add full run exploits
This commit is contained in:
parent
cff6eaf1f9
commit
ff7b94b7f9
747 changed files with 19053 additions and 0 deletions
20
exploits/1999/CVE-1999-0016.json
Normal file
20
exploits/1999/CVE-1999-0016.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-1999-0016-Land-DOS-tool",
|
||||
"full_name": "pexmee/CVE-1999-0016-Land-DOS-tool",
|
||||
"html_url": "https://github.com/pexmee/CVE-1999-0016-Land-DOS-tool",
|
||||
"description": "A simple dos-tool ",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 2,
|
||||
"created_at": "2020-04-01T15:47:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-1999-0016-POC",
|
||||
"full_name": "Pommaq/CVE-1999-0016-POC",
|
||||
"html_url": "https://github.com/Pommaq/CVE-1999-0016-POC",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-04-01T21:00:13Z"
|
||||
}
|
||||
]
|
11
exploits/2002/CVE-2002-0288.json
Normal file
11
exploits/2002/CVE-2002-0288.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2002-0288",
|
||||
"full_name": "alt3kx/CVE-2002-0288",
|
||||
"html_url": "https://github.com/alt3kx/CVE-2002-0288",
|
||||
"description": "Phusion WebServer 1.0 - Directory Traversal",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-04-03T02:06:11Z"
|
||||
}
|
||||
]
|
11
exploits/2002/CVE-2002-0289.json
Normal file
11
exploits/2002/CVE-2002-0289.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2002-0289",
|
||||
"full_name": "alt3kx/CVE-2002-0289",
|
||||
"html_url": "https://github.com/alt3kx/CVE-2002-0289",
|
||||
"description": "Phusion WebServer 1.0 - 'URL' Remote Buffer Overflow",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2018-04-03T01:52:34Z"
|
||||
}
|
||||
]
|
11
exploits/2002/CVE-2002-2202.json
Normal file
11
exploits/2002/CVE-2002-2202.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE.NVD.NIST2202-2002",
|
||||
"full_name": "StepOK10/CVE.NVD.NIST2202-2002",
|
||||
"html_url": "https://github.com/StepOK10/CVE.NVD.NIST2202-2002",
|
||||
"description": "OPEN AND READ JSON",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-03-13T21:01:21Z"
|
||||
}
|
||||
]
|
11
exploits/2005/CVE-2005-1125.json
Normal file
11
exploits/2005/CVE-2005-1125.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "libsafe-CVE-2005-1125",
|
||||
"full_name": "tagatac/libsafe-CVE-2005-1125",
|
||||
"html_url": "https://github.com/tagatac/libsafe-CVE-2005-1125",
|
||||
"description": "Libsafe - Safety Check Bypass Vulnerability (Proof of Concept Exploit & Time Randomization to Thwart It)",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2014-10-04T21:27:57Z"
|
||||
}
|
||||
]
|
11
exploits/2005/CVE-2005-1794.json
Normal file
11
exploits/2005/CVE-2005-1794.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2005-1794Scanner",
|
||||
"full_name": "InitRoot/CVE-2005-1794Scanner",
|
||||
"html_url": "https://github.com/InitRoot/CVE-2005-1794Scanner",
|
||||
"description": "Scanner for network for CVE-2005-1794.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 2,
|
||||
"created_at": "2022-04-12T12:18:12Z"
|
||||
}
|
||||
]
|
227
exploits/2007/CVE-2007-2447.json
Normal file
227
exploits/2007/CVE-2007-2447.json
Normal file
|
@ -0,0 +1,227 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "amriunix/CVE-2007-2447",
|
||||
"html_url": "https://github.com/amriunix/CVE-2007-2447",
|
||||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"stargazers_count": 59,
|
||||
"forks_count": 31,
|
||||
"created_at": "2018-08-03T18:39:56Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "n3rdh4x0r/CVE-2007-2447",
|
||||
"html_url": "https://github.com/n3rdh4x0r/CVE-2007-2447",
|
||||
"description": "Exploit Samba smbd 3.0.20-Debian",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-10-25T16:05:16Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447-in-Python",
|
||||
"full_name": "Ziemni/CVE-2007-2447-in-Python",
|
||||
"html_url": "https://github.com/Ziemni/CVE-2007-2447-in-Python",
|
||||
"description": "Python implementation of 'Username' map script' RCE Exploit for Samba 3.0.20 < 3.0.25rc3 (CVE-2007-2447).",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 2,
|
||||
"created_at": "2021-02-22T13:43:48Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "Alien0ne/CVE-2007-2447",
|
||||
"html_url": "https://github.com/Alien0ne/CVE-2007-2447",
|
||||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2021-06-30T00:13:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "xbufu/CVE-2007-2447",
|
||||
"html_url": "https://github.com/xbufu/CVE-2007-2447",
|
||||
"description": "Exploit code for CVE-2007-2447 written in Python3.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2021-10-03T21:38:19Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "ozuma/CVE-2007-2447",
|
||||
"html_url": "https://github.com/ozuma/CVE-2007-2447",
|
||||
"description": "Exploit Samba",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 2,
|
||||
"created_at": "2021-03-14T17:48:23Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "s4msec/CVE-2007-2447",
|
||||
"html_url": "https://github.com/s4msec/CVE-2007-2447",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-12-11T04:50:54Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "3x1t1um/CVE-2007-2447",
|
||||
"html_url": "https://github.com/3x1t1um/CVE-2007-2447",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-04-22T11:47:16Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "Aviksaikat/CVE-2007-2447",
|
||||
"html_url": "https://github.com/Aviksaikat/CVE-2007-2447",
|
||||
"description": "automated script for exploiting CVE-2007-2447",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2022-10-14T09:01:29Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "0xKn/CVE-2007-2447",
|
||||
"html_url": "https://github.com/0xKn/CVE-2007-2447",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-03-06T20:39:21Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "b33m0x00/CVE-2007-2447",
|
||||
"html_url": "https://github.com/b33m0x00/CVE-2007-2447",
|
||||
"description": "CVE-2007-2447 samba remote code execution",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-07-20T08:11:11Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2007-2447",
|
||||
"full_name": "Juantos/cve-2007-2447",
|
||||
"html_url": "https://github.com/Juantos/cve-2007-2447",
|
||||
"description": "Samba 3.0.0 - 3.0.25rc3",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-01-28T20:51:09Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "cherrera0001/CVE-2007-2447",
|
||||
"html_url": "https://github.com/cherrera0001/CVE-2007-2447",
|
||||
"description": " Samba usermap script.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-04-29T03:48:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "JoseBarrios/CVE-2007-2447",
|
||||
"html_url": "https://github.com/JoseBarrios/CVE-2007-2447",
|
||||
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-01-20T02:30:35Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "testaross4/CVE-2007-2447",
|
||||
"html_url": "https://github.com/testaross4/CVE-2007-2447",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-05-13T14:15:28Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "G01d3nW01f/CVE-2007-2447",
|
||||
"html_url": "https://github.com/G01d3nW01f/CVE-2007-2447",
|
||||
"description": "cve-2007-2447 this script was rewrite the part of Metasploit modules to python3",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-04-16T08:48:19Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "foudadev/CVE-2007-2447",
|
||||
"html_url": "https://github.com/foudadev/CVE-2007-2447",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-07-09T17:04:54Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447_python",
|
||||
"full_name": "bdunlap9/CVE-2007-2447_python",
|
||||
"html_url": "https://github.com/bdunlap9/CVE-2007-2447_python",
|
||||
"description": "Exploit i used in HTB",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2022-12-27T05:18:44Z"
|
||||
},
|
||||
{
|
||||
"name": "exploit-CVE-2007-2447",
|
||||
"full_name": "xlcc4096/exploit-CVE-2007-2447",
|
||||
"html_url": "https://github.com/xlcc4096/exploit-CVE-2007-2447",
|
||||
"description": "Exploit for the vulnerability CVE-2007-2447",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-12-06T18:04:44Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447-Exploit",
|
||||
"full_name": "IamLucif3r/CVE-2007-2447-Exploit",
|
||||
"html_url": "https://github.com/IamLucif3r/CVE-2007-2447-Exploit",
|
||||
"description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-07-08T20:03:32Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447-RCE",
|
||||
"full_name": "MikeRega7/CVE-2007-2447-RCE",
|
||||
"html_url": "https://github.com/MikeRega7/CVE-2007-2447-RCE",
|
||||
"description": "Samba 3.0.20",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-06-15T20:13:17Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447-Exploit",
|
||||
"full_name": "elphon/CVE-2007-2447-Exploit",
|
||||
"html_url": "https://github.com/elphon/CVE-2007-2447-Exploit",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-03-08T13:22:26Z"
|
||||
},
|
||||
{
|
||||
"name": "Samba-CVE-2007-2447-Exploit",
|
||||
"full_name": "ShivamDey/Samba-CVE-2007-2447-Exploit",
|
||||
"html_url": "https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-10-21T05:43:04Z"
|
||||
},
|
||||
{
|
||||
"name": "samba-3.0.24-CVE-2007-2447-vunerable-",
|
||||
"full_name": "3t4n/samba-3.0.24-CVE-2007-2447-vunerable-",
|
||||
"html_url": "https://github.com/3t4n/samba-3.0.24-CVE-2007-2447-vunerable-",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-07-23T03:19:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2007-2447_Samba_3.0.25rc3",
|
||||
"full_name": "WildfootW/CVE-2007-2447_Samba_3.0.25rc3",
|
||||
"html_url": "https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-12-09T15:04:44Z"
|
||||
}
|
||||
]
|
11
exploits/2007/CVE-2007-5962.json
Normal file
11
exploits/2007/CVE-2007-5962.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2007-5962",
|
||||
"full_name": "antogit-sys/CVE-2007-5962",
|
||||
"html_url": "https://github.com/antogit-sys/CVE-2007-5962",
|
||||
"description": "vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-05-22T07:57:44Z"
|
||||
}
|
||||
]
|
11
exploits/2008/CVE-2008-1912.json
Normal file
11
exploits/2008/CVE-2008-1912.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "phpcms-2008-CVE-2018-19127",
|
||||
"full_name": "ab1gale/phpcms-2008-CVE-2018-19127",
|
||||
"html_url": "https://github.com/ab1gale/phpcms-2008-CVE-2018-19127",
|
||||
"description": null,
|
||||
"stargazers_count": 41,
|
||||
"forks_count": 7,
|
||||
"created_at": "2018-11-09T09:51:26Z"
|
||||
}
|
||||
]
|
38
exploits/2008/CVE-2008-4654.json
Normal file
38
exploits/2008/CVE-2008-4654.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"name": "VLC-CVE-2008-4654-Exploit",
|
||||
"full_name": "KernelErr/VLC-CVE-2008-4654-Exploit",
|
||||
"html_url": "https://github.com/KernelErr/VLC-CVE-2008-4654-Exploit",
|
||||
"description": "An EXP could run on Windows x64 against CVE-2008-4654.",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-08-18T05:22:29Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2008-4654",
|
||||
"full_name": "rnnsz/CVE-2008-4654",
|
||||
"html_url": "https://github.com/rnnsz/CVE-2008-4654",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-05-31T18:27:55Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2008-4654",
|
||||
"full_name": "bongbongco/CVE-2008-4654",
|
||||
"html_url": "https://github.com/bongbongco/CVE-2008-4654",
|
||||
"description": "VideoLAN VLC media player 0.9.4 Media Player ty.c buffer overflow",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-07-02T23:33:30Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2008-4654",
|
||||
"full_name": "Hexastrike/CVE-2008-4654",
|
||||
"html_url": "https://github.com/Hexastrike/CVE-2008-4654",
|
||||
"description": "A fully functional exploit for a stack-based buffer overflow vulnerability in VideoLan’s VLC Media Player 0.9.4 when processing TiVo files.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2025-02-19T18:48:32Z"
|
||||
}
|
||||
]
|
11
exploits/2008/CVE-2008-6970.json
Normal file
11
exploits/2008/CVE-2008-6970.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2008-6970",
|
||||
"full_name": "KyomaHooin/CVE-2008-6970",
|
||||
"html_url": "https://github.com/KyomaHooin/CVE-2008-6970",
|
||||
"description": "Blind SQL injection brute force.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2016-05-05T14:13:33Z"
|
||||
}
|
||||
]
|
11
exploits/2010/CVE-2010-0219.json
Normal file
11
exploits/2010/CVE-2010-0219.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2010-0219",
|
||||
"full_name": "veritas-rt/CVE-2010-0219",
|
||||
"html_url": "https://github.com/veritas-rt/CVE-2010-0219",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-07-28T14:10:52Z"
|
||||
}
|
||||
]
|
11
exploits/2011/CVE-2011-3556.json
Normal file
11
exploits/2011/CVE-2011-3556.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve_2011_3556",
|
||||
"full_name": "sk4la/cve_2011_3556",
|
||||
"html_url": "https://github.com/sk4la/cve_2011_3556",
|
||||
"description": "Python 3 implementation of an existing CVE-2011-3556 proof of concept (PoC).",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-01-29T20:22:09Z"
|
||||
}
|
||||
]
|
20
exploits/2012/CVE-2012-0158.json
Normal file
20
exploits/2012/CVE-2012-0158.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2012-0158-reproduction",
|
||||
"full_name": "Sunqiz/CVE-2012-0158-reproduction",
|
||||
"html_url": "https://github.com/Sunqiz/CVE-2012-0158-reproduction",
|
||||
"description": "CVE-2012-0158复现",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-08-15T06:59:06Z"
|
||||
},
|
||||
{
|
||||
"name": "Exploit-Win32.CVE-2012-0158.F.doc",
|
||||
"full_name": "RobertoLeonFR-ES/Exploit-Win32.CVE-2012-0158.F.doc",
|
||||
"html_url": "https://github.com/RobertoLeonFR-ES/Exploit-Win32.CVE-2012-0158.F.doc",
|
||||
"description": "the name of virus is the detection of microsoft defender, is the tipic antivirus",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-01-03T21:13:13Z"
|
||||
}
|
||||
]
|
11
exploits/2012/CVE-2012-0507.json
Normal file
11
exploits/2012/CVE-2012-0507.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve2012-0507",
|
||||
"full_name": "frg316/cve2012-0507",
|
||||
"html_url": "https://github.com/frg316/cve2012-0507",
|
||||
"description": "AtomicReferenceArray Hack",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2014-07-30T23:57:23Z"
|
||||
}
|
||||
]
|
11
exploits/2012/CVE-2012-4792.json
Normal file
11
exploits/2012/CVE-2012-4792.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2012-4792",
|
||||
"full_name": "WizardVan/CVE-2012-4792",
|
||||
"html_url": "https://github.com/WizardVan/CVE-2012-4792",
|
||||
"description": "CVE-2012-4792 simple calc exploitation",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2015-05-03T18:33:28Z"
|
||||
}
|
||||
]
|
11
exploits/2013/CVE-2013-2165.json
Normal file
11
exploits/2013/CVE-2013-2165.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2013-2165",
|
||||
"full_name": "Pastea/CVE-2013-2165",
|
||||
"html_url": "https://github.com/Pastea/CVE-2013-2165",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2021-11-08T21:07:35Z"
|
||||
}
|
||||
]
|
20
exploits/2013/CVE-2013-2186.json
Normal file
20
exploits/2013/CVE-2013-2186.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE_2013_2186",
|
||||
"full_name": "sa1g0n1337/CVE_2013_2186",
|
||||
"html_url": "https://github.com/sa1g0n1337/CVE_2013_2186",
|
||||
"description": "Source code for CVE-2013-2186",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-04-23T04:56:29Z"
|
||||
},
|
||||
{
|
||||
"name": "Payload_CVE_2013_2186",
|
||||
"full_name": "sa1g0n1337/Payload_CVE_2013_2186",
|
||||
"html_url": "https://github.com/sa1g0n1337/Payload_CVE_2013_2186",
|
||||
"description": "Code generate payload for CVE-2013-2186",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-04-23T04:49:13Z"
|
||||
}
|
||||
]
|
11
exploits/2013/CVE-2013-6282.json
Normal file
11
exploits/2013/CVE-2013-6282.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2013-6282",
|
||||
"full_name": "timwr/CVE-2013-6282",
|
||||
"html_url": "https://github.com/timwr/CVE-2013-6282",
|
||||
"description": "CVE-2013-6282 proof of concept for Android",
|
||||
"stargazers_count": 20,
|
||||
"forks_count": 19,
|
||||
"created_at": "2016-12-19T16:14:18Z"
|
||||
}
|
||||
]
|
146
exploits/2014/CVE-2014-0160.json
Normal file
146
exploits/2014/CVE-2014-0160.json
Normal file
|
@ -0,0 +1,146 @@
|
|||
[
|
||||
{
|
||||
"name": "patch-openssl-CVE-2014-0160",
|
||||
"full_name": "jdauphant/patch-openssl-CVE-2014-0160",
|
||||
"html_url": "https://github.com/jdauphant/patch-openssl-CVE-2014-0160",
|
||||
"description": "Patch openssl #heartbleed with ansible ",
|
||||
"stargazers_count": 19,
|
||||
"forks_count": 8,
|
||||
"created_at": "2014-04-08T09:19:49Z"
|
||||
},
|
||||
{
|
||||
"name": "vaas-cve-2014-0160",
|
||||
"full_name": "hmlio/vaas-cve-2014-0160",
|
||||
"html_url": "https://github.com/hmlio/vaas-cve-2014-0160",
|
||||
"description": "Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed",
|
||||
"stargazers_count": 15,
|
||||
"forks_count": 8,
|
||||
"created_at": "2015-07-12T22:40:54Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160",
|
||||
"full_name": "0x90/CVE-2014-0160",
|
||||
"html_url": "https://github.com/0x90/CVE-2014-0160",
|
||||
"description": "Heartbleed variants",
|
||||
"stargazers_count": 6,
|
||||
"forks_count": 13,
|
||||
"created_at": "2014-04-10T02:47:43Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160-Chrome-Plugin",
|
||||
"full_name": "Xyl2k/CVE-2014-0160-Chrome-Plugin",
|
||||
"html_url": "https://github.com/Xyl2k/CVE-2014-0160-Chrome-Plugin",
|
||||
"description": "Heartbleed",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2016-02-16T15:49:55Z"
|
||||
},
|
||||
{
|
||||
"name": "OpenSSL-HeartBleed-CVE-2014-0160-PoC",
|
||||
"full_name": "caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
|
||||
"html_url": "https://github.com/caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
|
||||
"description": "来自:https://www.freebuf.com/articles/web/31700.html",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 4,
|
||||
"created_at": "2018-11-08T02:50:28Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2014-0160",
|
||||
"full_name": "cved-sources/cve-2014-0160",
|
||||
"html_url": "https://github.com/cved-sources/cve-2014-0160",
|
||||
"description": "cve-2014-0160",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 2,
|
||||
"created_at": "2019-01-06T20:57:53Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160",
|
||||
"full_name": "ice-security88/CVE-2014-0160",
|
||||
"html_url": "https://github.com/ice-security88/CVE-2014-0160",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2014-04-10T04:27:10Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160",
|
||||
"full_name": "fb1h2s/CVE-2014-0160",
|
||||
"html_url": "https://github.com/fb1h2s/CVE-2014-0160",
|
||||
"description": "openssl Heart Bleed Exploit: CVE-2014-0160 Mass Security Auditor",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2014-04-08T22:29:55Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160-Scanner",
|
||||
"full_name": "obayesshelton/CVE-2014-0160-Scanner",
|
||||
"html_url": "https://github.com/obayesshelton/CVE-2014-0160-Scanner",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2014-04-08T14:22:36Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160_Heartbleed",
|
||||
"full_name": "n3rdh4x0r/CVE-2014-0160_Heartbleed",
|
||||
"html_url": "https://github.com/n3rdh4x0r/CVE-2014-0160_Heartbleed",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-04-24T11:53:16Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2014-0160-heartbleed",
|
||||
"full_name": "timsonner/cve-2014-0160-heartbleed",
|
||||
"html_url": "https://github.com/timsonner/cve-2014-0160-heartbleed",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2023-07-31T01:12:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160-Chrome-Plugin",
|
||||
"full_name": "MrE-Fog/CVE-2014-0160-Chrome-Plugin",
|
||||
"html_url": "https://github.com/MrE-Fog/CVE-2014-0160-Chrome-Plugin",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-04-30T13:56:47Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160-HeartBleed",
|
||||
"full_name": "yashfren/CVE-2014-0160-HeartBleed",
|
||||
"html_url": "https://github.com/yashfren/CVE-2014-0160-HeartBleed",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-09-20T13:44:54Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2014-0160-Yunfeng-Jiang",
|
||||
"full_name": "marstornado/cve-2014-0160-Yunfeng-Jiang",
|
||||
"html_url": "https://github.com/marstornado/cve-2014-0160-Yunfeng-Jiang",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2015-06-09T03:55:14Z"
|
||||
},
|
||||
{
|
||||
"name": "cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
|
||||
"full_name": "artofscripting-zz/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
|
||||
"html_url": "https://github.com/artofscripting-zz/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2019-04-02T17:08:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
|
||||
"full_name": "WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
|
||||
"html_url": "https://github.com/WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-12-09T15:08:21Z"
|
||||
}
|
||||
]
|
11
exploits/2014/CVE-2014-0166.json
Normal file
11
exploits/2014/CVE-2014-0166.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "POC-CVE-2014-0166",
|
||||
"full_name": "Ettack/POC-CVE-2014-0166",
|
||||
"html_url": "https://github.com/Ettack/POC-CVE-2014-0166",
|
||||
"description": "POC of CVE-2014-0166 (WordPress cookie forgery vulnerability)",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 4,
|
||||
"created_at": "2014-04-26T10:14:44Z"
|
||||
}
|
||||
]
|
11
exploits/2014/CVE-2014-0472.json
Normal file
11
exploits/2014/CVE-2014-0472.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2014-0472",
|
||||
"full_name": "christasa/CVE-2014-0472",
|
||||
"html_url": "https://github.com/christasa/CVE-2014-0472",
|
||||
"description": "CVE-2014-0472 Django unexpected code execution using reverse()",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 1,
|
||||
"created_at": "2020-09-23T16:21:57Z"
|
||||
}
|
||||
]
|
11
exploits/2014/CVE-2014-0816.json
Normal file
11
exploits/2014/CVE-2014-0816.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2014-0816",
|
||||
"full_name": "tandasat/CVE-2014-0816",
|
||||
"html_url": "https://github.com/tandasat/CVE-2014-0816",
|
||||
"description": "CVE-2014-0816",
|
||||
"stargazers_count": 25,
|
||||
"forks_count": 11,
|
||||
"created_at": "2014-02-27T03:07:52Z"
|
||||
}
|
||||
]
|
11
exploits/2014/CVE-2014-1428.json
Normal file
11
exploits/2014/CVE-2014-1428.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2019-14287-CVE-2014-6271",
|
||||
"full_name": "Sindayifu/CVE-2019-14287-CVE-2014-6271",
|
||||
"html_url": "https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2019-11-13T14:17:19Z"
|
||||
}
|
||||
]
|
11
exploits/2014/CVE-2014-1767.json
Normal file
11
exploits/2014/CVE-2014-1767.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2014-1767-EXP-PAPER",
|
||||
"full_name": "ExploitCN/CVE-2014-1767-EXP-PAPER",
|
||||
"html_url": "https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER",
|
||||
"description": "CVE-2014-1767在win7_x64平台的EXP和分析文章",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2022-02-12T08:57:19Z"
|
||||
}
|
||||
]
|
11
exploits/2014/CVE-2014-1773.json
Normal file
11
exploits/2014/CVE-2014-1773.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2014-1773",
|
||||
"full_name": "day6reak/CVE-2014-1773",
|
||||
"html_url": "https://github.com/day6reak/CVE-2014-1773",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2015-01-20T23:32:21Z"
|
||||
}
|
||||
]
|
20
exploits/2014/CVE-2014-3566.json
Normal file
20
exploits/2014/CVE-2014-3566.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2014-3566-poodle-cookbook",
|
||||
"full_name": "mikesplain/CVE-2014-3566-poodle-cookbook",
|
||||
"html_url": "https://github.com/mikesplain/CVE-2014-3566-poodle-cookbook",
|
||||
"description": null,
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2014-10-16T01:24:38Z"
|
||||
},
|
||||
{
|
||||
"name": "openssl_g2.5_CVE-2014-3566",
|
||||
"full_name": "uthrasri/openssl_g2.5_CVE-2014-3566",
|
||||
"html_url": "https://github.com/uthrasri/openssl_g2.5_CVE-2014-3566",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-07T10:57:31Z"
|
||||
}
|
||||
]
|
38
exploits/2014/CVE-2014-3570.json
Normal file
38
exploits/2014/CVE-2014-3570.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2014-3570",
|
||||
"full_name": "uthrasri/CVE-2014-3570",
|
||||
"html_url": "https://github.com/uthrasri/CVE-2014-3570",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-07T15:19:36Z"
|
||||
},
|
||||
{
|
||||
"name": "openssl_G2.5_CVE-2014-3570",
|
||||
"full_name": "uthrasri/openssl_G2.5_CVE-2014-3570",
|
||||
"html_url": "https://github.com/uthrasri/openssl_G2.5_CVE-2014-3570",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-07T13:04:45Z"
|
||||
},
|
||||
{
|
||||
"name": "Openssl_G2.5_CVE-2014-3570_01",
|
||||
"full_name": "uthrasri/Openssl_G2.5_CVE-2014-3570_01",
|
||||
"html_url": "https://github.com/uthrasri/Openssl_G2.5_CVE-2014-3570_01",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-07T14:33:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2014-3570_G2.5_openssl_no_patch",
|
||||
"full_name": "uthrasri/CVE-2014-3570_G2.5_openssl_no_patch",
|
||||
"html_url": "https://github.com/uthrasri/CVE-2014-3570_G2.5_openssl_no_patch",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-07T17:29:28Z"
|
||||
}
|
||||
]
|
11
exploits/2014/CVE-2014-9301.json
Normal file
11
exploits/2014/CVE-2014-9301.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "burp-alfresco-referer-proxy-cve-2014-9301",
|
||||
"full_name": "ottimo/burp-alfresco-referer-proxy-cve-2014-9301",
|
||||
"html_url": "https://github.com/ottimo/burp-alfresco-referer-proxy-cve-2014-9301",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-03-21T14:05:12Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-0291.json
Normal file
11
exploits/2015/CVE-2015-0291.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "patch-openssl-CVE-2014-0291_CVE-2015-0204",
|
||||
"full_name": "niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204",
|
||||
"html_url": "https://github.com/niccoX/patch-openssl-CVE-2014-0291_CVE-2015-0204",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2015-03-23T10:18:08Z"
|
||||
}
|
||||
]
|
56
exploits/2015/CVE-2015-1427.json
Normal file
56
exploits/2015/CVE-2015-1427.json
Normal file
|
@ -0,0 +1,56 @@
|
|||
[
|
||||
{
|
||||
"name": "exploit-CVE-2015-1427",
|
||||
"full_name": "t0kx/exploit-CVE-2015-1427",
|
||||
"html_url": "https://github.com/t0kx/exploit-CVE-2015-1427",
|
||||
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
|
||||
"stargazers_count": 33,
|
||||
"forks_count": 16,
|
||||
"created_at": "2017-01-09T20:08:56Z"
|
||||
},
|
||||
{
|
||||
"name": "cve2015_1427",
|
||||
"full_name": "h3inzzz/cve2015_1427",
|
||||
"html_url": "https://github.com/h3inzzz/cve2015_1427",
|
||||
"description": "PoC for CVE-2015_1427",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2020-12-21T15:02:55Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2015-1427",
|
||||
"full_name": "cved-sources/cve-2015-1427",
|
||||
"html_url": "https://github.com/cved-sources/cve-2015-1427",
|
||||
"description": "cve-2015-1427",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-01-06T21:18:13Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-1427",
|
||||
"full_name": "xpgdgit/CVE-2015-1427",
|
||||
"html_url": "https://github.com/xpgdgit/CVE-2015-1427",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-07-29T09:14:56Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-1427-for-trixie",
|
||||
"full_name": "Sebikea/CVE-2015-1427-for-trixie",
|
||||
"html_url": "https://github.com/Sebikea/CVE-2015-1427-for-trixie",
|
||||
"description": "To test elasticsearch vulnerabillity on newer version of debian",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-11-10T15:33:18Z"
|
||||
},
|
||||
{
|
||||
"name": "Groovy-scripting-engine-CVE-2015-1427",
|
||||
"full_name": "cyberharsh/Groovy-scripting-engine-CVE-2015-1427",
|
||||
"html_url": "https://github.com/cyberharsh/Groovy-scripting-engine-CVE-2015-1427",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-06-22T05:00:22Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-1769.json
Normal file
11
exploits/2015/CVE-2015-1769.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-1769",
|
||||
"full_name": "int0/CVE-2015-1769",
|
||||
"html_url": "https://github.com/int0/CVE-2015-1769",
|
||||
"description": "PoC for CVE-2015-1769",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 1,
|
||||
"created_at": "2021-02-17T03:25:53Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-1788.json
Normal file
11
exploits/2015/CVE-2015-1788.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "OpenSSL_1_0_1g_CVE-2015-1788",
|
||||
"full_name": "pazhanivel07/OpenSSL_1_0_1g_CVE-2015-1788",
|
||||
"html_url": "https://github.com/pazhanivel07/OpenSSL_1_0_1g_CVE-2015-1788",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-03T06:22:42Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-1790.json
Normal file
11
exploits/2015/CVE-2015-1790.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "OpenSSL-1_0_1g_CVE-2015-1790",
|
||||
"full_name": "Trinadh465/OpenSSL-1_0_1g_CVE-2015-1790",
|
||||
"html_url": "https://github.com/Trinadh465/OpenSSL-1_0_1g_CVE-2015-1790",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-06T11:20:35Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-1791.json
Normal file
11
exploits/2015/CVE-2015-1791.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "OpenSSL-1_0_1g_CVE-2015-1791",
|
||||
"full_name": "Trinadh465/OpenSSL-1_0_1g_CVE-2015-1791",
|
||||
"html_url": "https://github.com/Trinadh465/OpenSSL-1_0_1g_CVE-2015-1791",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-08T07:28:11Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-1792.json
Normal file
11
exploits/2015/CVE-2015-1792.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "OpenSSL-1_0_1g_CVE-2015-1792",
|
||||
"full_name": "Trinadh465/OpenSSL-1_0_1g_CVE-2015-1792",
|
||||
"html_url": "https://github.com/Trinadh465/OpenSSL-1_0_1g_CVE-2015-1792",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-06T14:06:32Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-3073.json
Normal file
11
exploits/2015/CVE-2015-3073.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-3073",
|
||||
"full_name": "reigningshells/CVE-2015-3073",
|
||||
"html_url": "https://github.com/reigningshells/CVE-2015-3073",
|
||||
"description": "CVE-2015-3073 PoC",
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 5,
|
||||
"created_at": "2015-09-27T00:19:23Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-5347.json
Normal file
11
exploits/2015/CVE-2015-5347.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "wicker-cve-2015-5347",
|
||||
"full_name": "alexanderkjall/wicker-cve-2015-5347",
|
||||
"html_url": "https://github.com/alexanderkjall/wicker-cve-2015-5347",
|
||||
"description": "PoC for cve-2015-5347",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-01-30T16:11:29Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-6637.json
Normal file
11
exploits/2015/CVE-2015-6637.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-6637",
|
||||
"full_name": "betalphafai/CVE-2015-6637",
|
||||
"html_url": "https://github.com/betalphafai/CVE-2015-6637",
|
||||
"description": null,
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 6,
|
||||
"created_at": "2016-02-18T14:39:04Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-6639.json
Normal file
11
exploits/2015/CVE-2015-6639.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve-2015-6639",
|
||||
"full_name": "laginimaineb/cve-2015-6639",
|
||||
"html_url": "https://github.com/laginimaineb/cve-2015-6639",
|
||||
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
|
||||
"stargazers_count": 119,
|
||||
"forks_count": 51,
|
||||
"created_at": "2016-05-02T12:18:57Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-6640.json
Normal file
11
exploits/2015/CVE-2015-6640.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-6640",
|
||||
"full_name": "betalphafai/CVE-2015-6640",
|
||||
"html_url": "https://github.com/betalphafai/CVE-2015-6640",
|
||||
"description": null,
|
||||
"stargazers_count": 11,
|
||||
"forks_count": 10,
|
||||
"created_at": "2016-02-15T08:13:20Z"
|
||||
}
|
||||
]
|
92
exploits/2015/CVE-2015-7547.json
Normal file
92
exploits/2015/CVE-2015-7547.json
Normal file
|
@ -0,0 +1,92 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-7547",
|
||||
"full_name": "fjserna/CVE-2015-7547",
|
||||
"html_url": "https://github.com/fjserna/CVE-2015-7547",
|
||||
"description": "Proof of concept for CVE-2015-7547",
|
||||
"stargazers_count": 544,
|
||||
"forks_count": 164,
|
||||
"created_at": "2016-02-10T21:13:54Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2015-7547-public",
|
||||
"full_name": "eSentire/cve-2015-7547-public",
|
||||
"html_url": "https://github.com/eSentire/cve-2015-7547-public",
|
||||
"description": "PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)",
|
||||
"stargazers_count": 10,
|
||||
"forks_count": 5,
|
||||
"created_at": "2016-04-05T13:50:28Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2015-7547",
|
||||
"full_name": "jgajek/cve-2015-7547",
|
||||
"html_url": "https://github.com/jgajek/cve-2015-7547",
|
||||
"description": "PoC exploit server for CVE-2015-7547",
|
||||
"stargazers_count": 8,
|
||||
"forks_count": 5,
|
||||
"created_at": "2016-03-10T19:47:00Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-7547",
|
||||
"full_name": "cakuzo/CVE-2015-7547",
|
||||
"html_url": "https://github.com/cakuzo/CVE-2015-7547",
|
||||
"description": "test script for CVE-2015-7547",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 3,
|
||||
"created_at": "2016-02-17T00:51:22Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-7547",
|
||||
"full_name": "t0r0t0r0/CVE-2015-7547",
|
||||
"html_url": "https://github.com/t0r0t0r0/CVE-2015-7547",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2016-02-17T11:36:35Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-7547",
|
||||
"full_name": "babykillerblack/CVE-2015-7547",
|
||||
"html_url": "https://github.com/babykillerblack/CVE-2015-7547",
|
||||
"description": " glibc getaddrinfo stack-based buffer overflow",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2016-02-21T20:21:43Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-7547-Research",
|
||||
"full_name": "Stick-U235/CVE-2015-7547-Research",
|
||||
"html_url": "https://github.com/Stick-U235/CVE-2015-7547-Research",
|
||||
"description": "CVE-2015-7547 initial research.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-10-24T15:02:23Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-7547-master",
|
||||
"full_name": "miracle03/CVE-2015-7547-master",
|
||||
"html_url": "https://github.com/miracle03/CVE-2015-7547-master",
|
||||
"description": "loudong",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-06-04T03:24:21Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-7547-proj-master",
|
||||
"full_name": "bluebluelan/CVE-2015-7547-proj-master",
|
||||
"html_url": "https://github.com/bluebluelan/CVE-2015-7547-proj-master",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2016-11-10T08:49:13Z"
|
||||
},
|
||||
{
|
||||
"name": "Glibc-Vulnerability-Exploit-CVE-2015-7547",
|
||||
"full_name": "Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547",
|
||||
"html_url": "https://github.com/Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547",
|
||||
"description": "Glibc-Vulnerability-Exploit-CVE-2015-7547",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-05-12T14:32:41Z"
|
||||
}
|
||||
]
|
20
exploits/2015/CVE-2015-8351.json
Normal file
20
exploits/2015/CVE-2015-8351.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "exploit-CVE-2015-8351",
|
||||
"full_name": "G4sp4rCS/exploit-CVE-2015-8351",
|
||||
"html_url": "https://github.com/G4sp4rCS/exploit-CVE-2015-8351",
|
||||
"description": "WordPress Plugin Gwolle Guestbook 1.5.3 - Remote File Inclusion",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-05-08T02:55:32Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2015-8351",
|
||||
"full_name": "G01d3nW01f/CVE-2015-8351",
|
||||
"html_url": "https://github.com/G01d3nW01f/CVE-2015-8351",
|
||||
"description": "this script is exploit for wordpress old plugin gwolle",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-08-06T08:51:41Z"
|
||||
}
|
||||
]
|
11
exploits/2015/CVE-2015-8710.json
Normal file
11
exploits/2015/CVE-2015-8710.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2015-8710",
|
||||
"full_name": "Karm/CVE-2015-8710",
|
||||
"html_url": "https://github.com/Karm/CVE-2015-8710",
|
||||
"description": "Windows/Linux reproducer",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2016-03-17T10:32:52Z"
|
||||
}
|
||||
]
|
11
exploits/2016/CVE-2016-0095.json
Normal file
11
exploits/2016/CVE-2016-0095.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve-2016-0095-x64",
|
||||
"full_name": "fengjixuchui/cve-2016-0095-x64",
|
||||
"html_url": "https://github.com/fengjixuchui/cve-2016-0095-x64",
|
||||
"description": "windows 7 Ultimate Ultimate x64 poc of cve-2016-0095(MS16-034)",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2019-03-21T09:33:19Z"
|
||||
}
|
||||
]
|
11
exploits/2016/CVE-2016-0100.json
Normal file
11
exploits/2016/CVE-2016-0100.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-010033-010045",
|
||||
"full_name": "zi0Black/CVE-2016-010033-010045",
|
||||
"html_url": "https://github.com/zi0Black/CVE-2016-010033-010045",
|
||||
"description": null,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-02-12T09:09:42Z"
|
||||
}
|
||||
]
|
11
exploits/2016/CVE-2016-1076.json
Normal file
11
exploits/2016/CVE-2016-1076.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-10761",
|
||||
"full_name": "ISSAPolska/CVE-2016-10761",
|
||||
"html_url": "https://github.com/ISSAPolska/CVE-2016-10761",
|
||||
"description": "Zapierd-test",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-06-30T08:27:15Z"
|
||||
}
|
||||
]
|
11
exploits/2016/CVE-2016-10761.json
Normal file
11
exploits/2016/CVE-2016-10761.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-10761",
|
||||
"full_name": "ISSAPolska/CVE-2016-10761",
|
||||
"html_url": "https://github.com/ISSAPolska/CVE-2016-10761",
|
||||
"description": "Zapierd-test",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-06-30T08:27:15Z"
|
||||
}
|
||||
]
|
11
exploits/2016/CVE-2016-2173.json
Normal file
11
exploits/2016/CVE-2016-2173.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-2173",
|
||||
"full_name": "HaToan/CVE-2016-2173",
|
||||
"html_url": "https://github.com/HaToan/CVE-2016-2173",
|
||||
"description": null,
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 3,
|
||||
"created_at": "2017-03-29T01:25:40Z"
|
||||
}
|
||||
]
|
11
exploits/2016/CVE-2016-3962.json
Normal file
11
exploits/2016/CVE-2016-3962.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-3962-Exploit",
|
||||
"full_name": "securifera/CVE-2016-3962-Exploit",
|
||||
"html_url": "https://github.com/securifera/CVE-2016-3962-Exploit",
|
||||
"description": "CVE-2016-3962-Exploit",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 4,
|
||||
"created_at": "2016-07-17T18:43:56Z"
|
||||
}
|
||||
]
|
11
exploits/2016/CVE-2016-4117.json
Normal file
11
exploits/2016/CVE-2016-4117.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-4117-Report",
|
||||
"full_name": "amit-raut/CVE-2016-4117-Report",
|
||||
"html_url": "https://github.com/amit-raut/CVE-2016-4117-Report",
|
||||
"description": "A brief report on CVE-2016-4117 (A vulnerability in Adobe Flash)",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-02-23T15:00:10Z"
|
||||
}
|
||||
]
|
29
exploits/2016/CVE-2016-4437.json
Normal file
29
exploits/2016/CVE-2016-4437.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-4437",
|
||||
"full_name": "pizza-power/CVE-2016-4437",
|
||||
"html_url": "https://github.com/pizza-power/CVE-2016-4437",
|
||||
"description": "Python POC to Exploit CVE-2016-4437 Apache Shiro Deserialization Vulnerability Due to Hardcode Encryption Key",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-12-22T02:26:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2016-4437",
|
||||
"full_name": "xk-mt/CVE-2016-4437",
|
||||
"html_url": "https://github.com/xk-mt/CVE-2016-4437",
|
||||
"description": "1.验证CVE-2016-4437、2.解析rememberMe的文件和CBC加密的IV偏移",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-01-15T08:24:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2016-4437",
|
||||
"full_name": "m3terpreter/CVE-2016-4437",
|
||||
"html_url": "https://github.com/m3terpreter/CVE-2016-4437",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-06-22T06:08:55Z"
|
||||
}
|
||||
]
|
20
exploits/2016/CVE-2016-4438.json
Normal file
20
exploits/2016/CVE-2016-4438.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-4438",
|
||||
"full_name": "jason3e7/CVE-2016-4438",
|
||||
"html_url": "https://github.com/jason3e7/CVE-2016-4438",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 4,
|
||||
"created_at": "2016-06-16T06:28:55Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2016-4438",
|
||||
"full_name": "tafamace/CVE-2016-4438",
|
||||
"html_url": "https://github.com/tafamace/CVE-2016-4438",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-11-19T08:49:25Z"
|
||||
}
|
||||
]
|
38
exploits/2016/CVE-2016-5734.json
Normal file
38
exploits/2016/CVE-2016-5734.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-5734-docker",
|
||||
"full_name": "miko550/CVE-2016-5734-docker",
|
||||
"html_url": "https://github.com/miko550/CVE-2016-5734-docker",
|
||||
"description": "PhpMyAdmin 4.0.x—4.6.2 Remote Code Execution Vulnerability (CVE-2016-5734)",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-09-10T03:12:41Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE2016-5734",
|
||||
"full_name": "msharm33/CVE2016-5734",
|
||||
"html_url": "https://github.com/msharm33/CVE2016-5734",
|
||||
"description": "Group Project S&P",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2018-11-28T15:34:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2016-5734",
|
||||
"full_name": "KosukeShimofuji/CVE-2016-5734",
|
||||
"html_url": "https://github.com/KosukeShimofuji/CVE-2016-5734",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2016-07-08T09:43:26Z"
|
||||
},
|
||||
{
|
||||
"name": "phpmyadmin4.4_cve-2016-5734",
|
||||
"full_name": "HKirito/phpmyadmin4.4_cve-2016-5734",
|
||||
"html_url": "https://github.com/HKirito/phpmyadmin4.4_cve-2016-5734",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2020-05-22T02:37:42Z"
|
||||
}
|
||||
]
|
38
exploits/2016/CVE-2016-7255.json
Normal file
38
exploits/2016/CVE-2016-7255.json
Normal file
|
@ -0,0 +1,38 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2016-7255",
|
||||
"full_name": "FSecureLABS/CVE-2016-7255",
|
||||
"html_url": "https://github.com/FSecureLABS/CVE-2016-7255",
|
||||
"description": "An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit",
|
||||
"stargazers_count": 81,
|
||||
"forks_count": 62,
|
||||
"created_at": "2017-03-02T23:32:08Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2016-7255",
|
||||
"full_name": "heh3/CVE-2016-7255",
|
||||
"html_url": "https://github.com/heh3/CVE-2016-7255",
|
||||
"description": null,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-01-13T15:49:58Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2016-7255_x86_x64",
|
||||
"full_name": "bbolmin/cve-2016-7255_x86_x64",
|
||||
"html_url": "https://github.com/bbolmin/cve-2016-7255_x86_x64",
|
||||
"description": "porting CVE-2016-7255 to x86 for educational purposes.",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-09-13T12:47:29Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2016-7255",
|
||||
"full_name": "homjxi0e/CVE-2016-7255",
|
||||
"html_url": "https://github.com/homjxi0e/CVE-2016-7255",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-04-15T01:46:52Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-0290.json
Normal file
11
exploits/2017/CVE-2017-0290.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-0290-",
|
||||
"full_name": "homjxi0e/CVE-2017-0290-",
|
||||
"html_url": "https://github.com/homjxi0e/CVE-2017-0290-",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-05-11T04:01:51Z"
|
||||
}
|
||||
]
|
272
exploits/2017/CVE-2017-1000.json
Normal file
272
exploits/2017/CVE-2017-1000.json
Normal file
|
@ -0,0 +1,272 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "greymd/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/greymd/CVE-2017-1000117",
|
||||
"description": "Check Git's vulnerability CVE-2017-1000117",
|
||||
"stargazers_count": 136,
|
||||
"forks_count": 28,
|
||||
"created_at": "2017-08-14T15:05:48Z"
|
||||
},
|
||||
{
|
||||
"name": "sudo-CVE-2017-1000367",
|
||||
"full_name": "c0d3z3r0/sudo-CVE-2017-1000367",
|
||||
"html_url": "https://github.com/c0d3z3r0/sudo-CVE-2017-1000367",
|
||||
"description": null,
|
||||
"stargazers_count": 112,
|
||||
"forks_count": 44,
|
||||
"created_at": "2017-05-30T18:12:38Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000486",
|
||||
"full_name": "pimps/CVE-2017-1000486",
|
||||
"html_url": "https://github.com/pimps/CVE-2017-1000486",
|
||||
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
|
||||
"stargazers_count": 89,
|
||||
"forks_count": 25,
|
||||
"created_at": "2018-09-03T03:11:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000353",
|
||||
"full_name": "vulhub/CVE-2017-1000353",
|
||||
"html_url": "https://github.com/vulhub/CVE-2017-1000353",
|
||||
"description": "jenkins CVE-2017-1000353 POC",
|
||||
"stargazers_count": 56,
|
||||
"forks_count": 62,
|
||||
"created_at": "2019-04-12T13:24:26Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "Manouchehri/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/Manouchehri/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"stargazers_count": 16,
|
||||
"forks_count": 14,
|
||||
"created_at": "2017-08-11T20:47:53Z"
|
||||
},
|
||||
{
|
||||
"name": "Blueborne-CVE-2017-1000251",
|
||||
"full_name": "hayzamjs/Blueborne-CVE-2017-1000251",
|
||||
"html_url": "https://github.com/hayzamjs/Blueborne-CVE-2017-1000251",
|
||||
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
|
||||
"stargazers_count": 16,
|
||||
"forks_count": 14,
|
||||
"created_at": "2017-09-23T06:29:31Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000486",
|
||||
"full_name": "mogwailabs/CVE-2017-1000486",
|
||||
"html_url": "https://github.com/mogwailabs/CVE-2017-1000486",
|
||||
"description": "Proof of Concept Exploit for PrimeFaces 5.x EL Injection (CVE-2017-1000486)",
|
||||
"stargazers_count": 9,
|
||||
"forks_count": 2,
|
||||
"created_at": "2018-10-17T22:47:30Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "timwr/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/timwr/CVE-2017-1000117",
|
||||
"description": "Proof of concept of CVE-2017-1000117",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 16,
|
||||
"created_at": "2017-08-11T07:03:23Z"
|
||||
},
|
||||
{
|
||||
"name": "PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"full_name": "RicterZ/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"html_url": "https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253",
|
||||
"description": "Demo-ing CVE-2017-1000253 in a container",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 7,
|
||||
"created_at": "2018-06-18T15:22:01Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000250-PoC",
|
||||
"full_name": "olav-st/CVE-2017-1000250-PoC",
|
||||
"html_url": "https://github.com/olav-st/CVE-2017-1000250-PoC",
|
||||
"description": "Proof of concept exploit script for CVE-2017-1000250. Written while researching for the essay in TTM4137 Wireless Security.",
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 4,
|
||||
"created_at": "2017-11-12T18:18:52Z"
|
||||
},
|
||||
{
|
||||
"name": "blueborne-CVE-2017-1000251-POC",
|
||||
"full_name": "own2pwn/blueborne-CVE-2017-1000251-POC",
|
||||
"html_url": "https://github.com/own2pwn/blueborne-CVE-2017-1000251-POC",
|
||||
"description": null,
|
||||
"stargazers_count": 5,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-10-01T10:15:40Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "ieee0824/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/ieee0824/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-08-16T02:05:08Z"
|
||||
},
|
||||
{
|
||||
"name": "blueborne-CVE-2017-1000251",
|
||||
"full_name": "sgxgsx/blueborne-CVE-2017-1000251",
|
||||
"html_url": "https://github.com/sgxgsx/blueborne-CVE-2017-1000251",
|
||||
"description": "Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC) BlueBorne - Proof of Concept - Unarmed/Unweaponized - DoS (Crash) only ",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 2,
|
||||
"created_at": "2024-07-03T12:14:00Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "VulApps/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/VulApps/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 22,
|
||||
"created_at": "2017-08-12T18:20:02Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000486",
|
||||
"full_name": "Pastea/CVE-2017-1000486",
|
||||
"html_url": "https://github.com/Pastea/CVE-2017-1000486",
|
||||
"description": null,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 1,
|
||||
"created_at": "2021-08-05T17:42:54Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "AnonymKing/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/AnonymKing/CVE-2017-1000117",
|
||||
"description": "CVE-2017-1000117漏洞复现(PoC+Exp)",
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 2,
|
||||
"created_at": "2019-06-20T02:55:19Z"
|
||||
},
|
||||
{
|
||||
"name": "Jenkins-CVE-2017-1000353",
|
||||
"full_name": "r00t4dm/Jenkins-CVE-2017-1000353",
|
||||
"html_url": "https://github.com/r00t4dm/Jenkins-CVE-2017-1000353",
|
||||
"description": null,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-10-12T09:30:38Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000253",
|
||||
"full_name": "sxlmnwb/CVE-2017-1000253",
|
||||
"html_url": "https://github.com/sxlmnwb/CVE-2017-1000253",
|
||||
"description": "Linux Kernel 3.10.0-514.21.2.el7.x86_64 / 3.10.0-514.26.1.el7.x86_64 (CentOS 7) - SUID Position Independent Executable 'PIE' Local Privilege Escalation",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-10-16T23:08:16Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "nkoneko/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/nkoneko/CVE-2017-1000117",
|
||||
"description": "GitのCommand Injectionの脆弱性を利用してスクリプトを落として実行する例",
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-08-18T16:23:53Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000367",
|
||||
"full_name": "homjxi0e/CVE-2017-1000367",
|
||||
"html_url": "https://github.com/homjxi0e/CVE-2017-1000367",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 6,
|
||||
"created_at": "2017-06-04T12:31:59Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000112-Adpated",
|
||||
"full_name": "ol0273st-s/CVE-2017-1000112-Adpated",
|
||||
"html_url": "https://github.com/ol0273st-s/CVE-2017-1000112-Adpated",
|
||||
"description": "POE code for CVE-2017-1000112 adapted to both funtion on a specific VM and Escape a Docker",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 3,
|
||||
"created_at": "2020-02-14T13:03:00Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000028",
|
||||
"full_name": "NeonNOXX/CVE-2017-1000028",
|
||||
"html_url": "https://github.com/NeonNOXX/CVE-2017-1000028",
|
||||
"description": "POC&EXP for GlassFish<4.1.1(not including 4.1.1).",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-12-07T07:35:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "leezp/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/leezp/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-05-20T07:25:58Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117_wasawasa",
|
||||
"full_name": "sasairc/CVE-2017-1000117_wasawasa",
|
||||
"html_url": "https://github.com/sasairc/CVE-2017-1000117_wasawasa",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-08-15T08:39:23Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "rootclay/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/rootclay/CVE-2017-1000117",
|
||||
"description": "CVE-2017-1000117",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 2,
|
||||
"created_at": "2017-08-16T03:52:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "takehaya/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/takehaya/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-08-16T14:34:37Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "siling2017/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/siling2017/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-09-04T04:18:19Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000117",
|
||||
"full_name": "thelastbyte/CVE-2017-1000117",
|
||||
"html_url": "https://github.com/thelastbyte/CVE-2017-1000117",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-08-12T01:10:49Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000475",
|
||||
"full_name": "lajarajorge/CVE-2017-1000475",
|
||||
"html_url": "https://github.com/lajarajorge/CVE-2017-1000475",
|
||||
"description": "Unquoted Path Service",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-01-22T21:10:22Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000427",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-1000427",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-1000427",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:17Z"
|
||||
}
|
||||
]
|
47
exploits/2017/CVE-2017-10000.json
Normal file
47
exploits/2017/CVE-2017-10000.json
Normal file
|
@ -0,0 +1,47 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-1000028",
|
||||
"full_name": "NeonNOXX/CVE-2017-1000028",
|
||||
"html_url": "https://github.com/NeonNOXX/CVE-2017-1000028",
|
||||
"description": "POC&EXP for GlassFish<4.1.1(not including 4.1.1).",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-12-07T07:35:39Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000006",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-1000006",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-1000006",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:17Z"
|
||||
},
|
||||
{
|
||||
"name": "evince-cve-2017-1000083",
|
||||
"full_name": "matlink/evince-cve-2017-1000083",
|
||||
"html_url": "https://github.com/matlink/evince-cve-2017-1000083",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-10-30T12:18:11Z"
|
||||
},
|
||||
{
|
||||
"name": "DWF-CVE-2017-1000000",
|
||||
"full_name": "smythtech/DWF-CVE-2017-1000000",
|
||||
"html_url": "https://github.com/smythtech/DWF-CVE-2017-1000000",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-05-17T10:14:54Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2017-1000083-atril-nautilus",
|
||||
"full_name": "matlink/cve-2017-1000083-atril-nautilus",
|
||||
"html_url": "https://github.com/matlink/cve-2017-1000083-atril-nautilus",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-10-30T12:22:41Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1000000.json
Normal file
11
exploits/2017/CVE-2017-1000000.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "DWF-CVE-2017-1000000",
|
||||
"full_name": "smythtech/DWF-CVE-2017-1000000",
|
||||
"html_url": "https://github.com/smythtech/DWF-CVE-2017-1000000",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-05-17T10:14:54Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1000006.json
Normal file
11
exploits/2017/CVE-2017-1000006.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-1000006",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-1000006",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-1000006",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:17Z"
|
||||
}
|
||||
]
|
74
exploits/2017/CVE-2017-10004.json
Normal file
74
exploits/2017/CVE-2017-10004.json
Normal file
|
@ -0,0 +1,74 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-1000486",
|
||||
"full_name": "pimps/CVE-2017-1000486",
|
||||
"html_url": "https://github.com/pimps/CVE-2017-1000486",
|
||||
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
|
||||
"stargazers_count": 89,
|
||||
"forks_count": 25,
|
||||
"created_at": "2018-09-03T03:11:24Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000486",
|
||||
"full_name": "mogwailabs/CVE-2017-1000486",
|
||||
"html_url": "https://github.com/mogwailabs/CVE-2017-1000486",
|
||||
"description": "Proof of Concept Exploit for PrimeFaces 5.x EL Injection (CVE-2017-1000486)",
|
||||
"stargazers_count": 9,
|
||||
"forks_count": 2,
|
||||
"created_at": "2018-10-17T22:47:30Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000486",
|
||||
"full_name": "Pastea/CVE-2017-1000486",
|
||||
"html_url": "https://github.com/Pastea/CVE-2017-1000486",
|
||||
"description": null,
|
||||
"stargazers_count": 3,
|
||||
"forks_count": 1,
|
||||
"created_at": "2021-08-05T17:42:54Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2017-1000486",
|
||||
"full_name": "cved-sources/cve-2017-1000486",
|
||||
"html_url": "https://github.com/cved-sources/cve-2017-1000486",
|
||||
"description": "cve-2017-1000486",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-01-11T21:11:14Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000475",
|
||||
"full_name": "lajarajorge/CVE-2017-1000475",
|
||||
"html_url": "https://github.com/lajarajorge/CVE-2017-1000475",
|
||||
"description": "Unquoted Path Service",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-01-22T21:10:22Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000427",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-1000427",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-1000427",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:17Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-1000486",
|
||||
"full_name": "LongWayHomie/CVE-2017-1000486",
|
||||
"html_url": "https://github.com/LongWayHomie/CVE-2017-1000486",
|
||||
"description": "Remote Code Execution exploit for PrimeFaces 5.x - EL Injection (CVE-2017-1000486)",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-12-15T00:04:21Z"
|
||||
},
|
||||
{
|
||||
"name": "5MMISSI-CVE-2017-1000499",
|
||||
"full_name": "Villaquiranm/5MMISSI-CVE-2017-1000499",
|
||||
"html_url": "https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-01-05T16:33:08Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1000427.json
Normal file
11
exploits/2017/CVE-2017-1000427.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-1000427",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-1000427",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-1000427",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:17Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1061.json
Normal file
11
exploits/2017/CVE-2017-1061.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-10617",
|
||||
"full_name": "gteissier/CVE-2017-10617",
|
||||
"html_url": "https://github.com/gteissier/CVE-2017-10617",
|
||||
"description": "Contrail: hard coded credentials (CVE-2017-10616) and XML External Entity (XXE) vulnerability (CVE-2017-10617)",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-10-11T07:38:18Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-10617.json
Normal file
11
exploits/2017/CVE-2017-10617.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-10617",
|
||||
"full_name": "gteissier/CVE-2017-10617",
|
||||
"html_url": "https://github.com/gteissier/CVE-2017-10617",
|
||||
"description": "Contrail: hard coded credentials (CVE-2017-10616) and XML External Entity (XXE) vulnerability (CVE-2017-10617)",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-10-11T07:38:18Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-10952.json
Normal file
11
exploits/2017/CVE-2017-10952.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-10952",
|
||||
"full_name": "afbase/CVE-2017-10952",
|
||||
"html_url": "https://github.com/afbase/CVE-2017-10952",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 2,
|
||||
"created_at": "2019-11-24T02:01:24Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1178.json
Normal file
11
exploits/2017/CVE-2017-1178.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-11783",
|
||||
"full_name": "Sheisback/CVE-2017-11783",
|
||||
"html_url": "https://github.com/Sheisback/CVE-2017-11783",
|
||||
"description": "1day Exploit by sheisback",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 5,
|
||||
"created_at": "2018-08-31T01:48:29Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-11783.json
Normal file
11
exploits/2017/CVE-2017-11783.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-11783",
|
||||
"full_name": "Sheisback/CVE-2017-11783",
|
||||
"html_url": "https://github.com/Sheisback/CVE-2017-11783",
|
||||
"description": "1day Exploit by sheisback",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 5,
|
||||
"created_at": "2018-08-31T01:48:29Z"
|
||||
}
|
||||
]
|
20
exploits/2017/CVE-2017-1622.json
Normal file
20
exploits/2017/CVE-2017-1622.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-16226",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-16226",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-16226",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:18Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-16224",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-16224",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-16224",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:18Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-16224.json
Normal file
11
exploits/2017/CVE-2017-16224.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-16224",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-16224",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-16224",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:18Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-16226.json
Normal file
11
exploits/2017/CVE-2017-16226.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-16226",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2017-16226",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2017-16226",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-11-30T14:52:18Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-16524.json
Normal file
11
exploits/2017/CVE-2017-16524.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-16524",
|
||||
"full_name": "realistic-security/CVE-2017-16524",
|
||||
"html_url": "https://github.com/realistic-security/CVE-2017-16524",
|
||||
"description": "Unrestricted file upload vulnerability - Web Viewer 1.0.0.193 on Samsung SRN-1670D",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-11-05T13:32:43Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1654.json
Normal file
11
exploits/2017/CVE-2017-1654.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "A-breif-introduction-of-CVE-2017-16541",
|
||||
"full_name": "Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541",
|
||||
"html_url": "https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-03-29T09:52:11Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-16541.json
Normal file
11
exploits/2017/CVE-2017-16541.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "A-breif-introduction-of-CVE-2017-16541",
|
||||
"full_name": "Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541",
|
||||
"html_url": "https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-03-29T09:52:11Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1689.json
Normal file
11
exploits/2017/CVE-2017-1689.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-16894",
|
||||
"full_name": "ibnurusdianto/CVE-2017-16894",
|
||||
"html_url": "https://github.com/ibnurusdianto/CVE-2017-16894",
|
||||
"description": "Project Program sederhana hasil belajar python, untuk mendeteksi CVE 2017 – 16894 (remote attackers can obtain sensitive information) ",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-03-29T18:58:33Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-16894.json
Normal file
11
exploits/2017/CVE-2017-16894.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-16894",
|
||||
"full_name": "ibnurusdianto/CVE-2017-16894",
|
||||
"html_url": "https://github.com/ibnurusdianto/CVE-2017-16894",
|
||||
"description": "Project Program sederhana hasil belajar python, untuk mendeteksi CVE 2017 – 16894 (remote attackers can obtain sensitive information) ",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-03-29T18:58:33Z"
|
||||
}
|
||||
]
|
47
exploits/2017/CVE-2017-17562.json
Normal file
47
exploits/2017/CVE-2017-17562.json
Normal file
|
@ -0,0 +1,47 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-17562",
|
||||
"full_name": "ivanitlearning/CVE-2017-17562",
|
||||
"html_url": "https://github.com/ivanitlearning/CVE-2017-17562",
|
||||
"description": "Standalone Python 3 exploit for CVE-2017-17562",
|
||||
"stargazers_count": 9,
|
||||
"forks_count": 4,
|
||||
"created_at": "2019-10-16T16:28:27Z"
|
||||
},
|
||||
{
|
||||
"name": "CVE-2017-17562",
|
||||
"full_name": "1337g/CVE-2017-17562",
|
||||
"html_url": "https://github.com/1337g/CVE-2017-17562",
|
||||
"description": "CVE-2017-17562 GOAHEAD RCE (Author: Daniel Hodson)",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 3,
|
||||
"created_at": "2017-12-27T05:46:50Z"
|
||||
},
|
||||
{
|
||||
"name": "bash-CVE-2017-17562",
|
||||
"full_name": "freitzzz/bash-CVE-2017-17562",
|
||||
"html_url": "https://github.com/freitzzz/bash-CVE-2017-17562",
|
||||
"description": "PoC for CVE-2017-17562 written in bash",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2021-11-17T18:21:54Z"
|
||||
},
|
||||
{
|
||||
"name": "Goahead-CVE-2017-17562",
|
||||
"full_name": "crispy-peppers/Goahead-CVE-2017-17562",
|
||||
"html_url": "https://github.com/crispy-peppers/Goahead-CVE-2017-17562",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2019-11-23T08:40:49Z"
|
||||
},
|
||||
{
|
||||
"name": "GoAhead-cve---2017--17562",
|
||||
"full_name": "cyberharsh/GoAhead-cve---2017--17562",
|
||||
"html_url": "https://github.com/cyberharsh/GoAhead-cve---2017--17562",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-06-24T21:06:28Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-1791.json
Normal file
11
exploits/2017/CVE-2017-1791.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "rails-cve-2017-17917",
|
||||
"full_name": "matiasarenhard/rails-cve-2017-17917",
|
||||
"html_url": "https://github.com/matiasarenhard/rails-cve-2017-17917",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-01-18T22:12:54Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-17917.json
Normal file
11
exploits/2017/CVE-2017-17917.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "rails-cve-2017-17917",
|
||||
"full_name": "matiasarenhard/rails-cve-2017-17917",
|
||||
"html_url": "https://github.com/matiasarenhard/rails-cve-2017-17917",
|
||||
"description": null,
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2024-01-18T22:12:54Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-2636.json
Normal file
11
exploits/2017/CVE-2017-2636.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve-2017-2636-el",
|
||||
"full_name": "alexzorin/cve-2017-2636-el",
|
||||
"html_url": "https://github.com/alexzorin/cve-2017-2636-el",
|
||||
"description": "Ansible role for workaround for CVE-2017-2636 (Red Hat) - https://access.redhat.com/security/cve/CVE-2017-2636",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-03-09T23:20:42Z"
|
||||
}
|
||||
]
|
20
exploits/2017/CVE-2017-7184.json
Normal file
20
exploits/2017/CVE-2017-7184.json
Normal file
|
@ -0,0 +1,20 @@
|
|||
[
|
||||
{
|
||||
"name": "cve-2017-7184",
|
||||
"full_name": "rockl/cve-2017-7184",
|
||||
"html_url": "https://github.com/rockl/cve-2017-7184",
|
||||
"description": " the job is not yet finished",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-01-25T01:55:47Z"
|
||||
},
|
||||
{
|
||||
"name": "cve-2017-7184-bak",
|
||||
"full_name": "rockl/cve-2017-7184-bak",
|
||||
"html_url": "https://github.com/rockl/cve-2017-7184-bak",
|
||||
"description": "not yet fin",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-01-25T02:10:45Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-7648.json
Normal file
11
exploits/2017/CVE-2017-7648.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-7648.",
|
||||
"full_name": "notmot/CVE-2017-7648.",
|
||||
"html_url": "https://github.com/notmot/CVE-2017-7648.",
|
||||
"description": "A writeup of CVE-2017-7648",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2017-04-10T18:41:59Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-7651.json
Normal file
11
exploits/2017/CVE-2017-7651.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-7651",
|
||||
"full_name": "St3v3nsS/CVE-2017-7651",
|
||||
"html_url": "https://github.com/St3v3nsS/CVE-2017-7651",
|
||||
"description": "This is the repository used for CVE-2017-7651 for exploiting mosquitto 1.4.14",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-02-21T12:54:41Z"
|
||||
}
|
||||
]
|
11
exploits/2017/CVE-2017-8641.json
Normal file
11
exploits/2017/CVE-2017-8641.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"full_name": "homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"html_url": "https://github.com/homjxi0e/CVE-2017-8641_chakra_Js_GlobalObject",
|
||||
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
|
||||
"stargazers_count": 1,
|
||||
"forks_count": 1,
|
||||
"created_at": "2017-08-21T20:11:11Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1000802.json
Normal file
11
exploits/2018/CVE-2018-1000802.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-1000802-PoC",
|
||||
"full_name": "tna0y/CVE-2018-1000802-PoC",
|
||||
"html_url": "https://github.com/tna0y/CVE-2018-1000802-PoC",
|
||||
"description": "Python CVE-2018-1000802 Proof-of-Concept",
|
||||
"stargazers_count": 4,
|
||||
"forks_count": 0,
|
||||
"created_at": "2018-09-14T16:22:12Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1099.json
Normal file
11
exploits/2018/CVE-2018-1099.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "cve-2018-10993",
|
||||
"full_name": "nicolastsk/cve-2018-10993",
|
||||
"html_url": "https://github.com/nicolastsk/cve-2018-10993",
|
||||
"description": null,
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-11-03T20:22:16Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1132.json
Normal file
11
exploits/2018/CVE-2018-1132.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-11321",
|
||||
"full_name": "ExploitCN/CVE-2018-11321",
|
||||
"html_url": "https://github.com/ExploitCN/CVE-2018-11321",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-07-26T02:28:16Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-11321.json
Normal file
11
exploits/2018/CVE-2018-11321.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-11321",
|
||||
"full_name": "ExploitCN/CVE-2018-11321",
|
||||
"html_url": "https://github.com/ExploitCN/CVE-2018-11321",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-07-26T02:28:16Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1232.json
Normal file
11
exploits/2018/CVE-2018-1232.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-12326",
|
||||
"full_name": "spasm5/CVE-2018-12326",
|
||||
"html_url": "https://github.com/spasm5/CVE-2018-12326",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-03-25T01:44:26Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1305.json
Normal file
11
exploits/2018/CVE-2018-1305.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-1305",
|
||||
"full_name": "Pa55w0rd/CVE-2018-1305",
|
||||
"html_url": "https://github.com/Pa55w0rd/CVE-2018-1305",
|
||||
"description": "Apache Tomcat 安全绕过漏洞 Poc",
|
||||
"stargazers_count": 7,
|
||||
"forks_count": 9,
|
||||
"created_at": "2018-04-11T01:37:58Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1306.json
Normal file
11
exploits/2018/CVE-2018-1306.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "Apache-Pluto-3.0.0--CVE-2018-1306",
|
||||
"full_name": "JJSO12/Apache-Pluto-3.0.0--CVE-2018-1306",
|
||||
"html_url": "https://github.com/JJSO12/Apache-Pluto-3.0.0--CVE-2018-1306",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2020-04-24T06:34:55Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-14009.json
Normal file
11
exploits/2018/CVE-2018-14009.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "Codiad-CVE-2018-14009",
|
||||
"full_name": "hidog123/Codiad-CVE-2018-14009",
|
||||
"html_url": "https://github.com/hidog123/Codiad-CVE-2018-14009",
|
||||
"description": "Codiad through 2.8.4 allows Remote Code Execution, a different vulnerability than CVE-2017-11366 and CVE-2017-15689",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-01-27T17:16:35Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1438.json
Normal file
11
exploits/2018/CVE-2018-1438.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-14380",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2018-14380",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2018-14380",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2020-12-01T08:06:10Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-14380.json
Normal file
11
exploits/2018/CVE-2018-14380.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-14380",
|
||||
"full_name": "ossf-cve-benchmark/CVE-2018-14380",
|
||||
"html_url": "https://github.com/ossf-cve-benchmark/CVE-2018-14380",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2020-12-01T08:06:10Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-14469.json
Normal file
11
exploits/2018/CVE-2018-14469.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "external_tcpdump_CVE-2018-14469",
|
||||
"full_name": "Trinadh465/external_tcpdump_CVE-2018-14469",
|
||||
"html_url": "https://github.com/Trinadh465/external_tcpdump_CVE-2018-14469",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2023-09-13T13:13:26Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1643.json
Normal file
11
exploits/2018/CVE-2018-1643.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-16431",
|
||||
"full_name": "RHYru9/CVE-2018-16431",
|
||||
"html_url": "https://github.com/RHYru9/CVE-2018-16431",
|
||||
"description": "CVE-2018-16431 mass scanner and single target scan.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-04-04T19:31:57Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-16431.json
Normal file
11
exploits/2018/CVE-2018-16431.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-16431",
|
||||
"full_name": "RHYru9/CVE-2018-16431",
|
||||
"html_url": "https://github.com/RHYru9/CVE-2018-16431",
|
||||
"description": "CVE-2018-16431 mass scanner and single target scan.",
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 1,
|
||||
"created_at": "2024-04-04T19:31:57Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1680.json
Normal file
11
exploits/2018/CVE-2018-1680.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-16809",
|
||||
"full_name": "elkassimyhajar/CVE-2018-16809",
|
||||
"html_url": "https://github.com/elkassimyhajar/CVE-2018-16809",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-01-21T12:37:40Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-16809.json
Normal file
11
exploits/2018/CVE-2018-16809.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-16809",
|
||||
"full_name": "elkassimyhajar/CVE-2018-16809",
|
||||
"html_url": "https://github.com/elkassimyhajar/CVE-2018-16809",
|
||||
"description": null,
|
||||
"stargazers_count": 0,
|
||||
"forks_count": 0,
|
||||
"created_at": "2022-01-21T12:37:40Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-1796.json
Normal file
11
exploits/2018/CVE-2018-1796.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-17961",
|
||||
"full_name": "matlink/CVE-2018-17961",
|
||||
"html_url": "https://github.com/matlink/CVE-2018-17961",
|
||||
"description": null,
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2018-11-01T13:33:12Z"
|
||||
}
|
||||
]
|
11
exploits/2018/CVE-2018-17961.json
Normal file
11
exploits/2018/CVE-2018-17961.json
Normal file
|
@ -0,0 +1,11 @@
|
|||
[
|
||||
{
|
||||
"name": "CVE-2018-17961",
|
||||
"full_name": "matlink/CVE-2018-17961",
|
||||
"html_url": "https://github.com/matlink/CVE-2018-17961",
|
||||
"description": null,
|
||||
"stargazers_count": 2,
|
||||
"forks_count": 1,
|
||||
"created_at": "2018-11-01T13:33:12Z"
|
||||
}
|
||||
]
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue