PoC-in-GitHub/2019/CVE-2019-7304.json

94 lines
3.2 KiB
JSON
Raw Normal View History

2021-03-18 04:09:15 +01:00
[
{
"id": 170261590,
"name": "dirty_sock",
"full_name": "initstring\/dirty_sock",
"owner": {
"login": "initstring",
"id": 26131150,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26131150?v=4",
"html_url": "https:\/\/github.com\/initstring"
},
"html_url": "https:\/\/github.com\/initstring\/dirty_sock",
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
2021-09-06 17:14:46 +02:00
"updated_at": "2021-09-06T12:05:08Z",
2021-03-18 04:09:15 +01:00
"pushed_at": "2019-05-09T21:34:26Z",
2021-09-06 17:14:46 +02:00
"stargazers_count": 602,
"watchers_count": 602,
2021-09-08 17:13:24 +02:00
"forks_count": 146,
"forks": 146,
2021-09-06 17:14:46 +02:00
"watchers": 602,
2021-03-19 22:10:57 +01:00
"score": 0
2021-03-29 05:10:46 +02:00
},
2021-04-20 05:11:08 +02:00
{
"id": 170741210,
"name": "CVE-2019-7304_DirtySock",
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
"owner": {
"login": "SecuritySi",
"id": 7517443,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7517443?v=4",
"html_url": "https:\/\/github.com\/SecuritySi"
},
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
"description": "Payload Generator",
"fork": false,
"created_at": "2019-02-14T18:48:56Z",
"updated_at": "2019-03-05T06:03:09Z",
"pushed_at": "2019-02-14T18:49:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
},
2021-03-29 05:10:46 +02:00
{
"id": 352460406,
"name": "snap_priv_esc",
"full_name": "bendalisoftpro\/snap_priv_esc",
"owner": {
"login": "bendalisoftpro",
"id": 31170276,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31170276?v=4",
"html_url": "https:\/\/github.com\/bendalisoftpro"
},
"html_url": "https:\/\/github.com\/bendalisoftpro\/snap_priv_esc",
"description": "Another implementation for linux privilege escalation exploit via snap(d) (CVE-2019-7304)",
"fork": false,
"created_at": "2021-03-28T23:17:27Z",
"updated_at": "2021-03-28T23:31:24Z",
"pushed_at": "2021-03-28T23:31:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2021-07-28 17:12:15 +02:00
},
{
"id": 390354257,
"name": "dirty_sock",
"full_name": "f4T1H21\/dirty_sock",
"owner": {
"login": "f4T1H21",
"id": 83399767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
"html_url": "https:\/\/github.com\/f4T1H21"
},
"html_url": "https:\/\/github.com\/f4T1H21\/dirty_sock",
"description": "Local Privilege Escalation via snapd (CVE-2019-7304) Remastered PoC exploit",
"fork": false,
"created_at": "2021-07-28T13:06:41Z",
"updated_at": "2021-07-28T13:47:50Z",
"pushed_at": "2021-07-28T13:26:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
2021-03-18 04:09:15 +01:00
}
]