PoC-in-GitHub/2018/CVE-2018-14847.json

163 lines
6 KiB
JSON
Raw Normal View History

2019-12-08 22:19:20 +09:00
[
{
"id": 138456315,
"name": "WinboxPoC",
"full_name": "BasuCert\/WinboxPoC",
"owner": {
"login": "BasuCert",
"id": 29852431,
2021-01-22 00:10:20 +09:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/BasuCert"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
2021-08-21 06:12:25 +09:00
"updated_at": "2021-08-20T16:53:57Z",
2020-10-17 00:10:27 +09:00
"pushed_at": "2020-10-16T12:09:45Z",
2021-08-21 06:12:25 +09:00
"stargazers_count": 438,
"watchers_count": 438,
2021-08-21 00:12:06 +09:00
"forks_count": 416,
"forks": 416,
2021-08-21 06:12:25 +09:00
"watchers": 438,
2021-04-03 18:12:08 +09:00
"score": 0
},
2021-06-16 12:11:19 +09:00
{
"id": 161894724,
"name": "CVE-2018-14847",
"full_name": "jas502n\/CVE-2018-14847",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
"fork": false,
"created_at": "2018-12-15T10:38:26Z",
"updated_at": "2021-05-21T16:37:17Z",
"pushed_at": "2018-12-16T04:15:01Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"forks": 8,
"watchers": 18,
"score": 0
},
2021-04-02 12:10:50 +09:00
{
"id": 178807607,
"name": "winboxPOC",
"full_name": "th3f3n1x87\/winboxPOC",
"owner": {
"login": "th3f3n1x87",
"id": 15888700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15888700?v=4",
"html_url": "https:\/\/github.com\/th3f3n1x87"
},
"html_url": "https:\/\/github.com\/th3f3n1x87\/winboxPOC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
"fork": false,
"created_at": "2019-04-01T07:20:23Z",
"updated_at": "2020-03-24T14:07:22Z",
"pushed_at": "2019-02-18T09:51:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 188679903,
"name": "mikrotik-beast",
"full_name": "mahmoodsabir\/mikrotik-beast",
"owner": {
"login": "mahmoodsabir",
"id": 47719250,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4",
"html_url": "https:\/\/github.com\/mahmoodsabir"
},
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
"fork": false,
"created_at": "2019-05-26T12:26:55Z",
"updated_at": "2020-08-26T17:33:20Z",
"pushed_at": "2019-05-26T13:06:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
2021-03-22 00:10:35 +09:00
{
"id": 211658714,
"name": "Python-MikrotikLoginExploit",
"full_name": "sinichi449\/Python-MikrotikLoginExploit",
"owner": {
"login": "sinichi449",
"id": 44680392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4",
"html_url": "https:\/\/github.com\/sinichi449"
},
"html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit",
"description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
"fork": false,
"created_at": "2019-09-29T12:21:16Z",
2021-08-09 06:13:09 +09:00
"updated_at": "2021-08-08T20:13:14Z",
2021-03-22 00:10:35 +09:00
"pushed_at": "2019-09-30T04:10:23Z",
2021-08-09 06:13:09 +09:00
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 10,
2021-03-22 00:10:35 +09:00
"score": 0
},
2020-04-29 12:08:13 +09:00
{
"id": 259795725,
"name": "CVE-2018-14847",
"full_name": "yukar1z0e\/CVE-2018-14847",
"owner": {
"login": "yukar1z0e",
"id": 44317939,
2021-01-22 00:10:20 +09:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
2020-04-29 12:08:13 +09:00
"html_url": "https:\/\/github.com\/yukar1z0e"
},
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847",
"description": null,
"fork": false,
"created_at": "2020-04-29T01:40:33Z",
2020-05-18 18:07:54 +09:00
"updated_at": "2020-05-18T07:48:01Z",
"pushed_at": "2020-05-18T07:47:58Z",
2020-04-29 12:08:13 +09:00
"stargazers_count": 0,
"watchers_count": 0,
2020-06-09 00:08:09 +09:00
"forks_count": 2,
"forks": 2,
2020-04-29 12:08:13 +09:00
"watchers": 0,
"score": 0
2021-04-22 06:11:18 +09:00
},
{
"id": 360240266,
"name": "Mikrotik-router-hack",
"full_name": "hacker30468\/Mikrotik-router-hack",
"owner": {
"login": "hacker30468",
"id": 82890072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4",
"html_url": "https:\/\/github.com\/hacker30468"
},
"html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack",
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false,
"created_at": "2021-04-21T16:42:31Z",
"updated_at": "2021-04-21T16:46:39Z",
"pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 22:19:20 +09:00
}
]