PoC-in-GitHub/2019/CVE-2019-11932.json

255 lines
9.4 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
2020-04-05 05:07:47 +02:00
{
"id": 212541592,
"name": "CVE-2019-11932",
"full_name": "dorkerdevil\/CVE-2019-11932",
"owner": {
"login": "dorkerdevil",
"id": 15796745,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15796745?v=4",
"html_url": "https:\/\/github.com\/dorkerdevil"
},
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2019-11932",
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2020-03-29T02:31:11Z",
"pushed_at": "2019-10-03T09:43:55Z",
"stargazers_count": 241,
"watchers_count": 241,
"forks_count": 74,
"forks": 74,
"watchers": 241,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 212824676,
"name": "WhatsRCE",
"full_name": "KeepWannabe\/WhatsRCE",
"owner": {
"login": "KeepWannabe",
"id": 31374361,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31374361?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/KeepWannabe"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/KeepWannabe\/WhatsRCE",
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
"fork": false,
"created_at": "2019-10-04T13:45:44Z",
2020-04-16 11:07:52 +02:00
"updated_at": "2020-04-16T08:55:46Z",
2019-12-15 04:30:01 +01:00
"pushed_at": "2019-12-13T19:07:53Z",
2020-04-16 11:07:52 +02:00
"stargazers_count": 65,
"watchers_count": 65,
2020-04-06 11:07:54 +02:00
"forks_count": 23,
"forks": 23,
2020-04-16 11:07:52 +02:00
"watchers": 65,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 212837105,
"name": "CVE-2019-11932",
"full_name": "awakened1712\/CVE-2019-11932",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "awakened1712",
"id": 628212,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/628212?v=4",
"html_url": "https:\/\/github.com\/awakened1712"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/awakened1712\/CVE-2019-11932",
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2019-10-04T14:43:57Z",
2020-04-16 11:07:52 +02:00
"updated_at": "2020-04-16T03:39:27Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-11-30T10:28:01Z",
2020-04-16 11:07:52 +02:00
"stargazers_count": 114,
"watchers_count": 114,
2020-04-01 05:07:58 +02:00
"forks_count": 57,
"forks": 57,
2020-04-16 11:07:52 +02:00
"watchers": 114,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2020-04-05 05:07:47 +02:00
{
"id": 212954402,
"name": "CVE-2019-11932",
"full_name": "TulungagungCyberLink\/CVE-2019-11932",
"owner": {
"login": "TulungagungCyberLink",
"id": 46483873,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/46483873?v=4",
"html_url": "https:\/\/github.com\/TulungagungCyberLink"
},
"html_url": "https:\/\/github.com\/TulungagungCyberLink\/CVE-2019-11932",
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2019-10-05T06:24:08Z",
"updated_at": "2019-11-03T03:01:39Z",
"pushed_at": "2019-10-08T06:17:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 213187543,
"name": "CVE-2019-11932",
"full_name": "infiniteLoopers\/CVE-2019-11932",
"owner": {
"login": "infiniteLoopers",
"id": 27885817,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/27885817?v=4",
"html_url": "https:\/\/github.com\/infiniteLoopers"
},
"html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-11932",
"description": null,
"fork": false,
"created_at": "2019-10-06T14:54:35Z",
"updated_at": "2019-10-18T20:41:54Z",
"pushed_at": "2019-10-06T15:34:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 213971107,
2019-12-08 14:19:20 +01:00
"name": "CVE-2019-11932",
2019-12-12 06:14:27 +01:00
"full_name": "alexanderstonec\/CVE-2019-11932",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "alexanderstonec",
"id": 52692998,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52692998?v=4",
"html_url": "https:\/\/github.com\/alexanderstonec"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/alexanderstonec\/CVE-2019-11932",
"description": "The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2019-10-09T16:41:38Z",
2020-03-19 04:07:17 +01:00
"updated_at": "2020-03-19T03:06:30Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-10-09T17:00:02Z",
2020-03-19 04:07:17 +01:00
"stargazers_count": 6,
"watchers_count": 6,
2019-12-12 06:14:27 +01:00
"forks_count": 2,
"forks": 2,
2020-03-19 04:07:17 +01:00
"watchers": 6,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 215516489,
"name": "CVE-2019-11932-SupportApp",
"full_name": "valbrux\/CVE-2019-11932-SupportApp",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "valbrux",
"id": 20357515,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20357515?v=4",
"html_url": "https:\/\/github.com\/valbrux"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/valbrux\/CVE-2019-11932-SupportApp",
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2019-10-16T10:04:30Z",
2020-04-16 11:07:52 +02:00
"updated_at": "2020-04-16T08:54:56Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-10-16T12:20:53Z",
2020-04-16 11:07:52 +02:00
"stargazers_count": 19,
"watchers_count": 19,
2020-03-21 22:07:27 +01:00
"forks_count": 9,
"forks": 9,
2020-04-16 11:07:52 +02:00
"watchers": 19,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 215635890,
"name": "CVE-2019-11932",
"full_name": "fastmo\/CVE-2019-11932",
"owner": {
"login": "fastmo",
"id": 53575270,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/53575270?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/fastmo"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/fastmo\/CVE-2019-11932",
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
"fork": false,
"created_at": "2019-10-16T20:13:23Z",
2020-03-30 05:08:37 +02:00
"updated_at": "2020-03-30T02:16:58Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2019-10-16T20:24:56Z",
2019-12-31 10:30:02 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2020-03-30 05:08:37 +02:00
"forks_count": 3,
"forks": 3,
2019-12-31 10:30:02 +01:00
"watchers": 1,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 217001772,
"name": "CVE-2019-11932-whatsApp-exploit",
"full_name": "mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
"owner": {
"login": "mRanonyMousTZ",
"id": 38766899,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/38766899?v=4",
"html_url": "https:\/\/github.com\/mRanonyMousTZ"
},
"html_url": "https:\/\/github.com\/mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2019-10-23T08:02:15Z",
2020-04-16 11:07:52 +02:00
"updated_at": "2020-04-16T03:39:45Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-10-23T08:25:48Z",
2020-04-16 11:07:52 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2020-04-06 11:07:54 +02:00
"forks_count": 4,
"forks": 4,
2020-04-16 11:07:52 +02:00
"watchers": 5,
2019-12-09 16:05:38 +01:00
"score": 0
2020-01-06 22:30:02 +01:00
},
{
"id": 228222453,
"name": "CVE-2019-11932",
"full_name": "SmoZy92\/CVE-2019-11932",
"owner": {
"login": "SmoZy92",
"id": 58377338,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/58377338?v=4",
"html_url": "https:\/\/github.com\/SmoZy92"
},
"html_url": "https:\/\/github.com\/SmoZy92\/CVE-2019-11932",
"description": null,
"fork": false,
"created_at": "2019-12-15T17:21:26Z",
2020-02-12 04:07:28 +01:00
"updated_at": "2020-02-12T00:00:14Z",
2020-01-06 22:30:02 +01:00
"pushed_at": "2019-12-15T17:40:15Z",
2020-02-12 04:07:28 +01:00
"stargazers_count": 5,
"watchers_count": 5,
2020-01-06 22:30:02 +01:00
"forks_count": 0,
"forks": 0,
2020-02-12 04:07:28 +01:00
"watchers": 5,
2020-01-06 22:30:02 +01:00
"score": 0
2020-03-28 04:07:11 +01:00
},
{
"id": 239654888,
"name": "https-github.com-awakened171",
"full_name": "dashtic172\/https-github.com-awakened171",
"owner": {
"login": "dashtic172",
"id": 60906735,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/60906735?v=4",
"html_url": "https:\/\/github.com\/dashtic172"
},
"html_url": "https:\/\/github.com\/dashtic172\/https-github.com-awakened171",
"description": "https:\/\/github.com\/awakened1712\/CVE-2019-11932",
"fork": false,
"created_at": "2020-02-11T02:00:14Z",
"updated_at": "2020-02-11T02:00:14Z",
"pushed_at": "2020-02-11T02:00:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 14:19:20 +01:00
}
]