PoC-in-GitHub/2013/CVE-2013-2028.json

224 lines
7.4 KiB
JSON
Raw Permalink Normal View History

2019-12-08 14:19:20 +01:00
[
2023-11-11 07:26:33 +01:00
{
"id": 10198831,
"name": "nginx-1.4.0",
"full_name": "danghvu\/nginx-1.4.0",
"owner": {
"login": "danghvu",
"id": 1152714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1152714?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/danghvu",
"user_view_type": "public"
2023-11-11 07:26:33 +01:00
},
"html_url": "https:\/\/github.com\/danghvu\/nginx-1.4.0",
"description": "For the analysis of CVE-2013-2028",
"fork": false,
"created_at": "2013-05-21T15:20:05Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T19:11:50Z",
2023-11-11 07:26:33 +01:00
"pushed_at": "2018-06-07T23:22:38Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 30,
"watchers_count": 30,
2023-11-11 07:26:33 +01:00
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
2024-08-13 02:29:46 +02:00
"watchers": 30,
2023-11-11 07:26:33 +01:00
"score": 0,
"subscribers_count": 4
},
2023-08-07 20:32:11 +02:00
{
"id": 54551843,
"name": "nginxpwn",
"full_name": "kitctf\/nginxpwn",
"owner": {
"login": "kitctf",
"id": 8018062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8018062?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/kitctf",
"user_view_type": "public"
2023-08-07 20:32:11 +02:00
},
"html_url": "https:\/\/github.com\/kitctf\/nginxpwn",
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
"fork": false,
"created_at": "2016-03-23T10:41:00Z",
2024-11-10 02:31:12 +01:00
"updated_at": "2024-11-08T18:41:20Z",
2023-08-07 20:32:11 +02:00
"pushed_at": "2016-03-23T12:05:38Z",
2024-11-10 02:31:12 +01:00
"stargazers_count": 54,
"watchers_count": 54,
2023-08-07 20:32:11 +02:00
"has_discussions": false,
2024-09-07 08:29:38 +02:00
"forks_count": 17,
2023-08-07 20:32:11 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-09-07 08:29:38 +02:00
"forks": 17,
2024-11-10 02:31:12 +01:00
"watchers": 54,
2023-08-07 20:32:11 +02:00
"score": 0,
"subscribers_count": 6
},
2024-01-26 07:26:17 +01:00
{
"id": 200347068,
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"owner": {
"login": "tachibana51",
"id": 29031994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/tachibana51",
"user_view_type": "public"
2024-01-26 07:26:17 +01:00
},
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"description": "this is not stable",
"fork": false,
"created_at": "2019-08-03T07:38:18Z",
"updated_at": "2019-10-26T18:48:26Z",
"pushed_at": "2019-08-03T07:58:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
2023-06-19 10:13:15 +02:00
{
"id": 275396332,
"name": "CVE-2013-2028-Exploit",
"full_name": "m4drat\/CVE-2013-2028-Exploit",
"owner": {
"login": "m4drat",
"id": 39669467,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39669467?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/m4drat",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit",
"description": "CVE-2013-2028 python exploit",
"fork": false,
"created_at": "2020-06-27T15:08:26Z",
2024-12-27 19:31:15 +01:00
"updated_at": "2024-12-27T15:31:34Z",
2023-06-19 10:13:15 +02:00
"pushed_at": "2020-06-27T15:08:58Z",
2024-12-27 19:31:15 +01:00
"stargazers_count": 14,
"watchers_count": 14,
2023-06-19 10:13:15 +02:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"nginx",
"pwn"
],
"visibility": "public",
"forks": 1,
2024-12-27 19:31:15 +01:00
"watchers": 14,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-06-19 10:13:15 +02:00
},
{
"id": 384198605,
"name": "nginxhack",
"full_name": "jptr218\/nginxhack",
"owner": {
"login": "jptr218",
"id": 84092766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/jptr218",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/jptr218\/nginxhack",
"description": "A CVE-2013-2028 implementation",
"fork": false,
"created_at": "2021-07-08T17:17:34Z",
"updated_at": "2021-07-27T10:19:45Z",
"pushed_at": "2021-07-27T10:19:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 524887947,
"name": "CVE-2013-2028-reproduction",
"full_name": "Sunqiz\/CVE-2013-2028-reproduction",
"owner": {
"login": "Sunqiz",
"id": 59192636,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Sunqiz",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/Sunqiz\/CVE-2013-2028-reproduction",
"description": "CVE-2013-2028复现",
"fork": false,
"created_at": "2022-08-15T07:06:23Z",
"updated_at": "2022-08-15T07:09:13Z",
"pushed_at": "2022-08-15T07:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2024-07-23 14:30:07 +02:00
},
{
"id": 832619909,
"name": "CVE-2013-2028_Checker",
"full_name": "xiw1ll\/CVE-2013-2028_Checker",
"owner": {
"login": "xiw1ll",
"id": 69167284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69167284?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/xiw1ll",
"user_view_type": "public"
2024-07-23 14:30:07 +02:00
},
"html_url": "https:\/\/github.com\/xiw1ll\/CVE-2013-2028_Checker",
"description": "Tool for checking Nginx CVE-2013-2028",
"fork": false,
"created_at": "2024-07-23T11:40:26Z",
"updated_at": "2024-07-23T11:40:55Z",
"pushed_at": "2024-07-23T11:40:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-07-23 20:29:55 +02:00
"subscribers_count": 1
2019-12-08 14:19:20 +01:00
}
]