272 lines
No EOL
9.8 KiB
JSON
272 lines
No EOL
9.8 KiB
JSON
[
|
||
{
|
||
"name": "cve-2013-2094",
|
||
"full_name": "realtalk/cve-2013-2094",
|
||
"html_url": "https://github.com/realtalk/cve-2013-2094",
|
||
"description": "original cve-2013-2094 exploit and a rewritten version for educational purposes",
|
||
"stargazers_count": 90,
|
||
"forks_count": 51,
|
||
"created_at": "2013-05-20T04:23:13Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-2729",
|
||
"full_name": "feliam/CVE-2013-2729",
|
||
"html_url": "https://github.com/feliam/CVE-2013-2729",
|
||
"description": null,
|
||
"stargazers_count": 25,
|
||
"forks_count": 21,
|
||
"created_at": "2013-05-15T04:12:13Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-6282",
|
||
"full_name": "timwr/CVE-2013-6282",
|
||
"html_url": "https://github.com/timwr/CVE-2013-6282",
|
||
"description": "CVE-2013-6282 proof of concept for Android",
|
||
"stargazers_count": 20,
|
||
"forks_count": 19,
|
||
"created_at": "2016-12-19T16:14:18Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-2028-Exploit",
|
||
"full_name": "m4drat/CVE-2013-2028-Exploit",
|
||
"html_url": "https://github.com/m4drat/CVE-2013-2028-Exploit",
|
||
"description": "CVE-2013-2028 python exploit",
|
||
"stargazers_count": 17,
|
||
"forks_count": 1,
|
||
"created_at": "2020-06-27T15:08:26Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-2730",
|
||
"full_name": "feliam/CVE-2013-2730",
|
||
"html_url": "https://github.com/feliam/CVE-2013-2730",
|
||
"description": null,
|
||
"stargazers_count": 10,
|
||
"forks_count": 9,
|
||
"created_at": "2013-05-15T21:15:12Z"
|
||
},
|
||
{
|
||
"name": "CVE20131491-JIT",
|
||
"full_name": "guhe120/CVE20131491-JIT",
|
||
"html_url": "https://github.com/guhe120/CVE20131491-JIT",
|
||
"description": "JIT spray version of cve-2013-1491",
|
||
"stargazers_count": 9,
|
||
"forks_count": 10,
|
||
"created_at": "2013-10-03T07:10:37Z"
|
||
},
|
||
{
|
||
"name": "cve-2013-1300",
|
||
"full_name": "Meatballs1/cve-2013-1300",
|
||
"html_url": "https://github.com/Meatballs1/cve-2013-1300",
|
||
"description": null,
|
||
"stargazers_count": 9,
|
||
"forks_count": 11,
|
||
"created_at": "2013-09-09T14:20:57Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-6117",
|
||
"full_name": "milo2012/CVE-2013-6117",
|
||
"html_url": "https://github.com/milo2012/CVE-2013-6117",
|
||
"description": "CVE-2013-6117",
|
||
"stargazers_count": 8,
|
||
"forks_count": 7,
|
||
"created_at": "2018-07-23T14:56:03Z"
|
||
},
|
||
{
|
||
"name": "rails-exploit-cve-2013-0156",
|
||
"full_name": "bsodmike/rails-exploit-cve-2013-0156",
|
||
"html_url": "https://github.com/bsodmike/rails-exploit-cve-2013-0156",
|
||
"description": "Bootstrapped Rails 3.2.10 to test the remote code exploit CVE-2013-0156",
|
||
"stargazers_count": 5,
|
||
"forks_count": 4,
|
||
"created_at": "2013-01-12T13:37:05Z"
|
||
},
|
||
{
|
||
"name": "buherablog-cve-2013-1488",
|
||
"full_name": "v-p-b/buherablog-cve-2013-1488",
|
||
"html_url": "https://github.com/v-p-b/buherablog-cve-2013-1488",
|
||
"description": "PoC Java exploit based on http://www.contextis.com/research/blog/java-pwn2own/",
|
||
"stargazers_count": 5,
|
||
"forks_count": 2,
|
||
"created_at": "2015-04-16T07:12:19Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-2094",
|
||
"full_name": "Pashkela/CVE-2013-2094",
|
||
"html_url": "https://github.com/Pashkela/CVE-2013-2094",
|
||
"description": "CVE-2013-2094 Linux 2.6.32/2.6.37 - 3.8.10 PERF_EVENTS local root x86/x86_64",
|
||
"stargazers_count": 4,
|
||
"forks_count": 2,
|
||
"created_at": "2013-06-16T11:53:36Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-3660-x64-WIN7",
|
||
"full_name": "ExploitCN/CVE-2013-3660-x64-WIN7",
|
||
"html_url": "https://github.com/ExploitCN/CVE-2013-3660-x64-WIN7",
|
||
"description": "CVE-2013-3660的x64 win7平台EXP源代码,成功率100%。",
|
||
"stargazers_count": 4,
|
||
"forks_count": 0,
|
||
"created_at": "2022-01-29T02:14:26Z"
|
||
},
|
||
{
|
||
"name": "cve-2013-2094",
|
||
"full_name": "timhsutw/cve-2013-2094",
|
||
"html_url": "https://github.com/timhsutw/cve-2013-2094",
|
||
"description": "CVE-2013-2094 kernel exploit for i386",
|
||
"stargazers_count": 3,
|
||
"forks_count": 3,
|
||
"created_at": "2015-03-29T12:55:03Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-5211",
|
||
"full_name": "0xhav0c/CVE-2013-5211",
|
||
"html_url": "https://github.com/0xhav0c/CVE-2013-5211",
|
||
"description": null,
|
||
"stargazers_count": 3,
|
||
"forks_count": 1,
|
||
"created_at": "2023-05-03T17:20:51Z"
|
||
},
|
||
{
|
||
"name": "Nginx-CVE-2013-4547",
|
||
"full_name": "cyberharsh/Nginx-CVE-2013-4547",
|
||
"html_url": "https://github.com/cyberharsh/Nginx-CVE-2013-4547",
|
||
"description": null,
|
||
"stargazers_count": 3,
|
||
"forks_count": 1,
|
||
"created_at": "2020-06-20T09:37:58Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-5842",
|
||
"full_name": "guhe120/CVE-2013-5842",
|
||
"html_url": "https://github.com/guhe120/CVE-2013-5842",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 3,
|
||
"created_at": "2013-11-12T08:23:44Z"
|
||
},
|
||
{
|
||
"name": "Dropbear_CVE-2013-4434",
|
||
"full_name": "styx00/Dropbear_CVE-2013-4434",
|
||
"html_url": "https://github.com/styx00/Dropbear_CVE-2013-4434",
|
||
"description": "Dropbear user enumeration (CVE-2013-4434) PoC",
|
||
"stargazers_count": 2,
|
||
"forks_count": 2,
|
||
"created_at": "2016-03-20T15:06:29Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-1081",
|
||
"full_name": "steponequit/CVE-2013-1081",
|
||
"html_url": "https://github.com/steponequit/CVE-2013-1081",
|
||
"description": "Novell ZENworks Mobile Management - LFI RCE",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2013-05-31T08:53:13Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-3651",
|
||
"full_name": "motikan2010/CVE-2013-3651",
|
||
"html_url": "https://github.com/motikan2010/CVE-2013-3651",
|
||
"description": "CVE-2013-3651 PoC - EC-CUBE 2",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2019-12-26T04:43:38Z"
|
||
},
|
||
{
|
||
"name": "heroku-CVE-2013-0333",
|
||
"full_name": "heroku/heroku-CVE-2013-0333",
|
||
"html_url": "https://github.com/heroku/heroku-CVE-2013-0333",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 0,
|
||
"created_at": "2013-01-29T00:33:03Z"
|
||
},
|
||
{
|
||
"name": "heroku-CVE-2013-0269",
|
||
"full_name": "heroku/heroku-CVE-2013-0269",
|
||
"html_url": "https://github.com/heroku/heroku-CVE-2013-0269",
|
||
"description": "Inspect all of your Heroku apps for vulnerable versions of the JSON gem",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2013-02-11T18:02:20Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||
"full_name": "tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||
"html_url": "https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||
"description": "this is not stable",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2019-08-03T07:38:18Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-2094",
|
||
"full_name": "vnik5287/CVE-2013-2094",
|
||
"html_url": "https://github.com/vnik5287/CVE-2013-2094",
|
||
"description": "perf_swevent_init",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2019-07-23T12:31:55Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-3827",
|
||
"full_name": "thistehneisen/CVE-2013-3827",
|
||
"html_url": "https://github.com/thistehneisen/CVE-2013-3827",
|
||
"description": "Quick PoC checker for common configurations that might be available via directory traversal due to CVE-2013-3827",
|
||
"stargazers_count": 1,
|
||
"forks_count": 1,
|
||
"created_at": "2023-08-05T08:26:22Z"
|
||
},
|
||
{
|
||
"name": "CVE-2024-20137",
|
||
"full_name": "takistmr/CVE-2024-20137",
|
||
"html_url": "https://github.com/takistmr/CVE-2024-20137",
|
||
"description": "Python code for expoiting of vulnerability in wlan driver of MediaTek SOCs MT6890, MT7622, MT7915, MT7916, MT7981, MT7986",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2024-12-25T15:01:38Z"
|
||
},
|
||
{
|
||
"name": "cve-2013-6375",
|
||
"full_name": "bl4ck5un/cve-2013-6375",
|
||
"html_url": "https://github.com/bl4ck5un/cve-2013-6375",
|
||
"description": "Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an \"inverted boolean parameter.\"",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2014-04-08T02:59:22Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-1965",
|
||
"full_name": "cinno/CVE-2013-1965",
|
||
"html_url": "https://github.com/cinno/CVE-2013-1965",
|
||
"description": "A proof of concept exploit for the CVE-2013-1965 vulnerability affecting Apache Struts 2",
|
||
"stargazers_count": 1,
|
||
"forks_count": 1,
|
||
"created_at": "2015-06-04T18:47:35Z"
|
||
},
|
||
{
|
||
"name": "heroku-CVE-2013-0156",
|
||
"full_name": "heroku/heroku-CVE-2013-0156",
|
||
"html_url": "https://github.com/heroku/heroku-CVE-2013-0156",
|
||
"description": "Inspect all of your heroku apps to see if they are running a vulnerable version of Rails",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2013-01-11T02:13:48Z"
|
||
},
|
||
{
|
||
"name": "CVE-2013-4710-WebView-RCE-Vulnerability",
|
||
"full_name": "Snip3R69/CVE-2013-4710-WebView-RCE-Vulnerability",
|
||
"html_url": "https://github.com/Snip3R69/CVE-2013-4710-WebView-RCE-Vulnerability",
|
||
"description": "Android 3.0 through 4.1.x on Disney Mobile, eAccess, KDDI, NTT DOCOMO, SoftBank, and other devices does not properly implement the WebView class, which allows remote attackers to execute arbitrary methods of Java objects or cause a denial of service (reboot) via a crafted web page, as demonstrated by use of the WebView.addJavascriptInterface method, a related issue to CVE-2012-6636.",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2022-05-11T08:53:56Z"
|
||
},
|
||
{
|
||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20138",
|
||
"full_name": "Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20138",
|
||
"html_url": "https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20138",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2022-11-08T14:16:45Z"
|
||
}
|
||
] |