PoC-in-GitHub/2019/CVE-2019-10149.json

255 lines
9.2 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
2021-03-15 04:09:16 +01:00
{
"id": 191233980,
"name": "exim-rce-quickfix",
"full_name": "bananaphones\/exim-rce-quickfix",
"owner": {
"login": "bananaphones",
"id": 4877449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4877449?v=4",
"html_url": "https:\/\/github.com\/bananaphones"
},
"html_url": "https:\/\/github.com\/bananaphones\/exim-rce-quickfix",
"description": "quick fix for CVE-2019-10149, works on Debian\\Ubuntu\\Centos",
"fork": false,
"created_at": "2019-06-10T19:37:05Z",
"updated_at": "2020-10-11T13:08:22Z",
"pushed_at": "2019-06-14T10:16:02Z",
"stargazers_count": 23,
"watchers_count": 23,
2021-03-30 17:10:52 +02:00
"forks_count": 17,
"forks": 17,
2021-03-15 04:09:16 +01:00
"watchers": 23,
"score": 0
},
{
"id": 191493140,
"name": "eximrce-CVE-2019-10149",
"full_name": "cowbe0x004\/eximrce-CVE-2019-10149",
"owner": {
"login": "cowbe0x004",
"id": 3072913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3072913?v=4",
"html_url": "https:\/\/github.com\/cowbe0x004"
},
"html_url": "https:\/\/github.com\/cowbe0x004\/eximrce-CVE-2019-10149",
"description": "simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in \/tmp\/eximrce.",
"fork": false,
"created_at": "2019-06-12T03:47:16Z",
"updated_at": "2021-02-03T22:54:05Z",
"pushed_at": "2019-07-08T18:25:12Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 13,
"forks": 13,
"watchers": 14,
"score": 0
},
{
"id": 191845568,
"name": "PoC--CVE-2019-10149_Exim",
"full_name": "MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
"owner": {
"login": "MNEMO-CERT",
"id": 51804856,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51804856?v=4",
"html_url": "https:\/\/github.com\/MNEMO-CERT"
},
"html_url": "https:\/\/github.com\/MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
"description": "PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.",
"fork": false,
"created_at": "2019-06-13T23:21:53Z",
"updated_at": "2021-02-03T12:57:10Z",
"pushed_at": "2019-06-18T14:57:22Z",
"stargazers_count": 16,
"watchers_count": 16,
2021-06-01 11:11:51 +02:00
"forks_count": 7,
"forks": 7,
2021-03-15 04:09:16 +01:00
"watchers": 16,
"score": 0
},
{
"id": 191952969,
"name": "CVE-2019-10149-quick",
"full_name": "aishee\/CVE-2019-10149-quick",
"owner": {
"login": "aishee",
"id": 8377283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8377283?v=4",
"html_url": "https:\/\/github.com\/aishee"
},
"html_url": "https:\/\/github.com\/aishee\/CVE-2019-10149-quick",
"description": "Simple Bash shell quick fix CVE-2019-10149",
"fork": false,
"created_at": "2019-06-14T14:02:43Z",
"updated_at": "2019-06-14T14:03:33Z",
"pushed_at": "2019-06-14T14:03:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 194002154,
"name": "CVE-2019-10149-privilege-escalation",
"full_name": "AzizMea\/CVE-2019-10149-privilege-escalation",
"owner": {
"login": "AzizMea",
"id": 30970260,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30970260?v=4",
"html_url": "https:\/\/github.com\/AzizMea"
},
"html_url": "https:\/\/github.com\/AzizMea\/CVE-2019-10149-privilege-escalation",
"description": "CVE-2019-10149 privilege escalation",
"fork": false,
"created_at": "2019-06-27T01:34:41Z",
"updated_at": "2020-05-30T20:35:51Z",
"pushed_at": "2019-06-27T17:46:25Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"score": 0
},
2021-04-14 05:11:06 +02:00
{
"id": 198729185,
"name": "StickyExim",
"full_name": "Brets0150\/StickyExim",
"owner": {
"login": "Brets0150",
"id": 40045956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40045956?v=4",
"html_url": "https:\/\/github.com\/Brets0150"
},
"html_url": "https:\/\/github.com\/Brets0150\/StickyExim",
"description": "Exim Honey Pot for CVE-2019-10149 exploit attempts.",
"fork": false,
"created_at": "2019-07-25T00:46:37Z",
2021-05-05 11:11:18 +02:00
"updated_at": "2021-05-05T07:05:02Z",
2021-04-14 05:11:06 +02:00
"pushed_at": "2019-08-06T20:21:46Z",
2021-05-05 11:11:18 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2021-04-14 05:11:06 +02:00
"forks_count": 0,
"forks": 0,
2021-05-05 11:11:18 +02:00
"watchers": 2,
2021-04-14 05:11:06 +02:00
"score": 0
},
{
"id": 206647936,
"name": "exim.exp",
"full_name": "ChrissHack\/exim.exp",
"owner": {
"login": "ChrissHack",
"id": 36897897,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36897897?v=4",
"html_url": "https:\/\/github.com\/ChrissHack"
},
"html_url": "https:\/\/github.com\/ChrissHack\/exim.exp",
"description": "CVE-2019-10149",
"fork": false,
"created_at": "2019-09-05T20:04:14Z",
"updated_at": "2019-09-11T01:27:28Z",
"pushed_at": "2019-09-05T20:34:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 216513053,
"name": "CVE-2019-10149",
"full_name": "darsigovrustam\/CVE-2019-10149",
"owner": {
"login": "darsigovrustam",
"id": 36308333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36308333?v=4",
"html_url": "https:\/\/github.com\/darsigovrustam"
},
"html_url": "https:\/\/github.com\/darsigovrustam\/CVE-2019-10149",
"description": "Instructions for installing a vulnerable version of Exim and its expluatation",
"fork": false,
"created_at": "2019-10-21T08:13:27Z",
"updated_at": "2020-04-13T06:36:31Z",
"pushed_at": "2019-10-24T07:19:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
2021-03-26 04:10:54 +01:00
{
"id": 217788444,
"name": "CVE-2019-10149",
"full_name": "Diefunction\/CVE-2019-10149",
"owner": {
"login": "Diefunction",
"id": 17242631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17242631?v=4",
"html_url": "https:\/\/github.com\/Diefunction"
},
"html_url": "https:\/\/github.com\/Diefunction\/CVE-2019-10149",
"description": "CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in \/src\/deliver.c may lead to remote command execution.",
"fork": false,
"created_at": "2019-10-27T01:03:11Z",
"updated_at": "2021-03-07T13:41:40Z",
"pushed_at": "2019-10-27T01:08:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"score": 0
},
2020-05-12 23:07:33 +02:00
{
"id": 263372042,
"name": "CVE-2019-10149",
"full_name": "Dilshan-Eranda\/CVE-2019-10149",
"owner": {
"login": "Dilshan-Eranda",
"id": 57589896,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57589896?v=4",
2020-05-12 23:07:33 +02:00
"html_url": "https:\/\/github.com\/Dilshan-Eranda"
},
"html_url": "https:\/\/github.com\/Dilshan-Eranda\/CVE-2019-10149",
"description": "SNP Assignment on a Linux vulnerability",
"fork": false,
"created_at": "2020-05-12T15:11:54Z",
"updated_at": "2020-05-12T15:13:14Z",
"pushed_at": "2020-05-12T15:13:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-06-03 05:09:00 +02:00
},
{
"id": 268969538,
"name": "exim-cve-2019-10149-data",
"full_name": "area1\/exim-cve-2019-10149-data",
"owner": {
"login": "area1",
"id": 7005099,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7005099?v=4",
2020-06-03 05:09:00 +02:00
"html_url": "https:\/\/github.com\/area1"
},
"html_url": "https:\/\/github.com\/area1\/exim-cve-2019-10149-data",
"description": "Data Collection Related to Exim CVE-2019-10149",
"fork": false,
"created_at": "2020-06-03T02:27:01Z",
2020-10-20 17:09:25 +02:00
"updated_at": "2020-10-20T13:48:44Z",
"pushed_at": "2020-10-20T13:48:42Z",
2020-06-03 05:09:00 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 14:19:20 +01:00
}
]