PoC-in-GitHub/2017/CVE-2017-0199.json

255 lines
8.9 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 88486475,
"name": "CVE-2017-0199",
"full_name": "bhdresh\/CVE-2017-0199",
"owner": {
"login": "bhdresh",
"id": 8931885,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8931885?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/bhdresh"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-0199",
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
2020-07-09 05:08:16 +02:00
"updated_at": "2020-07-09T02:24:33Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2017-11-19T11:01:16Z",
2020-07-09 05:08:16 +02:00
"stargazers_count": 624,
"watchers_count": 624,
2020-07-09 17:08:20 +02:00
"forks_count": 281,
"forks": 281,
2020-07-09 05:08:16 +02:00
"watchers": 624,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2020-06-01 05:08:29 +02:00
{
"id": 88590374,
"name": "CVE-2017-0199-Fix",
"full_name": "NotAwful\/CVE-2017-0199-Fix",
"owner": {
"login": "NotAwful",
"id": 25178947,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25178947?v=4",
"html_url": "https:\/\/github.com\/NotAwful"
},
"html_url": "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix",
"description": "Quick and dirty fix to OLE2 executing code via .hta",
"fork": false,
"created_at": "2017-04-18T06:33:45Z",
"updated_at": "2018-03-18T10:23:47Z",
"pushed_at": "2017-04-24T20:48:36Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 1,
"forks": 1,
"watchers": 14,
"score": 0
},
{
"id": 89296859,
"name": "htattack",
"full_name": "kn0wm4d\/htattack",
"owner": {
"login": "kn0wm4d",
"id": 15344287,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15344287?v=4",
"html_url": "https:\/\/github.com\/kn0wm4d"
},
"html_url": "https:\/\/github.com\/kn0wm4d\/htattack",
"description": "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)",
"fork": false,
"created_at": "2017-04-24T23:44:31Z",
"updated_at": "2020-04-07T06:30:15Z",
"pushed_at": "2017-04-24T23:45:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 89314149,
"name": "Cve-2017-0199",
"full_name": "joke998\/Cve-2017-0199",
"owner": {
"login": "joke998",
"id": 25948923,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
"html_url": "https:\/\/github.com\/joke998"
},
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-04-25T03:38:15Z",
"updated_at": "2017-04-25T03:38:15Z",
"pushed_at": "2017-04-25T03:38:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 89314954,
"name": "Cve-2017-0199-",
"full_name": "joke998\/Cve-2017-0199-",
"owner": {
"login": "joke998",
"id": 25948923,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
"html_url": "https:\/\/github.com\/joke998"
},
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199-",
"description": "Cve-2017-0199",
"fork": false,
"created_at": "2017-04-25T03:48:53Z",
"updated_at": "2017-04-25T03:48:53Z",
"pushed_at": "2017-04-25T03:48:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
2020-05-25 05:07:49 +02:00
{
"id": 95870771,
"name": "Microsoft-Word-CVE-2017-0199-",
"full_name": "sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:08:40Z",
"updated_at": "2020-03-26T07:51:03Z",
"pushed_at": "2017-06-30T09:11:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
2020-04-12 17:10:36 +02:00
{
"id": 104072875,
"name": "CVE-2017-0199",
"full_name": "viethdgit\/CVE-2017-0199",
"owner": {
"login": "viethdgit",
"id": 24888568,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24888568?v=4",
"html_url": "https:\/\/github.com\/viethdgit"
},
"html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-09-19T12:38:47Z",
"updated_at": "2017-09-19T12:38:47Z",
"pushed_at": "2017-09-19T12:47:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 109420190,
"name": "RTF-Cleaner",
"full_name": "nicpenning\/RTF-Cleaner",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "nicpenning",
"id": 5582679,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5582679?v=4",
"html_url": "https:\/\/github.com\/nicpenning"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner",
"description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2017-11-03T16:47:16Z",
"updated_at": "2019-06-29T16:49:45Z",
"pushed_at": "2017-11-03T20:55:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 111145351,
"name": "2017-11-17-Maldoc-Using-CVE-2017-0199",
"full_name": "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
"owner": {
"login": "bloomer1016",
"id": 12056770,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12056770?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/bloomer1016"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2017-11-17T20:00:29Z",
2020-03-29 11:07:23 +02:00
"updated_at": "2020-03-29T03:29:38Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2017-11-17T20:00:42Z",
2020-03-29 11:07:23 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 113558617,
"name": "RTF-Cleaner",
"full_name": "jacobsoo\/RTF-Cleaner",
"owner": {
"login": "jacobsoo",
"id": 3516693,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3516693?v=4",
"html_url": "https:\/\/github.com\/jacobsoo"
},
"html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner",
"description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759",
"fork": false,
"created_at": "2017-12-08T09:45:25Z",
"updated_at": "2018-02-21T04:37:47Z",
"pushed_at": "2017-12-08T09:46:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 126305253,
"name": "CVE-2017-0199",
"full_name": "denmilu\/CVE-2017-0199",
"owner": {
"login": "denmilu",
"id": 2469038,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/denmilu"
},
"html_url": "https:\/\/github.com\/denmilu\/CVE-2017-0199",
"description": null,
"fork": false,
"created_at": "2018-03-22T08:40:55Z",
"updated_at": "2018-03-22T08:41:14Z",
"pushed_at": "2018-03-22T08:41:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
}
]