PoC-in-GitHub/2013/CVE-2013-2028.json

94 lines
3.2 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 10198831,
"name": "nginx-1.4.0",
"full_name": "danghvu\/nginx-1.4.0",
"owner": {
"login": "danghvu",
"id": 1152714,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1152714?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/danghvu"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/danghvu\/nginx-1.4.0",
"description": "For the analysis of CVE-2013-2028",
"fork": false,
"created_at": "2013-05-21T15:20:05Z",
2020-06-27 23:09:07 +02:00
"updated_at": "2020-06-27T16:20:54Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2018-06-07T23:22:38Z",
2020-06-27 23:09:07 +02:00
"stargazers_count": 29,
"watchers_count": 29,
2020-03-29 05:07:13 +02:00
"forks_count": 11,
"forks": 11,
2020-06-27 23:09:07 +02:00
"watchers": 29,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 54551843,
"name": "nginxpwn",
"full_name": "kitctf\/nginxpwn",
"owner": {
"login": "kitctf",
"id": 8018062,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8018062?v=4",
"html_url": "https:\/\/github.com\/kitctf"
},
"html_url": "https:\/\/github.com\/kitctf\/nginxpwn",
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
"fork": false,
"created_at": "2016-03-23T10:41:00Z",
2020-11-22 04:09:20 +01:00
"updated_at": "2020-11-22T00:59:48Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2016-03-23T12:05:38Z",
2020-11-22 04:09:20 +01:00
"stargazers_count": 44,
"watchers_count": 44,
2021-01-05 16:09:56 +01:00
"forks_count": 20,
"forks": 20,
2020-11-22 04:09:20 +01:00
"watchers": 44,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 200347068,
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"owner": {
"login": "tachibana51",
"id": 29031994,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29031994?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/tachibana51"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"description": "this is not stable",
"fork": false,
"created_at": "2019-08-03T07:38:18Z",
"updated_at": "2019-10-26T18:48:26Z",
"pushed_at": "2019-08-03T07:58:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
2019-12-09 16:05:38 +01:00
"score": 0
2020-06-27 23:09:07 +02:00
},
{
"id": 275396332,
"name": "CVE-2013-2028-Exploit",
"full_name": "m4drat\/CVE-2013-2028-Exploit",
"owner": {
"login": "m4drat",
"id": 39669467,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/39669467?v=4",
"html_url": "https:\/\/github.com\/m4drat"
},
"html_url": "https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit",
"description": "CVE-2013-2028 python exploit",
"fork": false,
"created_at": "2020-06-27T15:08:26Z",
2020-12-21 04:09:41 +01:00
"updated_at": "2020-12-21T01:50:10Z",
2020-06-27 23:09:07 +02:00
"pushed_at": "2020-06-27T15:08:58Z",
2020-12-21 04:09:41 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2020-06-27 23:09:07 +02:00
"forks_count": 0,
"forks": 0,
2020-12-21 04:09:41 +01:00
"watchers": 2,
2020-06-27 23:09:07 +02:00
"score": 0
2019-12-08 14:19:20 +01:00
}
]