53975/Rig-Exploit-for-CVE-2018-8174) - [piotrflorczyk/cve-2018-8174_analysis](https://github.com/piotrflorczyk/cve-2018-8174_analysis) - [denmilu/CVE-2018-8174-msf](https://github.com/denmilu/CVE-2018-8174-msf) - [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit) ### CVE-2018-8208 - [kaisaryousuf/CVE-2018-8208](https://github.com/kaisaryousuf/CVE-2018-8208) ### CVE-2018-8214 - [guwudoor/CVE-2018-8214](https://github.com/guwudoor/CVE-2018-8214) ### CVE-2018-8284 - [quantiti/CVE-2018-8284-Sharepoint-RCE](https://github.com/quantiti/CVE-2018-8284-Sharepoint-RCE) ### CVE-2018-8353 - [whereisr0da/CVE-2018-8353-POC](https://github.com/whereisr0da/CVE-2018-8353-POC) ### CVE-2018-8389 - [sharmasandeepkr/cve-2018-8389](https://github.com/sharmasandeepkr/cve-2018-8389) ### CVE-2018-8414 - [whereisr0da/CVE-2018-8414-POC](https://github.com/whereisr0da/CVE-2018-8414-POC) ### CVE-2018-8420 - [idkwim/CVE-2018-8420](https://github.com/idkwim/CVE-2018-8420) ### CVE-2018-8440 - [sourceincite/CVE-2018-8440](https://github.com/sourceincite/CVE-2018-8440) ### CVE-2018-8453 - [Mkv4/cve-2018-8453-exp](https://github.com/Mkv4/cve-2018-8453-exp) - [ze0r/cve-2018-8453-exp](https://github.com/ze0r/cve-2018-8453-exp) - [thepwnrip/leHACK-Analysis-of-CVE-2018-8453](https://github.com/thepwnrip/leHACK-Analysis-of-CVE-2018-8453) ### CVE-2018-8495 - [whereisr0da/CVE-2018-8495-POC](https://github.com/whereisr0da/CVE-2018-8495-POC) ### CVE-2018-8581 - [WyAtu/CVE-2018-8581](https://github.com/WyAtu/CVE-2018-8581) - [qiantu88/CVE-2018-8581](https://github.com/qiantu88/CVE-2018-8581) - [Ridter/Exchange2domain](https://github.com/Ridter/Exchange2domain) ### CVE-2018-8639 - [ze0r/CVE-2018-8639-exp](https://github.com/ze0r/CVE-2018-8639-exp) - [timwhitez/CVE-2018-8639-EXP](https://github.com/timwhitez/CVE-2018-8639-EXP) ### CVE-2018-8718 - [GeunSam2/CVE-2018-8718](https://github.com/GeunSam2/CVE-2018-8718) ### CVE-2018-8733 - [xfer0/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed](https://github.com/xfer0/Nagios-XI-5.2.6-9-5.3-5.4-Chained-Remote-Root-Exploit-Fixed) ### CVE-2018-8820 - [hateshape/frevvomapexec](https://github.com/hateshape/frevvomapexec) ### CVE-2018-8823 - [b3rksecurity/CVE-2018-8823](https://github.com/b3rksecurity/CVE-2018-8823) ### CVE-2018-8897 - [nmulasmajic/CVE-2018-8897](https://github.com/nmulasmajic/CVE-2018-8897) - [jiazhang0/pop-mov-ss-exploit](https://github.com/jiazhang0/pop-mov-ss-exploit) - [can1357/CVE-2018-8897](https://github.com/can1357/CVE-2018-8897) - [nmulasmajic/syscall_exploit_CVE-2018-8897](https://github.com/nmulasmajic/syscall_exploit_CVE-2018-8897) ### CVE-2018-8941 - [SECFORCE/CVE-2018-8941](https://github.com/SECFORCE/CVE-2018-8941) ### CVE-2018-8943 - [coolboy0816/CVE-2018-8943](https://github.com/coolboy0816/CVE-2018-8943) ### CVE-2018-8970 - [tiran/CVE-2018-8970](https://github.com/tiran/CVE-2018-8970) ### CVE-2018-9059 - [manojcode/easy-file-share-7.2-exploit-CVE-2018-9059](https://github.com/manojcode/easy-file-share-7.2-exploit-CVE-2018-9059) ### CVE-2018-9075 - [beverlymiller818/cve-2018-9075](https://github.com/beverlymiller818/cve-2018-9075) ### CVE-2018-9160 - [mechanico/sickrageWTF](https://github.com/mechanico/sickrageWTF) ### CVE-2018-9206 - [Den1al/CVE-2018-9206](https://github.com/Den1al/CVE-2018-9206) - [Stahlz/JQShell](https://github.com/Stahlz/JQShell) - [cved-sources/cve-2018-9206](https://github.com/cved-sources/cve-2018-9206) ### CVE-2018-9207 - [cved-sources/cve-2018-9207](https://github.com/cved-sources/cve-2018-9207) ### CVE-2018-9208 - [cved-sources/cve-2018-9208](https://github.com/cved-sources/cve-2018-9208) ### CVE-2018-9276 - [wildkindcc/CVE-2018-9276](https://github.com/wildkindcc/CVE-2018-9276) ### CVE-2018-9375 - [IOActive/AOSP-ExploitUserDictionary](https://github.com/IOActive/AOSP-ExploitUserDictionary) ### CVE-2018-9411 - [tamirzb/CVE-2018-9411](https://github.com/tamirzb/CVE-2018-9411) ### CVE-2018-9468 - [IOActive/AOSP-DownloadProviderHijacker](https://github.com/IOActive/AOSP-DownloadProviderHijacker) ### CVE-2018-9493 - [IOActive/AOSP-DownloadProviderDbDumper](https://github.com/IOActive/AOSP-DownloadProviderDbDumper) ### CVE-2018-9539 - [tamirzb/CVE-2018-9539](https://github.com/tamirzb/CVE-2018-9539) ### CVE-2018-9546 - [IOActive/AOSP-DownloadProviderHeadersDumper](https://github.com/IOActive/AOSP-DownloadProviderHeadersDumper) ### CVE-2018-9948 - [manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958](https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958) - [orangepirate/cve-2018-9948-9958-exp](https://github.com/orangepirate/cve-2018-9948-9958-exp) ### CVE-2018-9950 - [sharmasandeepkr/PS-2017-13---CVE-2018-9950](https://github.com/sharmasandeepkr/PS-2017-13---CVE-2018-9950) ### CVE-2018-9951 - [sharmasandeepkr/cve-2018-9951](https://github.com/sharmasandeepkr/cve-2018-9951) ### CVE-2018-9958 - [t3rabyt3/CVE-2018-9958--Exploit](https://github.com/t3rabyt3/CVE-2018-9958--Exploit) ### CVE-2018-9995 - [ezelf/CVE-2018-9995_dvr_credentials](https://github.com/ezelf/CVE-2018-9995_dvr_credentials) - [zzh217/CVE-2018-9995_Batch_scanning_exp](https://github.com/zzh217/CVE-2018-9995_Batch_scanning_exp) - [Huangkey/CVE-2018-9995_check](https://github.com/Huangkey/CVE-2018-9995_check) - [gwolfs/CVE-2018-9995-ModifiedByGwolfs](https://github.com/gwolfs/CVE-2018-9995-ModifiedByGwolfs) - [shacojx/cve-2018-9995](https://github.com/shacojx/cve-2018-9995) - [Cyb0r9/DVR-Exploiter](https://github.com/Cyb0r9/DVR-Exploiter) - [codeholic2k18/CVE-2018-9995](https://github.com/codeholic2k18/CVE-2018-9995) - [TateYdq/CVE-2018-9995-ModifiedByGwolfs](https://github.com/TateYdq/CVE-2018-9995-ModifiedByGwolfs) - [ABIZCHI/CVE-2018-9995_dvr_credentials](https://github.com/ABIZCHI/CVE-2018-9995_dvr_credentials) - [IHA114/CVE-2018-9995_dvr_credentials](https://github.com/IHA114/CVE-2018-9995_dvr_credentials) - [likaifeng0/CVE-2018-9995_dvr_credentials-dev_tool](https://github.com/likaifeng0/CVE-2018-9995_dvr_credentials-dev_tool) - [b510/CVE-2018-9995-POC](https://github.com/b510/CVE-2018-9995-POC) ## 2019 ### CVE-2019-0192 - [mpgn/CVE-2019-0192](https://github.com/mpgn/CVE-2019-0192) - [Rapidsafeguard/Solr-RCE-CVE-2019-0192](https://github.com/Rapidsafeguard/Solr-RCE-CVE-2019-0192) ### CVE-2019-0193 - [xConsoIe/CVE-2019-0193](https://github.com/xConsoIe/CVE-2019-0193) - [jas502n/CVE-2019-0193](https://github.com/jas502n/CVE-2019-0193) - [1135/solr_exploit](https://github.com/1135/solr_exploit) - [jaychouzzk/CVE-2019-0193-exp](https://github.com/jaychouzzk/CVE-2019-0193-exp) ### CVE-2019-0211 - [ozkanbilge/Apache-Exploit-2019](https://github.com/ozkanbilge/Apache-Exploit-2019) ### CVE-2019-0227 - [ianxtianxt/cve-2019-0227](https://github.com/ianxtianxt/cve-2019-0227) ### CVE-2019-0232 - [pyn3rd/CVE-2019-0232](https://github.com/pyn3rd/CVE-2019-0232) - [jas502n/CVE-2019-0232](https://github.com/jas502n/CVE-2019-0232) - [CherishHair/CVE-2019-0232-EXP](https://github.com/CherishHair/CVE-2019-0232-EXP) - [setrus/CVE-2019-0232](https://github.com/setrus/CVE-2019-0232) ### CVE-2019-0539 - [0x43434343/CVE-2019-0539](https://github.com/0x43434343/CVE-2019-0539) ### CVE-2019-0604 - [linhlhq/CVE-2019-0604](https://github.com/linhlhq/CVE-2019-0604) - [denmilu/CVE-2019-0604_sharepoint_CVE](https://github.com/denmilu/CVE-2019-0604_sharepoint_CVE) - [k8gege/CVE-2019-0604](https://github.com/k8gege/CVE-2019-0604) - [m5050/CVE-2019-0604](https://github.com/m5050/CVE-2019-0604) - [boxhg/CVE-2019-0604](https://github.com/boxhg/CVE-2019-0604) ### CVE-2019-0678 - [c0d3G33k/CVE-2019-0678](https://github.com/c0d3G33k/CVE-2019-0678) ### CVE-2019-0708 - [hook-s3c/CVE-2019-0708-poc](https://github.com/hook-s3c/CVE-2019-0708-poc) - [SherlockSec/CVE-2019-0708](https://github.com/SherlockSec/CVE-2019-0708) - [yetiddbb/CVE-2019-0708-PoC](https://github.com/yetiddbb/CVE-2019-0708-PoC) - [p0p0p0/CVE-2019-0708-exploit](https://github.com/p0p0p0/CVE-2019-0708-exploit) - [rockmelodies/CVE-2019-0708-Exploit](https://github.com/rockmelodies/CVE-2019-0708-Exploit) - [matengfei000/CVE-2019-0708](https://github.com/matengfei000/CVE-2019-0708) - [xiyangzuishuai/Dark-Network-CVE-2019-0708](https://github.com/xiyangzuishuai/Dark-Network-CVE-2019-0708) - [temp-user-2014/CVE-2019-0708](https://github.com/temp-user-2014/CVE-2019-0708) - [areusecure/CVE-2019-0708](https://github.com/areusecure/CVE-2019-0708) - [pry0cc/cve-2019-0708-2](https://github.com/pry0cc/cve-2019-0708-2) - [sbkcbig/CVE-2019-0708-EXPloit](https://github.com/sbkcbig/CVE-2019-0708-EXPloit) - [sbkcbig/CVE-2019-0708-EXPloit-3389](https://github.com/sbkcbig/CVE-2019-0708-EXPloit-3389) - [YSheldon/MS_T120](https://github.com/YSheldon/MS_T120) - [k8gege/CVE-2019-0708](https://github.com/k8gege/CVE-2019-0708) - [hotdog777714/RDS_CVE-2019-0708](https://github.com/hotdog777714/RDS_CVE-2019-0708) - [jiansiting/CVE-2019-0708](https://github.com/jiansiting/CVE-2019-0708) - [NullByteSuiteDevs/CVE-2019-0708](https://github.com/NullByteSuiteDevs/CVE-2019-0708) - [heaphopopotamus/CVE-2019-0708](https://github.com/heaphopopotamus/CVE-2019-0708) - [thugcrowd/CVE-2019-0708](https://github.com/thugcrowd/CVE-2019-0708) - [omaidf/CVE-2019-0708-PoC](https://github.com/omaidf/CVE-2019-0708-PoC) - [blacksunwen/CVE-2019-0708](https://github.com/blacksunwen/CVE-2019-0708) - [infenet/CVE-2019-0708](https://github.com/infenet/CVE-2019-0708) - [n0auth/CVE-2019-0708](https://github.com/n0auth/CVE-2019-0708) - [gildaaa/CVE-2019-0708](https://github.com/gildaaa/CVE-2019-0708) - [sbkcbig/CVE-2019-0708-Poc-exploit](https://github.com/sbkcbig/CVE-2019-0708-Poc-exploit) - [HackerJ0e/CVE-2019-0708](https://github.com/HackerJ0e/CVE-2019-0708) - [syriusbughunt/CVE-2019-0708](https://github.com/syriusbughunt/CVE-2019-0708) - [Barry-McCockiner/CVE-2019-0708](https://github.com/Barry-McCockiner/CVE-2019-0708) - [ShadowBrokers-ExploitLeak/CVE-2019-0708](https://github.com/ShadowBrokers-ExploitLeak/CVE-2019-0708) - [shumtheone/CVE-2019-0708](https://github.com/shumtheone/CVE-2019-0708) - [safly/CVE-2019-0708](https://github.com/safly/CVE-2019-0708) - [Jaky5155/cve-2019-0708-exp](https://github.com/Jaky5155/cve-2019-0708-exp) - [fourtwizzy/CVE-2019-0708-Check-Device-Patch-Status](https://github.com/fourtwizzy/CVE-2019-0708-Check-Device-Patch-Status) - [303sec/CVE-2019-0708](https://github.com/303sec/CVE-2019-0708) - [f8al/CVE-2019-0708-POC](https://github.com/f8al/CVE-2019-0708-POC) - [blockchainguard/CVE-2019-0708](https://github.com/blockchainguard/CVE-2019-0708) - [haoge8090/CVE-2019-0708](https://github.com/haoge8090/CVE-2019-0708) - [leezp/CVE-2019-0708](https://github.com/leezp/CVE-2019-0708) - [branbot1000/CVE-2019-0708](https://github.com/branbot1000/CVE-2019-0708) - [yushiro/CVE-2019-0708](https://github.com/yushiro/CVE-2019-0708) - [bilawalzardaer/CVE-2019-0708](https://github.com/bilawalzardaer/CVE-2019-0708) - [skyshell20082008/CVE-2019-0708-PoC-Hitting-Path](https://github.com/skyshell20082008/CVE-2019-0708-PoC-Hitting-Path) - [ttsite/CVE-2019-0708-](https://github.com/ttsite/CVE-2019-0708-) - [ttsite/CVE-2019-0708](https://github.com/ttsite/CVE-2019-0708) - [biggerwing/CVE-2019-0708-poc](https://github.com/biggerwing/CVE-2019-0708-poc) - [n1xbyte/CVE-2019-0708](https://github.com/n1xbyte/CVE-2019-0708) - [freeide/CVE-2019-0708](https://github.com/freeide/CVE-2019-0708) - [edvacco/CVE-2019-0708-POC](https://github.com/edvacco/CVE-2019-0708-POC) - [pry0cc/BlueKeepTracker](https://github.com/pry0cc/BlueKeepTracker) - [zjw88282740/CVE-2019-0708-win7](https://github.com/zjw88282740/CVE-2019-0708-win7) - [zerosum0x0/CVE-2019-0708](https://github.com/zerosum0x0/CVE-2019-0708) - [herhe/CVE-2019-0708poc](https://github.com/herhe/CVE-2019-0708poc) - [l9c/rdp0708scanner](https://github.com/l9c/rdp0708scanner) - [major203/cve-2019-0708-scan](https://github.com/major203/cve-2019-0708-scan) - [SugiB3o/Check-vuln-CVE-2019-0708](https://github.com/SugiB3o/Check-vuln-CVE-2019-0708) - [gobysec/CVE-2019-0708](https://github.com/gobysec/CVE-2019-0708) - [adalenv/CVE-2019-0708-Tool](https://github.com/adalenv/CVE-2019-0708-Tool) - [smallFunction/CVE-2019-0708-POC](https://github.com/smallFunction/CVE-2019-0708-POC) - [freeide/CVE-2019-0708-PoC-Exploit](https://github.com/freeide/CVE-2019-0708-PoC-Exploit) - [robertdavidgraham/rdpscan](https://github.com/robertdavidgraham/rdpscan) - [closethe/CVE-2019-0708-POC](https://github.com/closethe/CVE-2019-0708-POC) - [krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/krivegasa/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit) - [Rostelecom-CERT/bluekeepscan](https://github.com/Rostelecom-CERT/bluekeepscan) - [Leoid/CVE-2019-0708](https://github.com/Leoid/CVE-2019-0708) - [ht0Ruial/CVE-2019-0708Poc-BatchScanning](https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning) - [oneoy/BlueKeep](https://github.com/oneoy/BlueKeep) - [infiniti-team/CVE-2019-0708](https://github.com/infiniti-team/CVE-2019-0708) - [haishanzheng/CVE-2019-0708-generate-hosts](https://github.com/haishanzheng/CVE-2019-0708-generate-hosts) - [Ekultek/BlueKeep](https://github.com/Ekultek/BlueKeep) - [UraSecTeam/CVE-2019-0708](https://github.com/UraSecTeam/CVE-2019-0708) - [Gh0st0ne/rdpscan-BlueKeep](https://github.com/Gh0st0ne/rdpscan-BlueKeep) - [algo7/bluekeep_CVE-2019-0708_poc_to_exploit](https://github.com/algo7/bluekeep_CVE-2019-0708_poc_to_exploit) - [JasonLOU/CVE-2019-0708](https://github.com/JasonLOU/CVE-2019-0708) - [shun-gg/CVE-2019-0708](https://github.com/shun-gg/CVE-2019-0708) - [AdministratorGithub/CVE-2019-0708](https://github.com/AdministratorGithub/CVE-2019-0708) - [umarfarook882/CVE-2019-0708](https://github.com/umarfarook882/CVE-2019-0708) - [HynekPetrak/detect_bluekeep.py](https://github.com/HynekPetrak/detect_bluekeep.py) - [Wileysec/CVE-2019-0708-Batch-Blue-Screen](https://github.com/Wileysec/CVE-2019-0708-Batch-Blue-Screen) - [Pa55w0rd/CVE-2019-0708](https://github.com/Pa55w0rd/CVE-2019-0708) - [at0mik/CVE-2019-0708-PoC](https://github.com/at0mik/CVE-2019-0708-PoC) - [cream492/CVE-2019-0708-Msf--](https://github.com/cream492/CVE-2019-0708-Msf--) - [wdfcc/CVE-2019-0708](https://github.com/wdfcc/CVE-2019-0708) - [cvencoder/cve-2019-0708](https://github.com/cvencoder/cve-2019-0708) - [ze0r/CVE-2019-0708-exp](https://github.com/ze0r/CVE-2019-0708-exp) - [mekhalleh/cve-2019-0708](https://github.com/mekhalleh/cve-2019-0708) - [cve-2019-0708-poc/cve-2019-0708](https://github.com/cve-2019-0708-poc/cve-2019-0708) - [andripwn/CVE-2019-0708](https://github.com/andripwn/CVE-2019-0708) - [0xeb-bp/bluekeep](https://github.com/0xeb-bp/bluekeep) - [ntkernel0/CVE-2019-0708](https://github.com/ntkernel0/CVE-2019-0708) - [dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-](https://github.com/dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-) - [turingcompl33t/bluekeep](https://github.com/turingcompl33t/bluekeep) - [fade-vivida/CVE-2019-0708-test](https://github.com/fade-vivida/CVE-2019-0708-test) - [skommando/CVE-2019-0708](https://github.com/skommando/CVE-2019-0708) - [RickGeex/msf-module-CVE-2019-0708](https://github.com/RickGeex/msf-module-CVE-2019-0708) - [wqsemc/CVE-2019-0708](https://github.com/wqsemc/CVE-2019-0708) - [mai-lang-chai/CVE-2019-0708-RCE](https://github.com/mai-lang-chai/CVE-2019-0708-RCE) - [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF) - [upkn/CVE-2019-0708-BlueKeep](https://github.com/upkn/CVE-2019-0708-BlueKeep) - [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708) - [qinggegeya/CVE-2019-0708-EXP-MSF-](https://github.com/qinggegeya/CVE-2019-0708-EXP-MSF-) - [Straight-wood/CVE-2019-0708](https://github.com/Straight-wood/CVE-2019-0708) - [0xFlag/CVE-2019-0708-test](https://github.com/0xFlag/CVE-2019-0708-test) - [1aa87148377/CVE-2019-0708](https://github.com/1aa87148377/CVE-2019-0708) - [coolboy4me/cve-2019-0708_bluekeep_rce](https://github.com/coolboy4me/cve-2019-0708_bluekeep_rce) - [Cyb0r9/ispy](https://github.com/Cyb0r9/ispy) - [shishibabyq/CVE-2019-0708](https://github.com/shishibabyq/CVE-2019-0708) - [NotEth1calHack3r/Wincrash](https://github.com/NotEth1calHack3r/Wincrash) - [R4v3nG/CVE-2019-0708-DOS](https://github.com/R4v3nG/CVE-2019-0708-DOS) - [ulisesrc/-2-CVE-2019-0708](https://github.com/ulisesrc/-2-CVE-2019-0708) - [worawit/CVE-2019-0708](https://github.com/worawit/CVE-2019-0708) - [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows) ### CVE-2019-0709 - [YHZX2013/CVE-2019-0709](https://github.com/YHZX2013/CVE-2019-0709) - [qq431169079/CVE-2019-0709](https://github.com/qq431169079/CVE-2019-0709) ### CVE-2019-0768 - [ruthlezs/ie11_vbscript_exploit](https://github.com/ruthlezs/ie11_vbscript_exploit) ### CVE-2019-0785 - [Jaky5155/CVE-2019-0785](https://github.com/Jaky5155/CVE-2019-0785) ### CVE-2019-0803 - [ExpLife0011/CVE-2019-0803](https://github.com/ExpLife0011/CVE-2019-0803) ### CVE-2019-0808 - [ze0r/cve-2019-0808-poc](https://github.com/ze0r/cve-2019-0808-poc) - [rakesh143/CVE-2019-0808](https://github.com/rakesh143/CVE-2019-0808) - [exodusintel/CVE-2019-0808](https://github.com/exodusintel/CVE-2019-0808) ### CVE-2019-0841 - [rogue-kdc/CVE-2019-0841](https://github.com/rogue-kdc/CVE-2019-0841) - [denmilu/CVE-2019-0841](https://github.com/denmilu/CVE-2019-0841) - [0x00-0x00/CVE-2019-0841-BYPASS](https://github.com/0x00-0x00/CVE-2019-0841-BYPASS) ### CVE-2019-0859 - [Sheisback/CVE-2019-0859-1day-Exploit](https://github.com/Sheisback/CVE-2019-0859-1day-Exploit) ### CVE-2019-0888 - [sophoslabs/CVE-2019-0888](https://github.com/sophoslabs/CVE-2019-0888) ### CVE-2019-0986 - [padovah4ck/CVE-2019-0986](https://github.com/padovah4ck/CVE-2019-0986) ### CVE-2019-10008 - [FlameOfIgnis/CVE-2019-10008](https://github.com/FlameOfIgnis/CVE-2019-10008) ### CVE-2019-1002101 - [brompwnie/CVE-2019-1002101-Helpers](https://github.com/brompwnie/CVE-2019-1002101-Helpers) ### CVE-2019-1003000 - [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development) - [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc) - [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins) - [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION) ### CVE-2019-10086 - [evilangelplus/CVE-2019-10086](https://github.com/evilangelplus/CVE-2019-10086) ### CVE-2019-10092 - [motikan2010/CVE-2019-10092_Docker](https://github.com/motikan2010/CVE-2019-10092_Docker) ### CVE-2019-1010298 - [RKX1209/CVE-2019-1010298](https://github.com/RKX1209/CVE-2019-1010298) ### CVE-2019-10149 - [bananaphones/exim-rce-quickfix](https://github.com/bananaphones/exim-rce-quickfix) - [cowbe0x004/eximrce-CVE-2019-10149](https://github.com/cowbe0x004/eximrce-CVE-2019-10149) - [MNEMO-CERT/PoC--CVE-2019-10149_Exim](https://github.com/MNEMO-CERT/PoC--CVE-2019-10149_Exim) - [aishee/CVE-2019-10149-quick](https://github.com/aishee/CVE-2019-10149-quick) - [AzizMea/CVE-2019-10149-privilege-escalation](https://github.com/AzizMea/CVE-2019-10149-privilege-escalation) - [Brets0150/StickyExim](https://github.com/Brets0150/StickyExim) - [ChrissHack/exim.exp](https://github.com/ChrissHack/exim.exp) - [darsigovrustam/CVE-2019-10149](https://github.com/darsigovrustam/CVE-2019-10149) - [Diefunction/CVE-2019-10149](https://github.com/Diefunction/CVE-2019-10149) ### CVE-2019-10207 - [butterflyhack/CVE-2019-10207](https://github.com/butterflyhack/CVE-2019-10207) ### CVE-2019-10392 - [jas502n/CVE-2019-10392](https://github.com/jas502n/CVE-2019-10392) - [ftk-sostupid/CVE-2019-10392_EXP](https://github.com/ftk-sostupid/CVE-2019-10392_EXP) ### CVE-2019-1040 - [Ridter/CVE-2019-1040](https://github.com/Ridter/CVE-2019-1040) - [lazaars/UltraRealy_with_CVE-2019-1040](https://github.com/lazaars/UltraRealy_with_CVE-2019-1040) - [fox-it/cve-2019-1040-scanner](https://github.com/fox-it/cve-2019-1040-scanner) - [wzxmt/CVE-2019-1040](https://github.com/wzxmt/CVE-2019-1040) ### CVE-2019-10475 - [vesche/CVE-2019-10475](https://github.com/vesche/CVE-2019-10475) ### CVE-2019-1064 - [RythmStick/CVE-2019-1064](https://github.com/RythmStick/CVE-2019-1064) - [0x00-0x00/CVE-2019-1064](https://github.com/0x00-0x00/CVE-2019-1064) - [attackgithub/CVE-2019-1064](https://github.com/attackgithub/CVE-2019-1064) ### CVE-2019-10678 - [cved-sources/cve-2019-10678](https://github.com/cved-sources/cve-2019-10678) ### CVE-2019-10685 - [alt3kx/CVE-2019-10685](https://github.com/alt3kx/CVE-2019-10685) ### CVE-2019-1069 - [S3cur3Th1sSh1t/SharpPolarBear](https://github.com/S3cur3Th1sSh1t/SharpPolarBear) ### CVE-2019-10708 - [stavhaygn/CVE-2019-10708](https://github.com/stavhaygn/CVE-2019-10708) ### CVE-2019-10758 - [masahiro331/CVE-2019-10758](https://github.com/masahiro331/CVE-2019-10758) - [lp008/CVE-2019-10758](https://github.com/lp008/CVE-2019-10758) ### CVE-2019-10869 - [KTN1990/CVE-2019-10869](https://github.com/KTN1990/CVE-2019-10869) ### CVE-2019-10915 - [jiansiting/CVE-2019-10915](https://github.com/jiansiting/CVE-2019-10915) ### CVE-2019-1096 - [ze0r/cve-2019-1096-poc](https://github.com/ze0r/cve-2019-1096-poc) ### CVE-2019-10999 - [fuzzywalls/CVE-2019-10999](https://github.com/fuzzywalls/CVE-2019-10999) ### CVE-2019-11043 - [neex/phuip-fpizdam](https://github.com/neex/phuip-fpizdam) - [wolf4238/CVE-2019-11043](https://github.com/wolf4238/CVE-2019-11043) - [tinker-li/CVE-2019-11043](https://github.com/tinker-li/CVE-2019-11043) - [jas502n/CVE-2019-11043](https://github.com/jas502n/CVE-2019-11043) - [AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-](https://github.com/AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-) - [ianxtianxt/CVE-2019-11043](https://github.com/ianxtianxt/CVE-2019-11043) - [fairyming/CVE-2019-11043](https://github.com/fairyming/CVE-2019-11043) - [akamajoris/CVE-2019-11043-Docker](https://github.com/akamajoris/CVE-2019-11043-Docker) - [theMiddleBlue/CVE-2019-11043](https://github.com/theMiddleBlue/CVE-2019-11043) - [shadow-horse/cve-2019-11043](https://github.com/shadow-horse/cve-2019-11043) - [huowen/CVE-2019-11043](https://github.com/huowen/CVE-2019-11043) - [ypereirareis/docker-CVE-2019-11043](https://github.com/ypereirareis/docker-CVE-2019-11043) - [MRdoulestar/CVE-2019-11043](https://github.com/MRdoulestar/CVE-2019-11043) - [0th3rs-Security-Team/CVE-2019-11043](https://github.com/0th3rs-Security-Team/CVE-2019-11043) - [k8gege/CVE-2019-11043](https://github.com/k8gege/CVE-2019-11043) - [moniik/CVE-2019-11043_env](https://github.com/moniik/CVE-2019-11043_env) ### CVE-2019-11061 - [tim124058/ASUS-SmartHome-Exploit](https://github.com/tim124058/ASUS-SmartHome-Exploit) ### CVE-2019-11076 - [livehybrid/poc-cribl-rce](https://github.com/livehybrid/poc-cribl-rce) ### CVE-2019-1108 - [Lanph3re/cve-2019-1108](https://github.com/Lanph3re/cve-2019-1108) ### CVE-2019-11157 - [zkenjar/v0ltpwn](https://github.com/zkenjar/v0ltpwn) ### CVE-2019-11223 - [AngelCtulhu/CVE-2019-11223](https://github.com/AngelCtulhu/CVE-2019-11223) ### CVE-2019-1125 - [bitdefender/swapgs-attack-poc](https://github.com/bitdefender/swapgs-attack-poc) ### CVE-2019-1132 - [Vlad-tri/CVE-2019-1132](https://github.com/Vlad-tri/CVE-2019-1132) - [petercc/CVE-2019-1132](https://github.com/petercc/CVE-2019-1132) ### CVE-2019-11358 - [bitnesswise/jquery-prototype-pollution-fix](https://github.com/bitnesswise/jquery-prototype-pollution-fix) ### CVE-2019-11477 - [sasqwatch/cve-2019-11477-poc](https://github.com/sasqwatch/cve-2019-11477-poc) ### CVE-2019-11510 - [projectzeroindia/CVE-2019-11510](https://github.com/projectzeroindia/CVE-2019-11510) - [ladyleet1337/Pulse](https://github.com/ladyleet1337/Pulse) - [imjdl/CVE-2019-11510-poc](https://github.com/imjdl/CVE-2019-11510-poc) - [es0/CVE-2019-11510_poc](https://github.com/es0/CVE-2019-11510_poc) - [r00tpgp/http-pulse_ssl_vpn.nse](https://github.com/r00tpgp/http-pulse_ssl_vpn.nse) - [jas502n/CVE-2019-11510-1](https://github.com/jas502n/CVE-2019-11510-1) - [jason3e7/CVE-2019-11510](https://github.com/jason3e7/CVE-2019-11510) - [BishopFox/pwn-pulse](https://github.com/BishopFox/pwn-pulse) - [aqhmal/pulsexploit](https://github.com/aqhmal/pulsexploit) ### CVE-2019-11523 - [wizlab-it/anviz-m3-rfid-cve-2019-11523-poc](https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc) ### CVE-2019-11539 - [0xDezzy/CVE-2019-11539](https://github.com/0xDezzy/CVE-2019-11539) ### CVE-2019-11580 - [jas502n/CVE-2019-11580](https://github.com/jas502n/CVE-2019-11580) ### CVE-2019-11581 - [jas502n/CVE-2019-11581](https://github.com/jas502n/CVE-2019-11581) - [kobs0N/CVE-2019-11581](https://github.com/kobs0N/CVE-2019-11581) ### CVE-2019-11687 - [kosmokato/bad-dicom](https://github.com/kosmokato/bad-dicom) ### CVE-2019-11707 - [vigneshsrao/CVE-2019-11707](https://github.com/vigneshsrao/CVE-2019-11707) ### CVE-2019-11708 - [0vercl0k/CVE-2019-11708](https://github.com/0vercl0k/CVE-2019-11708) ### CVE-2019-11730 - [alidnf/CVE-2019-11730](https://github.com/alidnf/CVE-2019-11730) ### CVE-2019-1181 - [major203/cve-2019-1181](https://github.com/major203/cve-2019-1181) ### CVE-2019-11881 - [MauroEldritch/VanCleef](https://github.com/MauroEldritch/VanCleef) ### CVE-2019-11931 - [kasif-dekel/whatsapp-rce-patched](https://github.com/kasif-dekel/whatsapp-rce-patched) - [nop-team/CVE-2019-11931](https://github.com/nop-team/CVE-2019-11931) ### CVE-2019-11932 - [dorkerdevil/CVE-2019-11932](https://github.com/dorkerdevil/CVE-2019-11932) - [KeepWannabe/WhatsRCE](https://github.com/KeepWannabe/WhatsRCE) - [awakened1712/CVE-2019-11932](https://github.com/awakened1712/CVE-2019-11932) - [TulungagungCyberLink/CVE-2019-11932](https://github.com/TulungagungCyberLink/CVE-2019-11932) - [infiniteLoopers/CVE-2019-11932](https://github.com/infiniteLoopers/CVE-2019-11932) - [alexanderstonec/CVE-2019-11932](https://github.com/alexanderstonec/CVE-2019-11932) - [valbrux/CVE-2019-11932-SupportApp](https://github.com/valbrux/CVE-2019-11932-SupportApp) - [fastmo/CVE-2019-11932](https://github.com/fastmo/CVE-2019-11932) - [mRanonyMousTZ/CVE-2019-11932-whatsApp-exploit](https://github.com/mRanonyMousTZ/CVE-2019-11932-whatsApp-exploit) - [SmoZy92/CVE-2019-11932](https://github.com/SmoZy92/CVE-2019-11932) - [dashtic172/https-github.com-awakened171](https://github.com/dashtic172/https-github.com-awakened171) ### CVE-2019-12086 - [codeplutos/CVE-2019-12086-jackson-databind-file-read](https://github.com/codeplutos/CVE-2019-12086-jackson-databind-file-read) ### CVE-2019-1215 - [bluefrostsecurity/CVE-2019-1215](https://github.com/bluefrostsecurity/CVE-2019-1215) ### CVE-2019-12169 - [fuzzlove/ATutor-2.2.4-Language-Exploit](https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit) ### CVE-2019-12170 - [fuzzlove/ATutor-Instructor-Backup-Arbitrary-File](https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File) ### CVE-2019-1218 - [dgknkrcgr/CVE-2019-1218](https://github.com/dgknkrcgr/CVE-2019-1218) ### CVE-2019-12180 - [0x-nope/CVE-2019-12180](https://github.com/0x-nope/CVE-2019-12180) ### CVE-2019-12181 - [guywhataguy/CVE-2019-12181](https://github.com/guywhataguy/CVE-2019-12181) ### CVE-2019-12185 - [fuzzlove/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE](https://github.com/fuzzlove/eLabFTW-1.8.5-EntityController-Arbitrary-File-Upload-RCE) ### CVE-2019-12189 - [falconz/CVE-2019-12189](https://github.com/falconz/CVE-2019-12189) - [tuyenhva/CVE-2019-12189](https://github.com/tuyenhva/CVE-2019-12189) ### CVE-2019-12190 - [tuyenhva/CVE-2019-12190](https://github.com/tuyenhva/CVE-2019-12190) ### CVE-2019-12252 - [tuyenhva/CVE-2019-12252](https://github.com/tuyenhva/CVE-2019-12252) ### CVE-2019-12255 - [sud0woodo/Urgent11-Suricata-LUA-scripts](https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts) ### CVE-2019-12272 - [HACHp1/LuCI_RCE_exp](https://github.com/HACHp1/LuCI_RCE_exp) - [roguedream/lede-17.01.3](https://github.com/roguedream/lede-17.01.3) ### CVE-2019-12314 - [ras313/CVE-2019-12314](https://github.com/ras313/CVE-2019-12314) ### CVE-2019-12384 - [jas502n/CVE-2019-12384](https://github.com/jas502n/CVE-2019-12384) - [MagicZer0/Jackson_RCE-CVE-2019-12384](https://github.com/MagicZer0/Jackson_RCE-CVE-2019-12384) ### CVE-2019-12409 - [jas502n/CVE-2019-12409](https://github.com/jas502n/CVE-2019-12409) ### CVE-2019-12453 - [undefinedmode/CVE-2019-12453](https://github.com/undefinedmode/CVE-2019-12453) ### CVE-2019-12460 - [EmreOvunc/WebPort-v1.19.1-Reflected-XSS](https://github.com/EmreOvunc/WebPort-v1.19.1-Reflected-XSS) ### CVE-2019-12475 - [undefinedmode/CVE-2019-12475](https://github.com/undefinedmode/CVE-2019-12475) ### CVE-2019-12476 - [0katz/CVE-2019-12476](https://github.com/0katz/CVE-2019-12476) ### CVE-2019-1253 - [rogue-kdc/CVE-2019-1253](https://github.com/rogue-kdc/CVE-2019-1253) - [denmilu/CVE-2019-1253](https://github.com/denmilu/CVE-2019-1253) - [padovah4ck/CVE-2019-1253](https://github.com/padovah4ck/CVE-2019-1253) - [sgabe/CVE-2019-1253](https://github.com/sgabe/CVE-2019-1253) ### CVE-2019-12538 - [tarantula-team/CVE-2019-12538](https://github.com/tarantula-team/CVE-2019-12538) ### CVE-2019-12541 - [tarantula-team/CVE-2019-12541](https://github.com/tarantula-team/CVE-2019-12541) ### CVE-2019-12542 - [tarantula-team/CVE-2019-12542](https://github.com/tarantula-team/CVE-2019-12542) ### CVE-2019-12543 - [tarantula-team/CVE-2019-12543](https://github.com/tarantula-team/CVE-2019-12543) ### CVE-2019-12562 - [MAYASEVEN/CVE-2019-12562](https://github.com/MAYASEVEN/CVE-2019-12562) ### CVE-2019-12586 - [Matheus-Garbelini/esp32_esp8266_attacks](https://github.com/Matheus-Garbelini/esp32_esp8266_attacks) ### CVE-2019-12594 - [Alexandre-Bartel/CVE-2019-12594](https://github.com/Alexandre-Bartel/CVE-2019-12594) ### CVE-2019-12735 - [pcy190/ace-vim-neovim](https://github.com/pcy190/ace-vim-neovim) - [oldthree3/CVE-2019-12735-VIM-NEOVIM](https://github.com/oldthree3/CVE-2019-12735-VIM-NEOVIM) ### CVE-2019-12750 - [v-p-b/cve-2019-12750](https://github.com/v-p-b/cve-2019-12750) ### CVE-2019-12796 - [PeterUpfold/CVE-2019-12796](https://github.com/PeterUpfold/CVE-2019-12796) ### CVE-2019-12815 - [KTN1990/CVE-2019-12815](https://github.com/KTN1990/CVE-2019-12815) ### CVE-2019-12836 - [9lyph/CVE-2019-12836](https://github.com/9lyph/CVE-2019-12836) ### CVE-2019-12840 - [bkaraceylan/CVE-2019-12840_POC](https://github.com/bkaraceylan/CVE-2019-12840_POC) - [KrE80r/webmin_cve-2019-12840_poc](https://github.com/KrE80r/webmin_cve-2019-12840_poc) ### CVE-2019-12889 - [nulsect0r/CVE-2019-12889](https://github.com/nulsect0r/CVE-2019-12889) ### CVE-2019-12890 - [EthicalHackingCOP/CVE-2019-12890](https://github.com/EthicalHackingCOP/CVE-2019-12890) ### CVE-2019-12922 - [congtrung2k1/CVE-2019-12922](https://github.com/congtrung2k1/CVE-2019-12922) ### CVE-2019-12949 - [tarantula-team/CVE-2019-12949](https://github.com/tarantula-team/CVE-2019-12949) ### CVE-2019-12999 - [lightninglabs/chanleakcheck](https://github.com/lightninglabs/chanleakcheck) ### CVE-2019-13000 - [ACINQ/detection-tool-cve-2019-13000](https://github.com/ACINQ/detection-tool-cve-2019-13000) ### CVE-2019-13024 - [mhaskar/CVE-2019-13024](https://github.com/mhaskar/CVE-2019-13024) - [get-get-get-get/Centreon-RCE](https://github.com/get-get-get-get/Centreon-RCE) ### CVE-2019-13025 - [x1tan/CVE-2019-13025](https://github.com/x1tan/CVE-2019-13025) ### CVE-2019-13027 - [IckoGZ/CVE-2019-13027](https://github.com/IckoGZ/CVE-2019-13027) ### CVE-2019-13051 - [pr0tean/CVE-2019-13051](https://github.com/pr0tean/CVE-2019-13051) ### CVE-2019-13063 - [0x6b7966/CVE-2019-13063-POC](https://github.com/0x6b7966/CVE-2019-13063-POC) ### CVE-2019-13101 - [halencarjunior/dlkploit600](https://github.com/halencarjunior/dlkploit600) ### CVE-2019-13115 - [CSSProject/libssh2-Exploit](https://github.com/CSSProject/libssh2-Exploit) ### CVE-2019-13143 - [securelayer7/pwnfb50](https://github.com/securelayer7/pwnfb50) ### CVE-2019-1315 - [Mayter/CVE-2019-1315](https://github.com/Mayter/CVE-2019-1315) ### CVE-2019-13272 - [jas502n/CVE-2019-13272](https://github.com/jas502n/CVE-2019-13272) - [Cyc1eC/CVE-2019-13272](https://github.com/Cyc1eC/CVE-2019-13272) - [bigbigliang-malwarebenchmark/cve-2019-13272](https://github.com/bigbigliang-malwarebenchmark/cve-2019-13272) - [oneoy/CVE-2019-13272](https://github.com/oneoy/CVE-2019-13272) - [Huandtx/CVE-2019-13272](https://github.com/Huandtx/CVE-2019-13272) ### CVE-2019-13361 - [lodi-g/CVE-2019-13361](https://github.com/lodi-g/CVE-2019-13361) ### CVE-2019-13403 - [B3Bo1d/CVE-2019-13403](https://github.com/B3Bo1d/CVE-2019-13403) ### CVE-2019-13404 - [alidnf/CVE-2019-13404](https://github.com/alidnf/CVE-2019-13404) ### CVE-2019-13496 - [FurqanKhan1/CVE-2019-13496](https://github.com/FurqanKhan1/CVE-2019-13496) ### CVE-2019-13497 - [FurqanKhan1/CVE-2019-13497](https://github.com/FurqanKhan1/CVE-2019-13497) ### CVE-2019-13498 - [FurqanKhan1/CVE-2019-13498](https://github.com/FurqanKhan1/CVE-2019-13498) ### CVE-2019-13504 - [hazedic/fuzzenv-exiv2](https://github.com/hazedic/fuzzenv-exiv2) ### CVE-2019-13574 - [masahiro331/CVE-2019-13574](https://github.com/masahiro331/CVE-2019-13574) ### CVE-2019-1367 - [mandarenmanman/CVE-2019-1367](https://github.com/mandarenmanman/CVE-2019-1367) ### CVE-2019-13720 - [cve-2019-13720/cve-2019-13720](https://github.com/cve-2019-13720/cve-2019-13720) ### CVE-2019-1385 - [klinix5/CVE-2019-1385](https://github.com/klinix5/CVE-2019-1385) ### CVE-2019-1388 - [jas502n/CVE-2019-1388](https://github.com/jas502n/CVE-2019-1388) - [jaychouzzk/CVE-2019-1388](https://github.com/jaychouzzk/CVE-2019-1388) - [sv3nbeast/CVE-2019-1388](https://github.com/sv3nbeast/CVE-2019-1388) ### CVE-2019-1402 - [lauxjpn/CorruptQueryAccessWorkaround](https://github.com/lauxjpn/CorruptQueryAccessWorkaround) ### CVE-2019-1405 - [apt69/COMahawk](https://github.com/apt69/COMahawk) ### CVE-2019-14205 - [security-kma/EXPLOITING-CVE-2019-14205](https://github.com/security-kma/EXPLOITING-CVE-2019-14205) ### CVE-2019-1422 - [ze0r/cve-2019-1422](https://github.com/ze0r/cve-2019-1422) ### CVE-2019-14220 - [seqred-s-a/cve-2019-14220](https://github.com/seqred-s-a/cve-2019-14220) ### CVE-2019-14287 - [FauxFaux/sudo-cve-2019-14287](https://github.com/FauxFaux/sudo-cve-2019-14287) - [CashWilliams/CVE-2019-14287-demo](https://github.com/CashWilliams/CVE-2019-14287-demo) - [n0w4n/CVE-2019-14287](https://github.com/n0w4n/CVE-2019-14287) - [gurneesh/CVE-2019-14287-write-up](https://github.com/gurneesh/CVE-2019-14287-write-up) - [shellvhack/Sudo-Security-Bypass-CVE-2019-14287](https://github.com/shellvhack/Sudo-Security-Bypass-CVE-2019-14287) - [Janette88/cve-2019-14287sudoexp](https://github.com/Janette88/cve-2019-14287sudoexp) - [huang919/cve-2019-14287-PPT](https://github.com/huang919/cve-2019-14287-PPT) - [wenyu1999/sudo-](https://github.com/wenyu1999/sudo-) - [Sindadziy/cve-2019-14287](https://github.com/Sindadziy/cve-2019-14287) - [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271) - [Unam3dd/sudo-vulnerability-CVE-2019-14287](https://github.com/Unam3dd/sudo-vulnerability-CVE-2019-14287) - [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287) ### CVE-2019-14314 - [imthoe/CVE-2019-14314](https://github.com/imthoe/CVE-2019-14314) ### CVE-2019-14319 - [MelroyB/CVE-2019-14319](https://github.com/MelroyB/CVE-2019-14319) ### CVE-2019-14339 - [0x48piraj/CVE-2019-14339](https://github.com/0x48piraj/CVE-2019-14339) ### CVE-2019-14439 - [jas502n/CVE-2019-14439](https://github.com/jas502n/CVE-2019-14439) ### CVE-2019-14514 - [seqred-s-a/cve-2019-14514](https://github.com/seqred-s-a/cve-2019-14514) ### CVE-2019-14529 - [Wezery/CVE-2019-14529](https://github.com/Wezery/CVE-2019-14529) ### CVE-2019-14530 - [Wezery/CVE-2019-14530](https://github.com/Wezery/CVE-2019-14530) ### CVE-2019-14537 - [Wocanilo/CVE-2019-14537](https://github.com/Wocanilo/CVE-2019-14537) ### CVE-2019-14540 - [LeadroyaL/cve-2019-14540-exploit](https://github.com/LeadroyaL/cve-2019-14540-exploit) ### CVE-2019-14615 - [HE-Wenjian/iGPU-Leak](https://github.com/HE-Wenjian/iGPU-Leak) ### CVE-2019-14745 - [xooxo/CVE-2019-14745](https://github.com/xooxo/CVE-2019-14745) ### CVE-2019-14751 - [mssalvatore/CVE-2019-14751_PoC](https://github.com/mssalvatore/CVE-2019-14751_PoC) ### CVE-2019-1476 - [sgabe/CVE-2019-1476](https://github.com/sgabe/CVE-2019-1476) ### CVE-2019-14830 - [Fr3d-/moodle-token-stealer](https://github.com/Fr3d-/moodle-token-stealer) ### CVE-2019-14912 - [Wocanilo/adaPwn](https://github.com/Wocanilo/adaPwn) ### CVE-2019-15029 - [mhaskar/CVE-2019-15029](https://github.com/mhaskar/CVE-2019-15029) ### CVE-2019-15053 - [l0nax/CVE-2019-15053](https://github.com/l0nax/CVE-2019-15053) ### CVE-2019-15107 - [jas502n/CVE-2019-15107](https://github.com/jas502n/CVE-2019-15107) - [HACHp1/webmin_docker_and_exp](https://github.com/HACHp1/webmin_docker_and_exp) - [ketlerd/CVE-2019-15107](https://github.com/ketlerd/CVE-2019-15107) - [AdministratorGithub/CVE-2019-15107](https://github.com/AdministratorGithub/CVE-2019-15107) - [Rayferrufino/Make-and-Break](https://github.com/Rayferrufino/Make-and-Break) - [AleWong/WebminRCE-EXP-CVE-2019-15107-](https://github.com/AleWong/WebminRCE-EXP-CVE-2019-15107-) - [ianxtianxt/CVE-2019-15107](https://github.com/ianxtianxt/CVE-2019-15107) - [hannob/webminex](https://github.com/hannob/webminex) - [ChakoMoonFish/webmin_CVE-2019-15107](https://github.com/ChakoMoonFish/webmin_CVE-2019-15107) ### CVE-2019-15120 - [h3llraiser/CVE-2019-15120](https://github.com/h3llraiser/CVE-2019-15120) ### CVE-2019-15224 - [chef-cft/inspec_cve_2019_15224](https://github.com/chef-cft/inspec_cve_2019_15224) ### CVE-2019-15233 - [l0nax/CVE-2019-15233](https://github.com/l0nax/CVE-2019-15233) ### CVE-2019-15511 - [adenkiewicz/CVE-2019-15511](https://github.com/adenkiewicz/CVE-2019-15511) ### CVE-2019-15642 - [jas502n/CVE-2019-15642](https://github.com/jas502n/CVE-2019-15642) ### CVE-2019-1579 - [securifera/CVE-2019-1579](https://github.com/securifera/CVE-2019-1579) ### CVE-2019-15802 - [jasperla/CVE-2019-15802](https://github.com/jasperla/CVE-2019-15802) ### CVE-2019-15846 - [synacktiv/Exim-CVE-2019-15846](https://github.com/synacktiv/Exim-CVE-2019-15846) ### CVE-2019-15858 - [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858) ### CVE-2019-15972 - [FSecureLABS/Cisco-UCM-SQLi-Scripts](https://github.com/FSecureLABS/Cisco-UCM-SQLi-Scripts) ### CVE-2019-16097 - [evilAdan0s/CVE-2019-16097](https://github.com/evilAdan0s/CVE-2019-16097) - [rockmelodies/CVE-2019-16097-batch](https://github.com/rockmelodies/CVE-2019-16097-batch) - [ianxtianxt/CVE-2019-16097](https://github.com/ianxtianxt/CVE-2019-16097) - [dacade/cve-2019-16097](https://github.com/dacade/cve-2019-16097) - [theLSA/harbor-give-me-admin](https://github.com/theLSA/harbor-give-me-admin) - [luckybool1020/CVE-2019-16097](https://github.com/luckybool1020/CVE-2019-16097) ### CVE-2019-16098 - [Barakat/CVE-2019-16098](https://github.com/Barakat/CVE-2019-16098) ### CVE-2019-16278 - [jas502n/CVE-2019-16278](https://github.com/jas502n/CVE-2019-16278) - [imjdl/CVE-2019-16278-PoC](https://github.com/imjdl/CVE-2019-16278-PoC) - [ianxtianxt/CVE-2019-16278](https://github.com/ianxtianxt/CVE-2019-16278) - [darkerego/Nostromo_Python3](https://github.com/darkerego/Nostromo_Python3) - [AnubisSec/CVE-2019-16278](https://github.com/AnubisSec/CVE-2019-16278) - [rptucker/CVE-2019-16278-Nostromo_1.9.6-RCE](https://github.com/rptucker/CVE-2019-16278-Nostromo_1.9.6-RCE) - [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278) - [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278) ### CVE-2019-16279 - [ianxtianxt/CVE-2019-16279](https://github.com/ianxtianxt/CVE-2019-16279) ### CVE-2019-16405 - [TheCyberGeek/CVE-2019-16405.rb](https://github.com/TheCyberGeek/CVE-2019-16405.rb) ### CVE-2019-1652 - [0x27/CiscoRV320Dump](https://github.com/0x27/CiscoRV320Dump) ### CVE-2019-1653 - [dubfr33/CVE-2019-1653](https://github.com/dubfr33/CVE-2019-1653) - [shaheemirza/CiscoSpill](https://github.com/shaheemirza/CiscoSpill) ### CVE-2019-16662 - [mhaskar/CVE-2019-16662](https://github.com/mhaskar/CVE-2019-16662) ### CVE-2019-16663 - [mhaskar/CVE-2019-16663](https://github.com/mhaskar/CVE-2019-16663) ### CVE-2019-16692 - [kkirsche/CVE-2019-16692](https://github.com/kkirsche/CVE-2019-16692) ### CVE-2019-16724 - [FULLSHADE/Windows-Exploit-Development-Practice](https://github.com/FULLSHADE/Windows-Exploit-Development-Practice) ### CVE-2019-16759 - [Frint0/mass-pwn-vbulletin](https://github.com/Frint0/mass-pwn-vbulletin) - [M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit](https://github.com/M0sterHxck/CVE-2019-16759-Vbulletin-rce-exploit) - [r00tpgp/http-vuln-CVE-2019-16759](https://github.com/r00tpgp/http-vuln-CVE-2019-16759) - [jas502n/CVE-2019-16759](https://github.com/jas502n/CVE-2019-16759) - [andripwn/pwn-vbulletin](https://github.com/andripwn/pwn-vbulletin) ### CVE-2019-16784 - [AlterSolutions/PyInstallerPrivEsc](https://github.com/AlterSolutions/PyInstallerPrivEsc) ### CVE-2019-16889 - [grampae/meep](https://github.com/grampae/meep) ### CVE-2019-16920 - [NotEth1calHack3r/CVE-2019-16920-MassPwn3r](https://github.com/NotEth1calHack3r/CVE-2019-16920-MassPwn3r) ### CVE-2019-16941 - [purpleracc00n/CVE-2019-16941](https://github.com/purpleracc00n/CVE-2019-16941) ### CVE-2019-17080 - [Andhrimnirr/Mintinstall-object-injection](https://github.com/Andhrimnirr/Mintinstall-object-injection) ### CVE-2019-17124 - [hessandrew/CVE-2019-17124](https://github.com/hessandrew/CVE-2019-17124) ### CVE-2019-17221 - [h4ckologic/CVE-2019-17221](https://github.com/h4ckologic/CVE-2019-17221) ### CVE-2019-17234 - [administra1tor/CVE-2019-17234-Wordpress-DirStroyer](https://github.com/administra1tor/CVE-2019-17234-Wordpress-DirStroyer) ### CVE-2019-17424 - [guywhataguy/CVE-2019-17424](https://github.com/guywhataguy/CVE-2019-17424) ### CVE-2019-17427 - [RealLinkers/CVE-2019-17427](https://github.com/RealLinkers/CVE-2019-17427) ### CVE-2019-17495 - [SecT0uch/CVE-2019-17495-test](https://github.com/SecT0uch/CVE-2019-17495-test) ### CVE-2019-17558 - [SDNDTeam/CVE-2019-17558_Solr_Vul_Tool](https://github.com/SDNDTeam/CVE-2019-17558_Solr_Vul_Tool) ### CVE-2019-17570 - [r00t4dm/CVE-2019-17570](https://github.com/r00t4dm/CVE-2019-17570) - [orangecertcc/xmlrpc-common-deserialization](https://github.com/orangecertcc/xmlrpc-common-deserialization) ### CVE-2019-17571 - [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571) ### CVE-2019-17596 - [pquerna/poc-dsa-verify-CVE-2019-17596](https://github.com/pquerna/poc-dsa-verify-CVE-2019-17596) ### CVE-2019-17625 - [Ekultek/CVE-2019-17625](https://github.com/Ekultek/CVE-2019-17625) ### CVE-2019-17633 - [mgrube/CVE-2019-17633](https://github.com/mgrube/CVE-2019-17633) ### CVE-2019-1821 - [k8gege/CiscoExploit](https://github.com/k8gege/CiscoExploit) ### CVE-2019-18371 - [UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC](https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC) ### CVE-2019-18418 - [Andhrimnirr/ClonOS-WEB-control-panel-multi-vulnerability](https://github.com/Andhrimnirr/ClonOS-WEB-control-panel-multi-vulnerability) ### CVE-2019-18634 - [Plazmaz/CVE-2019-18634](https://github.com/Plazmaz/CVE-2019-18634) - [saleemrashid/sudo-cve-2019-18634](https://github.com/saleemrashid/sudo-cve-2019-18634) ### CVE-2019-18873 - [fuzzlove/FUDforum-XSS-RCE](https://github.com/fuzzlove/FUDforum-XSS-RCE) ### CVE-2019-18885 - [bobfuzzer/CVE-2019-18885](https://github.com/bobfuzzer/CVE-2019-18885) ### CVE-2019-18890 - [RealLinkers/CVE-2019-18890](https://github.com/RealLinkers/CVE-2019-18890) ### CVE-2019-18935 - [bao7uo/RAU_crypto](https://github.com/bao7uo/RAU_crypto) - [noperator/CVE-2019-18935](https://github.com/noperator/CVE-2019-18935) ### CVE-2019-19012 - [ManhNDd/CVE-2019-19012](https://github.com/ManhNDd/CVE-2019-19012) - [tarantula-team/CVE-2019-19012](https://github.com/tarantula-team/CVE-2019-19012) ### CVE-2019-19033 - [ricardojoserf/CVE-2019-19033](https://github.com/ricardojoserf/CVE-2019-19033) ### CVE-2019-19203 - [ManhNDd/CVE-2019-19203](https://github.com/ManhNDd/CVE-2019-19203) - [tarantula-team/CVE-2019-19203](https://github.com/tarantula-team/CVE-2019-19203) ### CVE-2019-19204 - [ManhNDd/CVE-2019-19204](https://github.com/ManhNDd/CVE-2019-19204) - [tarantula-team/CVE-2019-19204](https://github.com/tarantula-team/CVE-2019-19204) ### CVE-2019-19231 - [hessandrew/CVE-2019-19231](https://github.com/hessandrew/CVE-2019-19231) ### CVE-2019-19268 - [TheCyberGeek/CVE-2019-19268](https://github.com/TheCyberGeek/CVE-2019-19268) ### CVE-2019-19315 - [monoxgas/mailorder](https://github.com/monoxgas/mailorder) ### CVE-2019-19356 - [shadowgatt/CVE-2019-19356](https://github.com/shadowgatt/CVE-2019-19356) ### CVE-2019-19368 - [harshit-shukla/CVE-2019-19368](https://github.com/harshit-shukla/CVE-2019-19368) ### CVE-2019-19369 - [TheCyberGeek/CVE-2019-19369](https://github.com/TheCyberGeek/CVE-2019-19369) ### CVE-2019-19383 - [m0rph-1/CVE-2019-19383](https://github.com/m0rph-1/CVE-2019-19383) ### CVE-2019-19511 - [jra89/CVE-2019-19511](https://github.com/jra89/CVE-2019-19511) ### CVE-2019-19550 - [underprotection/CVE-2019-19550](https://github.com/underprotection/CVE-2019-19550) ### CVE-2019-19576 - [jra89/CVE-2019-19576](https://github.com/jra89/CVE-2019-19576) ### CVE-2019-19633 - [jra89/CVE-2019-19633](https://github.com/jra89/CVE-2019-19633) ### CVE-2019-19634 - [jra89/CVE-2019-19634](https://github.com/jra89/CVE-2019-19634) ### CVE-2019-19651 - [jra89/CVE-2019-19651](https://github.com/jra89/CVE-2019-19651) ### CVE-2019-19652 - [jra89/CVE-2019-19652](https://github.com/jra89/CVE-2019-19652) ### CVE-2019-19653 - [jra89/CVE-2019-19653](https://github.com/jra89/CVE-2019-19653) ### CVE-2019-19654 - [jra89/CVE-2019-19654](https://github.com/jra89/CVE-2019-19654) ### CVE-2019-19658 - [jra89/CVE-2019-19658](https://github.com/jra89/CVE-2019-19658) ### CVE-2019-19699 - [SpengeSec/CVE-2019-19699](https://github.com/SpengeSec/CVE-2019-19699) ### CVE-2019-19732 - [jra89/CVE-2019-19732](https://github.com/jra89/CVE-2019-19732) ### CVE-2019-19733 - [jra89/CVE-2019-19733](https://github.com/jra89/CVE-2019-19733) ### CVE-2019-19734 - [jra89/CVE-2019-19734](https://github.com/jra89/CVE-2019-19734) ### CVE-2019-19735 - [jra89/CVE-2019-19735](https://github.com/jra89/CVE-2019-19735) ### CVE-2019-19738 - [jra89/CVE-2019-19738](https://github.com/jra89/CVE-2019-19738) ### CVE-2019-19781 - [mekoko/CVE-2019-19781](https://github.com/mekoko/CVE-2019-19781) - [projectzeroindia/CVE-2019-19781](https://github.com/projectzeroindia/CVE-2019-19781) - [trustedsec/cve-2019-19781](https://github.com/trustedsec/cve-2019-19781) - [cisagov/check-cve-2019-19781](https://github.com/cisagov/check-cve-2019-19781) - [jas502n/CVE-2019-19781](https://github.com/jas502n/CVE-2019-19781) - [ianxtianxt/CVE-2019-19781](https://github.com/ianxtianxt/CVE-2019-19781) - [mpgn/CVE-2019-19781](https://github.com/mpgn/CVE-2019-19781) - [oways/CVE-2019-19781](https://github.com/oways/CVE-2019-19781) - [becrevex/Citrix_CVE-2019-19781](https://github.com/becrevex/Citrix_CVE-2019-19781) - [unknowndevice64/Exploits_CVE-2019-19781](https://github.com/unknowndevice64/Exploits_CVE-2019-19781) - [bufsnake/CVE-2019-19781](https://github.com/bufsnake/CVE-2019-19781) - [x1sec/citrixmash_scanner](https://github.com/x1sec/citrixmash_scanner) - [Jabo-SCO/Shitrix-CVE-2019-19781](https://github.com/Jabo-SCO/Shitrix-CVE-2019-19781) - [x1sec/CVE-2019-19781](https://github.com/x1sec/CVE-2019-19781) - [hollerith/CVE-2019-19781](https://github.com/hollerith/CVE-2019-19781) - [aqhmal/CVE-2019-19781](https://github.com/aqhmal/CVE-2019-19781) - [MalwareTech/CitrixHoneypot](https://github.com/MalwareTech/CitrixHoneypot) - [mekhalleh/citrix_dir_traversal_rce](https://github.com/mekhalleh/citrix_dir_traversal_rce) - [zenturacp/cve-2019-19781-web](https://github.com/zenturacp/cve-2019-19781-web) - [zgelici/CVE-2019-19781-Checker](https://github.com/zgelici/CVE-2019-19781-Checker) - [digitalshadows/CVE-2019-19781_IOCs](https://github.com/digitalshadows/CVE-2019-19781_IOCs) - [onSec-fr/CVE-2019-19781-Forensic](https://github.com/onSec-fr/CVE-2019-19781-Forensic) - [DanielWep/CVE-NetScalerFileSystemCheck](https://github.com/DanielWep/CVE-NetScalerFileSystemCheck) - [Castaldio86/Detect-CVE-2019-19781](https://github.com/Castaldio86/Detect-CVE-2019-19781) - [j81blog/ADC-19781](https://github.com/j81blog/ADC-19781) - [clm123321/Citrix_CVE-2019-19781](https://github.com/clm123321/Citrix_CVE-2019-19781) - [b510/CVE-2019-19781](https://github.com/b510/CVE-2019-19781) - [redscan/CVE-2019-19781](https://github.com/redscan/CVE-2019-19781) - [DIVD-NL/Citrix-CVE-2019-19781](https://github.com/DIVD-NL/Citrix-CVE-2019-19781) - [ynsmroztas/citrix.sh](https://github.com/ynsmroztas/citrix.sh) - [c4pt41nnn/massCitrix](https://github.com/c4pt41nnn/massCitrix) - [fireeye/ioc-scanner-CVE-2019-19781](https://github.com/fireeye/ioc-scanner-CVE-2019-19781) - [citrix/ioc-scanner-CVE-2019-19781](https://github.com/citrix/ioc-scanner-CVE-2019-19781) - [x1sec/citrix-honeypot](https://github.com/x1sec/citrix-honeypot) - [L4r1k/CitrixNetscalerAnalysis](https://github.com/L4r1k/CitrixNetscalerAnalysis) - [Azeemering/CVE-2019-19781-DFIR-Notes](https://github.com/Azeemering/CVE-2019-19781-DFIR-Notes) - [0xams/citrixvulncheck](https://github.com/0xams/citrixvulncheck) - [RaulCalvoLaorden/CVE-2019-19781](https://github.com/RaulCalvoLaorden/CVE-2019-19781) ### CVE-2019-19844 - [ryu22e/django_cve_2019_19844_poc](https://github.com/ryu22e/django_cve_2019_19844_poc) - [andripwn/django_cve201919844](https://github.com/andripwn/django_cve201919844) - [0xsha/CVE_2019_19844](https://github.com/0xsha/CVE_2019_19844) ### CVE-2019-1987 - [marcinguy/android-7-9-png-bug](https://github.com/marcinguy/android-7-9-png-bug) ### CVE-2019-19871 - [VDISEC/CVE-2019-19871-AuditGuide](https://github.com/VDISEC/CVE-2019-19871-AuditGuide) ### CVE-2019-20059 - [jra89/CVE-2019-20059](https://github.com/jra89/CVE-2019-20059) ### CVE-2019-20197 - [lp008/CVE-2019-20197](https://github.com/lp008/CVE-2019-20197) - [jas502n/CVE-2019-20197](https://github.com/jas502n/CVE-2019-20197) ### CVE-2019-20224 - [mhaskar/CVE-2019-20224](https://github.com/mhaskar/CVE-2019-20224) ### CVE-2019-20327 - [Diefunction/CVE-2019-20327](https://github.com/Diefunction/CVE-2019-20327) ### CVE-2019-20335 - [TheCyberGeek/CVE-2019-20335](https://github.com/TheCyberGeek/CVE-2019-20335) ### CVE-2019-2107 - [marcinguy/CVE-2019-2107](https://github.com/marcinguy/CVE-2019-2107) - [infiniteLoopers/CVE-2019-2107](https://github.com/infiniteLoopers/CVE-2019-2107) ### CVE-2019-2196 - [IOActive/AOSP-DownloadProviderDbDumperSQLiLimit](https://github.com/IOActive/AOSP-DownloadProviderDbDumperSQLiLimit) ### CVE-2019-2198 - [IOActive/AOSP-DownloadProviderDbDumperSQLiWhere](https://github.com/IOActive/AOSP-DownloadProviderDbDumperSQLiWhere) ### CVE-2019-2215 - [timwr/CVE-2019-2215](https://github.com/timwr/CVE-2019-2215) - [addhaloka/CVE-2019-2215](https://github.com/addhaloka/CVE-2019-2215) - [kangtastic/cve-2019-2215](https://github.com/kangtastic/cve-2019-2215) - [marcinguy/CVE-2019-2215](https://github.com/marcinguy/CVE-2019-2215) ### CVE-2019-2525 - [Phantomn/VirtualBox_CVE-2019-2525-CVE-2019-2548](https://github.com/Phantomn/VirtualBox_CVE-2019-2525-CVE-2019-2548) - [wotmd/VirtualBox-6.0.0-Exploit-1-day](https://github.com/wotmd/VirtualBox-6.0.0-Exploit-1-day) ### CVE-2019-2615 - [chiaifan/CVE-2019-2615](https://github.com/chiaifan/CVE-2019-2615) ### CVE-2019-2618 - [pyn3rd/CVE-2019-2618](https://github.com/pyn3rd/CVE-2019-2618) - [jas502n/cve-2019-2618](https://github.com/jas502n/cve-2019-2618) - [wsfengfan/CVE-2019-2618-](https://github.com/wsfengfan/CVE-2019-2618-) - [dr0op/WeblogicScan](https://github.com/dr0op/WeblogicScan) - [he1dan/cve-2019-2618](https://github.com/he1dan/cve-2019-2618) - [ianxtianxt/cve-2019-2618](https://github.com/ianxtianxt/cve-2019-2618) ### CVE-2019-2725 - [shack2/javaserializetools](https://github.com/shack2/javaserializetools) - [SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961](https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961) - [iceMatcha/CNTA-2019-0014xCVE-2019-2725](https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725) - [lasensio/cve-2019-2725](https://github.com/lasensio/cve-2019-2725) - [davidmthomsen/CVE-2019-2725](https://github.com/davidmthomsen/CVE-2019-2725) - [leerina/CVE-2019-2725](https://github.com/leerina/CVE-2019-2725) - [zhusx110/cve-2019-2725](https://github.com/zhusx110/cve-2019-2725) - [lufeirider/CVE-2019-2725](https://github.com/lufeirider/CVE-2019-2725) - [CVCLabs/cve-2019-2725](https://github.com/CVCLabs/cve-2019-2725) - [TopScrew/CVE-2019-2725](https://github.com/TopScrew/CVE-2019-2725) - [welove88888/CVE-2019-2725](https://github.com/welove88888/CVE-2019-2725) - [jiansiting/CVE-2019-2725](https://github.com/jiansiting/CVE-2019-2725) - [kerlingcode/CVE-2019-2725](https://github.com/kerlingcode/CVE-2019-2725) - [black-mirror/Weblogic](https://github.com/black-mirror/Weblogic) - [pimps/CVE-2019-2725](https://github.com/pimps/CVE-2019-2725) - [ianxtianxt/CVE-2019-2725](https://github.com/ianxtianxt/CVE-2019-2725) - [GEIGEI123/CVE-2019-2725-POC](https://github.com/GEIGEI123/CVE-2019-2725-POC) - [GGyao/weblogic_2019_2725_wls_batch](https://github.com/GGyao/weblogic_2019_2725_wls_batch) ### CVE-2019-2729 - [waffl3ss/CVE-2019-2729](https://github.com/waffl3ss/CVE-2019-2729) ### CVE-2019-2888 - [21superman/weblogic_cve-2019-2888](https://github.com/21superman/weblogic_cve-2019-2888) - [jas502n/CVE-2019-2888](https://github.com/jas502n/CVE-2019-2888) ### CVE-2019-2890 - [ZO1RO/CVE-2019-2890](https://github.com/ZO1RO/CVE-2019-2890) - [Ky0-HVA/CVE-2019-2890](https://github.com/Ky0-HVA/CVE-2019-2890) - [SukaraLin/CVE-2019-2890](https://github.com/SukaraLin/CVE-2019-2890) - [jas502n/CVE-2019-2890](https://github.com/jas502n/CVE-2019-2890) - [ianxtianxt/CVE-2019-2890](https://github.com/ianxtianxt/CVE-2019-2890) ### CVE-2019-3394 - [jas502n/CVE-2019-3394](https://github.com/jas502n/CVE-2019-3394) ### CVE-2019-3396 - [dothanthitiendiettiende/CVE-2019-3396](https://github.com/dothanthitiendiettiende/CVE-2019-3396) - [x-f1v3/CVE-2019-3396](https://github.com/x-f1v3/CVE-2019-3396) - [shadowsock5/CVE-2019-3396](https://github.com/shadowsock5/CVE-2019-3396) - [Yt1g3r/CVE-2019-3396_EXP](https://github.com/Yt1g3r/CVE-2019-3396_EXP) - [jas502n/CVE-2019-3396](https://github.com/jas502n/CVE-2019-3396) - [pyn3rd/CVE-2019-3396](https://github.com/pyn3rd/CVE-2019-3396) - [7e1/CVE-2019-3396](https://github.com/7e1/CVE-2019-3396) - [quanpt103/CVE-2019-3396](https://github.com/quanpt103/CVE-2019-3396) - [vntest11/confluence_CVE-2019-3396](https://github.com/vntest11/confluence_CVE-2019-3396) - [tanw923/test1](https://github.com/tanw923/test1) - [skommando/CVE-2019-3396-confluence-poc](https://github.com/skommando/CVE-2019-3396-confluence-poc) - [JonathanZhou348/CVE-2019-3396TEST](https://github.com/JonathanZhou348/CVE-2019-3396TEST) - [am6539/CVE-2019-3396](https://github.com/am6539/CVE-2019-3396) - [W2Ning/CVE-2019-3396](https://github.com/W2Ning/CVE-2019-3396) ### CVE-2019-3398 - [superevr/cve-2019-3398](https://github.com/superevr/cve-2019-3398) ### CVE-2019-3462 - [tonejito/check_CVE-2019-3462](https://github.com/tonejito/check_CVE-2019-3462) - [atilacastro/update-apt-package](https://github.com/atilacastro/update-apt-package) ### CVE-2019-3663 - [funoverip/mcafee_atd_CVE-2019-3663](https://github.com/funoverip/mcafee_atd_CVE-2019-3663) ### CVE-2019-3719 - [jiansiting/CVE-2019-3719](https://github.com/jiansiting/CVE-2019-3719) ### CVE-2019-3778 - [BBB-man/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection](https://github.com/BBB-man/CVE-2019-3778-Spring-Security-OAuth-2.3-Open-Redirection) ### CVE-2019-3799 - [mpgn/CVE-2019-3799](https://github.com/mpgn/CVE-2019-3799) ### CVE-2019-3847 - [danielthatcher/moodle-login-csrf](https://github.com/danielthatcher/moodle-login-csrf) ### CVE-2019-3929 - [xfox64x/CVE-2019-3929](https://github.com/xfox64x/CVE-2019-3929) ### CVE-2019-48814 - [wucj001/cve-2019-48814](https://github.com/wucj001/cve-2019-48814) ### CVE-2019-5010 - [JonathanWilbur/CVE-2019-5010](https://github.com/JonathanWilbur/CVE-2019-5010) ### CVE-2019-5418 - [mpgn/CVE-2019-5418](https://github.com/mpgn/CVE-2019-5418) - [omarkurt/CVE-2019-5418](https://github.com/omarkurt/CVE-2019-5418) - [brompwnie/CVE-2019-5418-Scanner](https://github.com/brompwnie/CVE-2019-5418-Scanner) - [mpgn/Rails-doubletap-RCE](https://github.com/mpgn/Rails-doubletap-RCE) - [takeokunn/CVE-2019-5418](https://github.com/takeokunn/CVE-2019-5418) - [Bad3r/RailroadBandit](https://github.com/Bad3r/RailroadBandit) - [ztgrace/CVE-2019-5418-Rails3](https://github.com/ztgrace/CVE-2019-5418-Rails3) - [random-robbie/CVE-2019-5418](https://github.com/random-robbie/CVE-2019-5418) ### CVE-2019-5420 - [knqyf263/CVE-2019-5420](https://github.com/knqyf263/CVE-2019-5420) - [cved-sources/cve-2019-5420](https://github.com/cved-sources/cve-2019-5420) ### CVE-2019-5475 - [jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-](https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-) ### CVE-2019-5489 - [mmxsrup/CVE-2019-5489](https://github.com/mmxsrup/CVE-2019-5489) ### CVE-2019-5624 - [VoidSec/CVE-2019-5624](https://github.com/VoidSec/CVE-2019-5624) ### CVE-2019-5630 - [rbeede/CVE-2019-5630](https://github.com/rbeede/CVE-2019-5630) ### CVE-2019-5700 - [oscardagrach/CVE-2019-5700](https://github.com/oscardagrach/CVE-2019-5700) ### CVE-2019-5736 - [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc) - [Frichetten/CVE-2019-5736-PoC](https://github.com/Frichetten/CVE-2019-5736-PoC) - [jas502n/CVE-2019-5736](https://github.com/jas502n/CVE-2019-5736) - [denmilu/CVE-2019-5736](https://github.com/denmilu/CVE-2019-5736) - [denmilu/cve-2019-5736-poc](https://github.com/denmilu/cve-2019-5736-poc) - [agppp/cve-2019-5736-poc](https://github.com/agppp/cve-2019-5736-poc) - [Matthew-Stacks/cve-2019-5736](https://github.com/Matthew-Stacks/cve-2019-5736) - [ebdecastro/poc-cve-2019-5736](https://github.com/ebdecastro/poc-cve-2019-5736) - [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736) - [k-onishi/CVE-2019-5736-PoC](https://github.com/k-onishi/CVE-2019-5736-PoC) - [k-onishi/CVE-2019-5736-PoC-0](https://github.com/k-onishi/CVE-2019-5736-PoC-0) - [zyriuse75/CVE-2019-5736-PoC](https://github.com/zyriuse75/CVE-2019-5736-PoC) - [stillan00b/CVE-2019-5736](https://github.com/stillan00b/CVE-2019-5736) - [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp) - [13paulmurith/Docker-Runc-Exploit](https://github.com/13paulmurith/Docker-Runc-Exploit) - [RyanNgWH/CVE-2019-5736-POC](https://github.com/RyanNgWH/CVE-2019-5736-POC) - [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study) - [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc) - [epsteina16/Docker-Escape-Miner](https://github.com/epsteina16/Docker-Escape-Miner) ### CVE-2019-5786 - [exodusintel/CVE-2019-5786](https://github.com/exodusintel/CVE-2019-5786) ### CVE-2019-5825 - [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825) ### CVE-2019-5893 - [EmreOvunc/OpenSource-ERP-SQL-Injection](https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection) ### CVE-2019-6203 - [qingxp9/CVE-2019-6203-PoC](https://github.com/qingxp9/CVE-2019-6203-PoC) ### CVE-2019-6207 - [dothanthitiendiettiende/CVE-2019-6207](https://github.com/dothanthitiendiettiende/CVE-2019-6207) - [maldiohead/CVE-2019-6207](https://github.com/maldiohead/CVE-2019-6207) ### CVE-2019-6225 - [fatgrass/OsirisJailbreak12](https://github.com/fatgrass/OsirisJailbreak12) - [TrungNguyen1909/CVE-2019-6225-macOS](https://github.com/TrungNguyen1909/CVE-2019-6225-macOS) - [raystyle/jailbreak-iOS12](https://github.com/raystyle/jailbreak-iOS12) ### CVE-2019-6249 - [NMTech0x90/CVE-2019-6249_Hucart-cms](https://github.com/NMTech0x90/CVE-2019-6249_Hucart-cms) ### CVE-2019-6260 - [amboar/cve-2019-6260](https://github.com/amboar/cve-2019-6260) ### CVE-2019-6263 - [praveensutar/CVE-2019-6263-Joomla-POC](https://github.com/praveensutar/CVE-2019-6263-Joomla-POC) ### CVE-2019-6329 - [ManhNDd/CVE-2019-6329](https://github.com/ManhNDd/CVE-2019-6329) ### CVE-2019-6340 - [g0rx/Drupal-SA-CORE-2019-003](https://github.com/g0rx/Drupal-SA-CORE-2019-003) - [knqyf263/CVE-2019-6340](https://github.com/knqyf263/CVE-2019-6340) - [DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass](https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass) - [oways/CVE-2019-6340](https://github.com/oways/CVE-2019-6340) - [cved-sources/cve-2019-6340](https://github.com/cved-sources/cve-2019-6340) - [d1vious/cve-2019-6340-bits](https://github.com/d1vious/cve-2019-6340-bits) - [jas502n/CVE-2019-6340](https://github.com/jas502n/CVE-2019-6340) ### CVE-2019-6440 - [hexnone/CVE-2019-6440](https://github.com/hexnone/CVE-2019-6440) ### CVE-2019-6446 - [RayScri/CVE-2019-6446](https://github.com/RayScri/CVE-2019-6446) ### CVE-2019-6447 - [fs0c131y/ESFileExplorerOpenPortVuln](https://github.com/fs0c131y/ESFileExplorerOpenPortVuln) ### CVE-2019-6453 - [proofofcalc/cve-2019-6453-poc](https://github.com/proofofcalc/cve-2019-6453-poc) - [andripwn/mIRC-CVE-2019-6453](https://github.com/andripwn/mIRC-CVE-2019-6453) ### CVE-2019-6467 - [knqyf263/CVE-2019-6467](https://github.com/knqyf263/CVE-2019-6467) ### CVE-2019-6487 - [afang5472/TP-Link-WDR-Router-Command-injection_POC](https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC) ### CVE-2019-6690 - [stigtsp/CVE-2019-6690-python-gnupg-vulnerability](https://github.com/stigtsp/CVE-2019-6690-python-gnupg-vulnerability) - [brianwrf/CVE-2019-6690](https://github.com/brianwrf/CVE-2019-6690) ### CVE-2019-6715 - [random-robbie/cve-2019-6715](https://github.com/random-robbie/cve-2019-6715) ### CVE-2019-7216 - [Ekultek/CVE-2019-7216](https://github.com/Ekultek/CVE-2019-7216) ### CVE-2019-7219 - [verifysecurity/CVE-2019-7219](https://github.com/verifysecurity/CVE-2019-7219) ### CVE-2019-7238 - [mpgn/CVE-2019-7238](https://github.com/mpgn/CVE-2019-7238) - [jas502n/CVE-2019-7238](https://github.com/jas502n/CVE-2019-7238) - [verctor/nexus_rce_CVE-2019-7238](https://github.com/verctor/nexus_rce_CVE-2019-7238) - [magicming200/CVE-2019-7238_Nexus_RCE_Tool](https://github.com/magicming200/CVE-2019-7238_Nexus_RCE_Tool) ### CVE-2019-7304 - [initstring/dirty_sock](https://github.com/initstring/dirty_sock) - [SecuritySi/CVE-2019-7304_DirtySock](https://github.com/SecuritySi/CVE-2019-7304_DirtySock) ### CVE-2019-7609 - [jas502n/kibana-RCE](https://github.com/jas502n/kibana-RCE) - [mpgn/CVE-2019-7609](https://github.com/mpgn/CVE-2019-7609) - [LandGrey/CVE-2019-7609](https://github.com/LandGrey/CVE-2019-7609) - [hekadan/CVE-2019-7609](https://github.com/hekadan/CVE-2019-7609) ### CVE-2019-7610 - [whoami0622/CVE-2019-7610](https://github.com/whoami0622/CVE-2019-7610) ### CVE-2019-7642 - [xw77cve/CVE-2019-7642](https://github.com/xw77cve/CVE-2019-7642) ### CVE-2019-7839 - [securifera/CVE-2019-7839](https://github.com/securifera/CVE-2019-7839) ### CVE-2019-8389 - [shawarkhanethicalhacker/CVE-2019-8389](https://github.com/shawarkhanethicalhacker/CVE-2019-8389) ### CVE-2019-8449 - [mufeedvh/CVE-2019-8449](https://github.com/mufeedvh/CVE-2019-8449) ### CVE-2019-8451 - [0xbug/CVE-2019-8451](https://github.com/0xbug/CVE-2019-8451) - [ianxtianxt/CVE-2019-8451](https://github.com/ianxtianxt/CVE-2019-8451) - [jas502n/CVE-2019-8451](https://github.com/jas502n/CVE-2019-8451) - [h0ffayyy/Jira-CVE-2019-8451](https://github.com/h0ffayyy/Jira-CVE-2019-8451) ### CVE-2019-8513 - [Gentle-Knife/cve-2019-8513](https://github.com/Gentle-Knife/cve-2019-8513) ### CVE-2019-8540 - [maldiohead/CVE-2019-8540](https://github.com/maldiohead/CVE-2019-8540) ### CVE-2019-8565 - [Gentle-Knife/cve-2019-8565](https://github.com/Gentle-Knife/cve-2019-8565) ### CVE-2019-8591 - [jsherman212/used_sock](https://github.com/jsherman212/used_sock) ### CVE-2019-8601 - [BadAccess11/CVE-2019-8601](https://github.com/BadAccess11/CVE-2019-8601) ### CVE-2019-8627 - [maldiohead/CVE-2019-8627](https://github.com/maldiohead/CVE-2019-8627) ### CVE-2019-8781 - [A2nkF/macOS-Kernel-Exploit](https://github.com/A2nkF/macOS-Kernel-Exploit) - [TrungNguyen1909/CVE-2019-8781-macOS](https://github.com/TrungNguyen1909/CVE-2019-8781-macOS) ### CVE-2019-8942 - [brianwrf/WordPress_4.9.8_RCE_POC](https://github.com/brianwrf/WordPress_4.9.8_RCE_POC) - [synacktiv/CVE-2019-8942](https://github.com/synacktiv/CVE-2019-8942) ### CVE-2019-8956 - [butterflyhack/CVE-2019-8956](https://github.com/butterflyhack/CVE-2019-8956) ### CVE-2019-8978 - [JoshuaMulliken/CVE-2019-8978](https://github.com/JoshuaMulliken/CVE-2019-8978) ### CVE-2019-8997 - [nxkennedy/CVE-2019-8997](https://github.com/nxkennedy/CVE-2019-8997) ### CVE-2019-9126 - [0days/CVE-2019-9126](https://github.com/0days/CVE-2019-9126) ### CVE-2019-9153 - [ZenyWay/opgp-service-cve-2019-9153](https://github.com/ZenyWay/opgp-service-cve-2019-9153) ### CVE-2019-9184 - [cved-sources/cve-2019-9184](https://github.com/cved-sources/cve-2019-9184) ### CVE-2019-9194 - [cved-sources/cve-2019-9194](https://github.com/cved-sources/cve-2019-9194) ### CVE-2019-9202 - [polict/CVE-2019-9202](https://github.com/polict/CVE-2019-9202) ### CVE-2019-9506 - [francozappa/knob](https://github.com/francozappa/knob) ### CVE-2019-9580 - [mpgn/CVE-2019-9580](https://github.com/mpgn/CVE-2019-9580) ### CVE-2019-9596 - [gerwout/CVE-2019-9596-and-CVE-2019-9597](https://github.com/gerwout/CVE-2019-9596-and-CVE-2019-9597) ### CVE-2019-9599 - [s4vitar/AirDroidPwner](https://github.com/s4vitar/AirDroidPwner) ### CVE-2019-9621 - [k8gege/ZimbraExploit](https://github.com/k8gege/ZimbraExploit) ### CVE-2019-9653 - [grayoneday/CVE-2019-9653](https://github.com/grayoneday/CVE-2019-9653) ### CVE-2019-9670 - [rek7/Zimbra-RCE](https://github.com/rek7/Zimbra-RCE) - [attackgithub/Zimbra-RCE](https://github.com/attackgithub/Zimbra-RCE) ### CVE-2019-9673 - [mgrube/CVE-2019-9673](https://github.com/mgrube/CVE-2019-9673) ### CVE-2019-9729 - [HyperSine/SdoKeyCrypt-sys-local-privilege-elevation](https://github.com/HyperSine/SdoKeyCrypt-sys-local-privilege-elevation) ### CVE-2019-9730 - [jthuraisamy/CVE-2019-9730](https://github.com/jthuraisamy/CVE-2019-9730) ### CVE-2019-9745 - [KPN-CISO/CVE-2019-9745](https://github.com/KPN-CISO/CVE-2019-9745) ### CVE-2019-9766 - [moonheadobj/cve-2019](https://github.com/moonheadobj/cve-2019) ### CVE-2019-9787 - [rkatogit/cve-2019-9787_csrf_poc](https://github.com/rkatogit/cve-2019-9787_csrf_poc) - [PalmTreeForest/CodePath_Week_7-8](https://github.com/PalmTreeForest/CodePath_Week_7-8) ### CVE-2019-9810 - [xuechiyaobai/CVE-2019-9810-PoC](https://github.com/xuechiyaobai/CVE-2019-9810-PoC) - [0vercl0k/CVE-2019-9810](https://github.com/0vercl0k/CVE-2019-9810) ### CVE-2019-9896 - [yasinyilmaz/vuln-chm-hijack](https://github.com/yasinyilmaz/vuln-chm-hijack) ### CVE-2019-9978 - [mpgn/CVE-2019-9978](https://github.com/mpgn/CVE-2019-9978) - [hash3liZer/CVE-2019-9978](https://github.com/hash3liZer/CVE-2019-9978) - [KTN1990/CVE-2019-9978](https://github.com/KTN1990/CVE-2019-9978) - [cved-sources/cve-2019-9978](https://github.com/cved-sources/cve-2019-9978) ## 2020 ### CVE-2020-0601 - [nissan-sudo/CVE-2020-0601](https://github.com/nissan-sudo/CVE-2020-0601) - [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601) - [SherlockSec/CVE-2020-0601](https://github.com/SherlockSec/CVE-2020-0601) - [JPurrier/CVE-2020-0601](https://github.com/JPurrier/CVE-2020-0601) - [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin) - [ollypwn/CurveBall](https://github.com/ollypwn/CurveBall) - [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools) - [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601) - [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601) - [apmunch/CVE-2020-0601](https://github.com/apmunch/CVE-2020-0601) - [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams) - [0xxon/cve-2020-0601-utils](https://github.com/0xxon/cve-2020-0601-utils) - [Doug-Moody/Windows10_Cumulative_Updates_PowerShell](https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell) - [MarkusZehnle/CVE-2020-0601](https://github.com/MarkusZehnle/CVE-2020-0601) - [YoannDqr/CVE-2020-0601](https://github.com/YoannDqr/CVE-2020-0601) - [thimelp/cve-2020-0601-Perl](https://github.com/thimelp/cve-2020-0601-Perl) - [dlee35/curveball_lua](https://github.com/dlee35/curveball_lua) - [IIICTECH/-CVE-2020-0601-ECC---EXPLOIT](https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT) - [cosmicifint/CVE-2020-0601](https://github.com/cosmicifint/CVE-2020-0601) - [gentilkiwi/curveball](https://github.com/gentilkiwi/curveball) - [Hans-MartinHannibalLauridsen/CurveBall](https://github.com/Hans-MartinHannibalLauridsen/CurveBall) - [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall) - [ioncodes/Curveball](https://github.com/ioncodes/Curveball) - [amlweems/gringotts](https://github.com/amlweems/gringotts) - [aloswoya/CVE-2020-0601](https://github.com/aloswoya/CVE-2020-0601) - [talbeerysec/CurveBallDetection](https://github.com/talbeerysec/CurveBallDetection) - [david4599/CurveballCertTool](https://github.com/david4599/CurveballCertTool) ### CVE-2020-0609 - [2d4d/rdg_scanner_cve-2020-0609](https://github.com/2d4d/rdg_scanner_cve-2020-0609) - [ollypwn/BlueGate](https://github.com/ollypwn/BlueGate) - [MalwareTech/RDGScanner](https://github.com/MalwareTech/RDGScanner) - [Bechsen/CVE-2020-0609](https://github.com/Bechsen/CVE-2020-0609) - [ioncodes/BlueGate](https://github.com/ioncodes/BlueGate) ### CVE-2020-0674 - [binaryfigments/CVE-2020-0674](https://github.com/binaryfigments/CVE-2020-0674) ### CVE-2020-1611 - [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611) ### CVE-2020-2551 - [jas502n/CVE-2020-2551](https://github.com/jas502n/CVE-2020-2551) - [hktalent/CVE-2020-2551](https://github.com/hktalent/CVE-2020-2551) ### CVE-2020-2655 - [RUB-NDS/CVE-2020-2655-DemoServer](https://github.com/RUB-NDS/CVE-2020-2655-DemoServer) ### CVE-2020-3833 - [c0d3G33k/Safari-Address-Bar-Spoof-CVE-2020-3833-](https://github.com/c0d3G33k/Safari-Address-Bar-Spoof-CVE-2020-3833-) ### CVE-2020-5179 - [CesarSilence/RCE-CVE-2020-5179](https://github.com/CesarSilence/RCE-CVE-2020-5179) ### CVE-2020-5236 - [motikan2010/CVE-2020-5236](https://github.com/motikan2010/CVE-2020-5236) ### CVE-2020-5398 - [motikan2010/CVE-2020-5398](https://github.com/motikan2010/CVE-2020-5398) ### CVE-2020-5509 - [FULLSHADE/CVE-2020-5509-POC](https://github.com/FULLSHADE/CVE-2020-5509-POC) ### CVE-2020-5844 - [TheCyberGeek/CVE-2020-5844](https://github.com/TheCyberGeek/CVE-2020-5844) ### CVE-2020-609 - [Bechsen/CVE-2020-609-POC](https://github.com/Bechsen/CVE-2020-609-POC) ### CVE-2020-6172 - [Jeff-Rowell/CVE-2020-6172](https://github.com/Jeff-Rowell/CVE-2020-6172) ### CVE-2020-72381 - [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381) ### CVE-2020-7247 - [FiroSolutions/cve-2020-7247-exploit](https://github.com/FiroSolutions/cve-2020-7247-exploit) ### CVE-2020-7471 - [Saferman/CVE-2020-7471](https://github.com/Saferman/CVE-2020-7471) ### CVE-2020-7799 - [Pikaqi/cve-2020-7799](https://github.com/Pikaqi/cve-2020-7799) ### CVE-2020-7980 - [Xh4H/Satellian-CVE-2020-7980](https://github.com/Xh4H/Satellian-CVE-2020-7980) ### CVE-2020-8417 - [VulnCrate/WP-CodeSnippets-CVE-2020-8417](https://github.com/VulnCrate/WP-CodeSnippets-CVE-2020-8417) ### CVE-2020-8825 - [hacky1997/CVE-2020-8825](https://github.com/hacky1997/CVE-2020-8825)