2019-12-08 14:19:20 +01:00
|
|
|
[
|
|
|
|
{
|
|
|
|
"id": 10198831,
|
|
|
|
"name": "nginx-1.4.0",
|
|
|
|
"full_name": "danghvu\/nginx-1.4.0",
|
|
|
|
"owner": {
|
|
|
|
"login": "danghvu",
|
|
|
|
"id": 1152714,
|
|
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1152714?v=4",
|
2019-12-12 06:14:27 +01:00
|
|
|
"html_url": "https:\/\/github.com\/danghvu"
|
2019-12-08 14:19:20 +01:00
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/danghvu\/nginx-1.4.0",
|
|
|
|
"description": "For the analysis of CVE-2013-2028",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2013-05-21T15:20:05Z",
|
2020-06-27 23:09:07 +02:00
|
|
|
"updated_at": "2020-06-27T16:20:54Z",
|
2019-12-08 14:19:20 +01:00
|
|
|
"pushed_at": "2018-06-07T23:22:38Z",
|
2020-06-27 23:09:07 +02:00
|
|
|
"stargazers_count": 29,
|
|
|
|
"watchers_count": 29,
|
2020-03-29 05:07:13 +02:00
|
|
|
"forks_count": 11,
|
|
|
|
"forks": 11,
|
2020-06-27 23:09:07 +02:00
|
|
|
"watchers": 29,
|
2019-12-12 06:14:27 +01:00
|
|
|
"score": 0
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": 54551843,
|
|
|
|
"name": "nginxpwn",
|
|
|
|
"full_name": "kitctf\/nginxpwn",
|
|
|
|
"owner": {
|
|
|
|
"login": "kitctf",
|
|
|
|
"id": 8018062,
|
|
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8018062?v=4",
|
|
|
|
"html_url": "https:\/\/github.com\/kitctf"
|
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/kitctf\/nginxpwn",
|
|
|
|
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2016-03-23T10:41:00Z",
|
2020-11-22 04:09:20 +01:00
|
|
|
"updated_at": "2020-11-22T00:59:48Z",
|
2019-12-12 06:14:27 +01:00
|
|
|
"pushed_at": "2016-03-23T12:05:38Z",
|
2020-11-22 04:09:20 +01:00
|
|
|
"stargazers_count": 44,
|
|
|
|
"watchers_count": 44,
|
2021-01-05 16:09:56 +01:00
|
|
|
"forks_count": 20,
|
|
|
|
"forks": 20,
|
2020-11-22 04:09:20 +01:00
|
|
|
"watchers": 44,
|
2019-12-09 16:05:38 +01:00
|
|
|
"score": 0
|
2019-12-08 14:19:20 +01:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": 200347068,
|
|
|
|
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
|
|
|
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
|
|
|
"owner": {
|
|
|
|
"login": "tachibana51",
|
|
|
|
"id": 29031994,
|
|
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29031994?v=4",
|
2019-12-12 06:14:27 +01:00
|
|
|
"html_url": "https:\/\/github.com\/tachibana51"
|
2019-12-08 14:19:20 +01:00
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
|
|
|
"description": "this is not stable",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2019-08-03T07:38:18Z",
|
|
|
|
"updated_at": "2019-10-26T18:48:26Z",
|
|
|
|
"pushed_at": "2019-08-03T07:58:04Z",
|
|
|
|
"stargazers_count": 2,
|
|
|
|
"watchers_count": 2,
|
|
|
|
"forks_count": 1,
|
|
|
|
"forks": 1,
|
|
|
|
"watchers": 2,
|
2019-12-09 16:05:38 +01:00
|
|
|
"score": 0
|
2020-06-27 23:09:07 +02:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"id": 275396332,
|
|
|
|
"name": "CVE-2013-2028-Exploit",
|
|
|
|
"full_name": "m4drat\/CVE-2013-2028-Exploit",
|
|
|
|
"owner": {
|
|
|
|
"login": "m4drat",
|
|
|
|
"id": 39669467,
|
|
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/39669467?v=4",
|
|
|
|
"html_url": "https:\/\/github.com\/m4drat"
|
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit",
|
|
|
|
"description": "CVE-2013-2028 python exploit",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2020-06-27T15:08:26Z",
|
2020-12-21 04:09:41 +01:00
|
|
|
"updated_at": "2020-12-21T01:50:10Z",
|
2020-06-27 23:09:07 +02:00
|
|
|
"pushed_at": "2020-06-27T15:08:58Z",
|
2020-12-21 04:09:41 +01:00
|
|
|
"stargazers_count": 2,
|
|
|
|
"watchers_count": 2,
|
2020-06-27 23:09:07 +02:00
|
|
|
"forks_count": 0,
|
|
|
|
"forks": 0,
|
2020-12-21 04:09:41 +01:00
|
|
|
"watchers": 2,
|
2020-06-27 23:09:07 +02:00
|
|
|
"score": 0
|
2019-12-08 14:19:20 +01:00
|
|
|
}
|
|
|
|
]
|