PoC-in-GitHub/2017/CVE-2017-5689.json

117 lines
4 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 90210170,
"name": "CVE-2017-5689",
"full_name": "CerberusSecurity\/CVE-2017-5689",
"owner": {
"login": "CerberusSecurity",
"id": 21088337,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21088337?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/CerberusSecurity"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/CerberusSecurity\/CVE-2017-5689",
"description": null,
"fork": false,
"created_at": "2017-05-04T01:51:26Z",
2020-01-01 04:30:02 +01:00
"updated_at": "2020-01-01T00:38:18Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2017-05-04T03:06:32Z",
2020-01-01 04:30:02 +01:00
"stargazers_count": 39,
"watchers_count": 39,
2019-12-08 14:19:20 +01:00
"forks_count": 9,
"forks": 9,
2020-01-01 04:30:02 +01:00
"watchers": 39,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 90472957,
"name": "amthoneypot",
"full_name": "packetflare\/amthoneypot",
"owner": {
"login": "packetflare",
"id": 11153104,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/packetflare"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/packetflare\/amthoneypot",
"description": "Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689",
"fork": false,
"created_at": "2017-05-06T15:35:42Z",
2019-12-30 16:30:02 +01:00
"updated_at": "2019-12-30T13:13:59Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2019-03-27T13:11:37Z",
2019-12-30 16:30:02 +01:00
"stargazers_count": 11,
"watchers_count": 11,
2019-12-08 14:19:20 +01:00
"forks_count": 3,
"forks": 3,
2019-12-30 16:30:02 +01:00
"watchers": 11,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 90724328,
"name": "intel_amt_bypass",
"full_name": "Bijaye\/intel_amt_bypass",
"owner": {
"login": "Bijaye",
"id": 4318412,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4318412?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/Bijaye"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/Bijaye\/intel_amt_bypass",
"description": "simple python poc for CVE-2017-5689",
"fork": false,
"created_at": "2017-05-09T08:55:39Z",
"updated_at": "2019-06-28T19:35:09Z",
"pushed_at": "2017-05-09T00:42:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 7,
"forks": 7,
"watchers": 2,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 91235068,
"name": "amt-bypass-test",
"full_name": "prototux\/amt-bypass-test",
"owner": {
"login": "prototux",
"id": 1549232,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1549232?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/prototux"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/prototux\/amt-bypass-test",
"description": "Small script to test if a machine is vulnerable to intel AMT auth bypass (CVE-2017-5689)",
"fork": false,
"created_at": "2017-05-14T10:09:59Z",
"updated_at": "2018-07-21T18:32:38Z",
"pushed_at": "2017-05-14T10:12:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 98579784,
"name": "amt_auth_bypass_poc",
"full_name": "embedi\/amt_auth_bypass_poc",
"owner": {
"login": "embedi",
"id": 24190344,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24190344?v=4",
"html_url": "https:\/\/github.com\/embedi"
},
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
"description": "CVE-2017-5689 Proof-of-Concept exploit",
"fork": false,
"created_at": "2017-07-27T21:06:08Z",
"updated_at": "2019-11-06T20:54:48Z",
"pushed_at": "2017-07-27T21:08:49Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 16,
"forks": 16,
"watchers": 47,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
}
]