PoC-in-GitHub/2017/CVE-2017-9805.json

301 lines
11 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
2020-09-07 05:08:33 +02:00
{
"id": 102583828,
"name": "struts-rce-cve-2017-9805",
"full_name": "luc10\/struts-rce-cve-2017-9805",
"owner": {
"login": "luc10",
"id": 7849730,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849730?v=4",
"html_url": "https:\/\/github.com\/luc10"
},
"html_url": "https:\/\/github.com\/luc10\/struts-rce-cve-2017-9805",
"description": "CVE 2017-9805",
"fork": false,
"created_at": "2017-09-06T08:32:01Z",
2020-11-16 10:09:23 +01:00
"updated_at": "2020-11-16T08:05:10Z",
2020-09-07 05:08:33 +02:00
"pushed_at": "2020-08-31T04:34:29Z",
2020-11-16 10:09:23 +01:00
"stargazers_count": 54,
"watchers_count": 54,
2020-10-23 05:08:52 +02:00
"forks_count": 27,
"forks": 27,
2020-11-16 10:09:23 +01:00
"watchers": 54,
2020-09-07 05:08:33 +02:00
"score": 0
},
2020-12-26 04:09:07 +01:00
{
"id": 102714061,
"name": "struts2-rce-cve-2017-9805-ruby",
"full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby",
"owner": {
"login": "hahwul",
"id": 13212227,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13212227?v=4",
"html_url": "https:\/\/github.com\/hahwul"
},
"html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby",
"description": "cve -2017-9805",
"fork": false,
"created_at": "2017-09-07T08:49:14Z",
"updated_at": "2020-11-22T14:11:43Z",
"pushed_at": "2017-09-07T08:55:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
2020-12-05 10:09:23 +01:00
{
"id": 102917821,
"name": "struts-pwn_CVE-2017-9805",
"full_name": "mazen160\/struts-pwn_CVE-2017-9805",
"owner": {
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160"
},
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
2020-12-21 22:09:38 +01:00
"updated_at": "2020-12-21T18:12:47Z",
2020-12-05 10:09:23 +01:00
"pushed_at": "2017-11-07T19:24:00Z",
2020-12-21 22:09:38 +01:00
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 77,
"forks": 77,
"watchers": 237,
2020-12-05 10:09:23 +01:00
"score": 0
},
2020-12-26 04:09:07 +01:00
{
"id": 103005989,
"name": "apache-struts-pwn_CVE-2017-9805",
"full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"owner": {
"login": "Lone-Ranger",
"id": 15882470,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15882470?v=4",
"html_url": "https:\/\/github.com\/Lone-Ranger"
},
"html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-10T05:26:03Z",
"updated_at": "2020-11-24T23:21:26Z",
"pushed_at": "2017-09-10T05:28:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 9,
"forks": 9,
"watchers": 3,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 111928630,
"name": "-CVE-2017-9805",
"full_name": "0x00-0x00\/-CVE-2017-9805",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/0x00-0x00"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/0x00-0x00\/-CVE-2017-9805",
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)",
"fork": false,
"created_at": "2017-11-24T14:46:35Z",
2020-12-05 04:09:02 +01:00
"updated_at": "2020-12-04T22:33:33Z",
2020-11-26 22:10:16 +01:00
"pushed_at": "2020-11-26T18:35:29Z",
2020-12-05 04:09:02 +01:00
"stargazers_count": 12,
"watchers_count": 12,
2020-11-30 10:09:19 +01:00
"forks_count": 9,
"forks": 9,
2020-12-05 04:09:02 +01:00
"watchers": 12,
2020-08-22 11:10:29 +02:00
"score": 0
},
2020-12-05 10:09:23 +01:00
{
"id": 112276528,
"name": "S2-052",
"full_name": "BeyondCy\/S2-052",
"owner": {
"login": "BeyondCy",
"id": 4694785,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4694785?v=4",
"html_url": "https:\/\/github.com\/BeyondCy"
},
"html_url": "https:\/\/github.com\/BeyondCy\/S2-052",
"description": "CVE-2017-9805 - Exploit",
"fork": false,
"created_at": "2017-11-28T02:46:07Z",
"updated_at": "2020-11-24T14:16:12Z",
"pushed_at": "2017-10-20T21:04:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 113078841,
"name": "cve-2017-9805.py",
"full_name": "chrisjd20\/cve-2017-9805.py",
"owner": {
"login": "chrisjd20",
"id": 11812223,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11812223?v=4",
"html_url": "https:\/\/github.com\/chrisjd20"
},
"html_url": "https:\/\/github.com\/chrisjd20\/cve-2017-9805.py",
"description": "Better Exploit Code For CVE 2017 9805 apache struts",
"fork": false,
"created_at": "2017-12-04T18:23:53Z",
"updated_at": "2020-11-25T21:45:43Z",
"pushed_at": "2017-12-23T14:07:59Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 8,
"forks": 8,
"watchers": 21,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 205600969,
"name": "struts_rest_rce_fuzz-CVE-2017-9805-",
"full_name": "UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-",
"owner": {
"login": "UbuntuStrike",
"id": 30779753,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30779753?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/UbuntuStrike"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-",
"description": "Simple python script to fuzz site for CVE-2017-9805",
"fork": false,
"created_at": "2019-08-31T22:06:31Z",
"updated_at": "2019-08-31T23:36:02Z",
"pushed_at": "2019-08-31T23:36:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 205945238,
2020-06-18 05:08:17 +02:00
"name": "CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"full_name": "UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
2019-12-08 14:19:20 +01:00
"owner": {
"login": "UbuntuStrike",
"id": 30779753,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30779753?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/UbuntuStrike"
2019-12-08 14:19:20 +01:00
},
2020-06-18 05:08:17 +02:00
"html_url": "https:\/\/github.com\/UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"description": "A script to Fuzz and and exploit Apache struts CVE-2017-9805",
2019-12-08 14:19:20 +01:00
"fork": false,
"created_at": "2019-09-02T22:24:07Z",
2020-06-18 05:08:17 +02:00
"updated_at": "2020-06-18T02:43:56Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2019-09-02T22:36:37Z",
2020-06-18 05:08:17 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2019-12-08 14:19:20 +01:00
"forks_count": 0,
"forks": 0,
2020-06-18 05:08:17 +02:00
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2020-04-05 23:07:59 +02:00
},
{
"id": 253274048,
"name": "CVE-2017-9805-Exploit",
2020-05-27 17:08:16 +02:00
"full_name": "0xd3vil\/CVE-2017-9805-Exploit",
2020-04-05 23:07:59 +02:00
"owner": {
2020-05-27 17:08:16 +02:00
"login": "0xd3vil",
2020-04-05 23:07:59 +02:00
"id": 32324065,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/32324065?v=4",
2020-05-27 17:08:16 +02:00
"html_url": "https:\/\/github.com\/0xd3vil"
2020-04-05 23:07:59 +02:00
},
2020-05-27 17:08:16 +02:00
"html_url": "https:\/\/github.com\/0xd3vil\/CVE-2017-9805-Exploit",
2020-04-05 23:07:59 +02:00
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
"fork": false,
"created_at": "2020-04-05T16:00:48Z",
2020-05-17 17:07:39 +02:00
"updated_at": "2020-05-17T13:37:07Z",
"pushed_at": "2020-05-17T13:37:04Z",
2020-04-26 17:08:39 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2020-06-11 11:08:57 +02:00
"forks_count": 1,
"forks": 1,
2020-04-26 17:08:39 +02:00
"watchers": 1,
2020-04-05 23:07:59 +02:00
"score": 0
2020-05-12 23:07:33 +02:00
},
{
"id": 263410855,
"name": "CVE-2017-9805---Documentation---IT19143378",
"full_name": "AvishkaSenadheera20\/CVE-2017-9805---Documentation---IT19143378",
"owner": {
"login": "AvishkaSenadheera20",
"id": 48066295,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48066295?v=4",
"html_url": "https:\/\/github.com\/AvishkaSenadheera20"
},
"html_url": "https:\/\/github.com\/AvishkaSenadheera20\/CVE-2017-9805---Documentation---IT19143378",
"description": null,
"fork": false,
"created_at": "2020-05-12T17:53:57Z",
"updated_at": "2020-05-12T18:15:38Z",
"pushed_at": "2020-05-12T18:15:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-11-13 16:09:22 +01:00
},
{
"id": 312564506,
"name": "apache-struts-cve-2017-9805",
"full_name": "rvermeulen\/apache-struts-cve-2017-9805",
"owner": {
"login": "rvermeulen",
"id": 636626,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/636626?v=4",
"html_url": "https:\/\/github.com\/rvermeulen"
},
"html_url": "https:\/\/github.com\/rvermeulen\/apache-struts-cve-2017-9805",
"description": null,
"fork": false,
"created_at": "2020-11-13T12:04:32Z",
"updated_at": "2020-11-13T12:12:37Z",
"pushed_at": "2020-11-13T12:07:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-11-28 04:09:13 +01:00
},
{
"id": 316623697,
"name": "-CVE-2017-9805-",
"full_name": "jongmartinez\/-CVE-2017-9805-",
"owner": {
"login": "jongmartinez",
"id": 11743460,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11743460?v=4",
"html_url": "https:\/\/github.com\/jongmartinez"
},
"html_url": "https:\/\/github.com\/jongmartinez\/-CVE-2017-9805-",
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805) ",
"fork": false,
"created_at": "2020-11-28T00:00:37Z",
"updated_at": "2020-11-28T00:34:46Z",
"pushed_at": "2020-11-28T00:34:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 14:19:20 +01:00
}
]