2019-12-08 14:19:20 +01:00
[
{
"id" : 171996551 ,
"name" : "CVE-2018-20250" ,
"full_name" : "WyAtu\/CVE-2018-20250" ,
"owner" : {
"login" : "WyAtu" ,
"id" : 23521935 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/23521935?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/WyAtu"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/WyAtu\/CVE-2018-20250" ,
"description" : "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar" ,
"fork" : false ,
"created_at" : "2019-02-22T04:52:08Z" ,
2020-02-25 10:07:49 +01:00
"updated_at" : "2020-02-25T05:11:04Z" ,
2019-12-08 14:19:20 +01:00
"pushed_at" : "2019-08-05T10:45:34Z" ,
2020-02-25 10:07:49 +01:00
"stargazers_count" : 384 ,
"watchers_count" : 384 ,
2020-02-03 10:07:29 +01:00
"forks_count" : 169 ,
"forks" : 169 ,
2020-02-25 10:07:49 +01:00
"watchers" : 384 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
"id" : 172009558 ,
"name" : "CVE-2018-20250" ,
"full_name" : "QAX-A-Team\/CVE-2018-20250" ,
"owner" : {
"login" : "QAX-A-Team" ,
"id" : 35417332 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/35417332?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/QAX-A-Team"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250" ,
"description" : "010 Editor template for ACE archive format & CVE-2018-2025[0-3]" ,
"fork" : false ,
"created_at" : "2019-02-22T06:47:01Z" ,
"updated_at" : "2019-10-22T04:28:28Z" ,
"pushed_at" : "2019-02-22T07:47:26Z" ,
"stargazers_count" : 23 ,
"watchers_count" : 23 ,
2020-01-10 05:00:03 +01:00
"forks_count" : 10 ,
"forks" : 10 ,
2019-12-08 14:19:20 +01:00
"watchers" : 23 ,
2019-12-12 06:14:27 +01:00
"score" : 0
} ,
{
"id" : 172069488 ,
"name" : "CVE-2018-20250-poc-winrar" ,
"full_name" : "nmweizi\/CVE-2018-20250-poc-winrar" ,
"owner" : {
"login" : "nmweizi" ,
"id" : 1232444 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/1232444?v=4" ,
"html_url" : "https:\/\/github.com\/nmweizi"
} ,
"html_url" : "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar" ,
"description" : null ,
"fork" : false ,
"created_at" : "2019-02-22T13:18:14Z" ,
"updated_at" : "2019-02-22T13:20:31Z" ,
"pushed_at" : "2019-02-22T13:20:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 172078598 ,
"name" : "UNACEV2.DLL-CVE-2018-20250" ,
"full_name" : "blunden\/UNACEV2.DLL-CVE-2018-20250" ,
"owner" : {
"login" : "blunden" ,
"id" : 249915 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/249915?v=4" ,
"html_url" : "https:\/\/github.com\/blunden"
} ,
"html_url" : "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250" ,
"description" : "A version of the binary patched to address CVE-2018-20250" ,
"fork" : false ,
"created_at" : "2019-02-22T14:19:20Z" ,
"updated_at" : "2019-02-22T14:29:30Z" ,
"pushed_at" : "2019-02-22T14:29:29Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
"id" : 172156568 ,
"name" : "CVE-2018-20250-WinRAR-ACE" ,
"full_name" : "easis\/CVE-2018-20250-WinRAR-ACE" ,
"owner" : {
"login" : "easis" ,
"id" : 50383201 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/50383201?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/easis"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE" ,
"description" : "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250)." ,
"fork" : false ,
"created_at" : "2019-02-23T01:20:34Z" ,
2019-12-20 16:30:02 +01:00
"updated_at" : "2019-12-20T10:41:29Z" ,
2019-12-08 14:19:20 +01:00
"pushed_at" : "2019-03-01T13:35:59Z" ,
2019-12-20 16:30:02 +01:00
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
2020-02-15 10:07:15 +01:00
"forks_count" : 15 ,
"forks" : 15 ,
2019-12-20 16:30:02 +01:00
"watchers" : 16 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
"id" : 173153306 ,
"name" : "CVE-2018-20250" ,
"full_name" : "STP5940\/CVE-2018-20250" ,
"owner" : {
"login" : "STP5940" ,
"id" : 21144303 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/21144303?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/STP5940"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/STP5940\/CVE-2018-20250" ,
"description" : null ,
"fork" : false ,
"created_at" : "2019-02-28T17:07:52Z" ,
"updated_at" : "2019-10-30T09:58:35Z" ,
"pushed_at" : "2019-02-28T17:10:39Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 5 ,
"forks" : 5 ,
"watchers" : 2 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 173733018 ,
"name" : "WinAce-POC" ,
"full_name" : "n4r1b\/WinAce-POC" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "n4r1b" ,
"id" : 7025964 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/7025964?v=4" ,
"html_url" : "https:\/\/github.com\/n4r1b"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/n4r1b\/WinAce-POC" ,
"description" : "Simple POC to leverage CVE-2018-20250 from inside an EXE" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-03-04T11:34:17Z" ,
"updated_at" : "2019-03-04T14:32:05Z" ,
"pushed_at" : "2019-03-04T14:42:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 173733367 ,
"name" : "hack-winrar" ,
"full_name" : "technicaldada\/hack-winrar" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "technicaldada" ,
"id" : 32122182 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/32122182?v=4" ,
"html_url" : "https:\/\/github.com\/technicaldada"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/technicaldada\/hack-winrar" ,
"description" : "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-03-04T11:36:43Z" ,
"updated_at" : "2019-03-25T16:54:05Z" ,
"pushed_at" : "2019-03-04T11:39:34Z" ,
2019-12-08 14:19:20 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2019-12-12 06:14:27 +01:00
"forks_count" : 0 ,
"forks" : 0 ,
2019-12-08 14:19:20 +01:00
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2019-12-11 14:51:14 +01:00
{
2019-12-12 06:14:27 +01:00
"id" : 173947919 ,
"name" : "ezwinrar" ,
"full_name" : "Ektoplasma\/ezwinrar" ,
2019-12-11 14:51:14 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "Ektoplasma" ,
"id" : 15208659 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/15208659?v=4" ,
"html_url" : "https:\/\/github.com\/Ektoplasma"
2019-12-11 14:51:14 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/Ektoplasma\/ezwinrar" ,
"description" : "Python tool exploiting CVE-2018-20250 found by CheckPoint folks" ,
2019-12-11 14:51:14 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-03-05T13:05:03Z" ,
"updated_at" : "2019-10-19T08:36:59Z" ,
"pushed_at" : "2019-03-05T15:51:12Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2019-12-11 14:51:14 +01:00
"forks_count" : 0 ,
"forks" : 0 ,
2019-12-12 06:14:27 +01:00
"watchers" : 3 ,
2019-12-11 14:51:14 +01:00
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id" : 174533873 ,
"name" : "CVE-2018-20250-WINRAR-ACE-GUI" ,
"full_name" : "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "arkangel-dev" ,
"id" : 31138457 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/31138457?v=4" ,
"html_url" : "https:\/\/github.com\/arkangel-dev"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI" ,
"description" : "CVE-2018-20250-WINRAR-ACE Exploit with a UI" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-03-08T12:27:12Z" ,
"updated_at" : "2019-10-30T09:59:05Z" ,
"pushed_at" : "2019-05-10T05:37:10Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 9 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2019-12-09 16:30:32 +01:00
{
"id" : 174948316 ,
"name" : "CVE-2018-20250" ,
"full_name" : "AeolusTF\/CVE-2018-20250" ,
"owner" : {
"login" : "AeolusTF" ,
"id" : 29159416 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/29159416?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/AeolusTF"
2019-12-09 16:30:32 +01:00
} ,
"html_url" : "https:\/\/github.com\/AeolusTF\/CVE-2018-20250" ,
"description" : null ,
"fork" : false ,
"created_at" : "2019-03-11T07:33:45Z" ,
"updated_at" : "2019-03-11T07:37:51Z" ,
"pushed_at" : "2019-03-11T07:37:50Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
2019-12-12 05:48:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id" : 176534636 ,
"name" : "Detect-CVE-2018-20250" ,
"full_name" : "joydragon\/Detect-CVE-2018-20250" ,
2019-12-12 05:48:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "joydragon" ,
"id" : 4154219 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/4154219?v=4" ,
"html_url" : "https:\/\/github.com\/joydragon"
2019-12-12 05:48:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250" ,
"description" : "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250" ,
2019-12-12 05:48:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-03-19T14:51:52Z" ,
"updated_at" : "2019-03-19T15:03:27Z" ,
"pushed_at" : "2019-03-19T15:03:26Z" ,
2019-12-12 05:48:20 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id" : 177513614 ,
"name" : "WinRar_ACE_exploit_CVE-2018-20250" ,
"full_name" : "DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "DANIELVISPOBLOG" ,
"id" : 26053534 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/26053534?v=4" ,
"html_url" : "https:\/\/github.com\/DANIELVISPOBLOG"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250" ,
"description" : "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-03-25T04:22:14Z" ,
2020-01-20 03:07:05 +01:00
"updated_at" : "2020-01-18T19:58:21Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-03-26T04:54:35Z" ,
2020-01-20 03:07:05 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2019-12-12 06:14:27 +01:00
"forks_count" : 2 ,
"forks" : 2 ,
2020-01-20 03:07:05 +01:00
"watchers" : 2 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 183341455 ,
"name" : "CVE-2018-20250" ,
"full_name" : "denmilu\/CVE-2018-20250" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "denmilu" ,
"id" : 2469038 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4" ,
"html_url" : "https:\/\/github.com\/denmilu"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/denmilu\/CVE-2018-20250" ,
"description" : null ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-04-25T02:30:50Z" ,
"updated_at" : "2019-04-25T02:31:01Z" ,
"pushed_at" : "2019-04-25T02:30:59Z" ,
2019-12-08 14:19:20 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 185440756 ,
"name" : "CVE-2018-20250" ,
"full_name" : "930201676\/CVE-2018-20250" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "930201676" ,
"id" : 20335327 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/20335327?v=4" ,
"html_url" : "https:\/\/github.com\/930201676"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/930201676\/CVE-2018-20250" ,
"description" : null ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-05-07T16:34:10Z" ,
"updated_at" : "2019-05-07T16:34:31Z" ,
"pushed_at" : "2019-05-07T16:34:29Z" ,
2019-12-08 14:19:20 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2020-02-17 22:07:25 +01:00
} ,
{
"id" : 241136874 ,
"name" : "CVE-2018-20250-WinRAR" ,
"full_name" : "eastmountyxz\/CVE-2018-20250-WinRAR" ,
"owner" : {
"login" : "eastmountyxz" ,
"id" : 53172375 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4" ,
"html_url" : "https:\/\/github.com\/eastmountyxz"
} ,
"html_url" : "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR" ,
"description" : "这资源是作者复现微软签字证书漏洞CVE-2020-0601, 结合相关资源及文章实现。推荐大家结合作者博客, 复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者, 自己确实很菜, 但希望坚持下去, 一起加油! " ,
"fork" : false ,
"created_at" : "2020-02-17T15:08:22Z" ,
"updated_at" : "2020-02-17T15:08:26Z" ,
"pushed_at" : "2020-02-17T15:08:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 14:19:20 +01:00
}
]