PoC-in-GitHub/2012/CVE-2012-2982.json

228 lines
7.7 KiB
JSON
Raw Normal View History

2020-08-05 12:09:01 +09:00
[
{
"id": 285161762,
"name": "CVE-2012-2982-Python-PoC",
"full_name": "cd6629\/CVE-2012-2982-Python-PoC",
"owner": {
"login": "cd6629",
"id": 63489620,
2021-01-22 00:10:20 +09:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489620?v=4",
2020-08-05 12:09:01 +09:00
"html_url": "https:\/\/github.com\/cd6629"
},
"html_url": "https:\/\/github.com\/cd6629\/CVE-2012-2982-Python-PoC",
"description": "This was converted from a metasploit module as an exercise for OSCP studying",
"fork": false,
"created_at": "2020-08-05T02:54:10Z",
2021-04-15 06:11:15 +09:00
"updated_at": "2021-04-14T18:01:04Z",
2020-10-31 06:08:54 +09:00
"pushed_at": "2020-10-30T19:56:54Z",
2021-04-15 06:11:15 +09:00
"stargazers_count": 4,
"watchers_count": 4,
2022-06-17 15:16:05 +09:00
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-06-17 15:16:05 +09:00
"forks": 1,
2021-04-15 06:11:15 +09:00
"watchers": 4,
2020-08-05 12:09:01 +09:00
"score": 0
2020-10-26 12:09:00 +09:00
},
{
"id": 307214937,
"name": "CVE-2012-2982",
"full_name": "OstojaOfficial\/CVE-2012-2982",
"owner": {
"login": "OstojaOfficial",
"id": 21225822,
2021-01-22 00:10:20 +09:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21225822?v=4",
2020-10-26 12:09:00 +09:00
"html_url": "https:\/\/github.com\/OstojaOfficial"
},
"html_url": "https:\/\/github.com\/OstojaOfficial\/CVE-2012-2982",
"description": "Python exploit for CVE-2012-2982",
"fork": false,
"created_at": "2020-10-25T23:37:32Z",
2021-10-17 06:12:32 +09:00
"updated_at": "2021-10-16T16:16:43Z",
2020-10-26 12:09:00 +09:00
"pushed_at": "2020-10-25T23:53:20Z",
2021-10-17 06:12:32 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2022-03-15 09:14:36 +09:00
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-03-15 09:14:36 +09:00
"forks": 1,
2021-10-17 06:12:32 +09:00
"watchers": 2,
2020-10-26 12:09:00 +09:00
"score": 0
2021-03-19 06:11:03 +09:00
},
{
"id": 349149619,
"name": "CVE-2012-2982_Python",
"full_name": "AlexJS6\/CVE-2012-2982_Python",
"owner": {
"login": "AlexJS6",
"id": 63366907,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63366907?v=4",
"html_url": "https:\/\/github.com\/AlexJS6"
},
"html_url": "https:\/\/github.com\/AlexJS6\/CVE-2012-2982_Python",
"description": "PoC Python script as an exercice from tryhackme.",
"fork": false,
"created_at": "2021-03-18T16:47:43Z",
2021-05-01 06:11:10 +09:00
"updated_at": "2021-04-30T16:06:28Z",
2021-03-20 12:11:50 +09:00
"pushed_at": "2021-03-19T22:56:16Z",
2021-05-01 06:11:10 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-03-19 06:11:03 +09:00
"forks_count": 0,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-03-19 06:11:03 +09:00
"forks": 0,
2021-05-01 06:11:10 +09:00
"watchers": 1,
2021-03-19 06:11:03 +09:00
"score": 0
2021-04-06 12:11:05 +09:00
},
{
"id": 355021311,
"name": "CVE-2012-2982",
"full_name": "Ari-Weinberg\/CVE-2012-2982",
"owner": {
"login": "Ari-Weinberg",
"id": 67128976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67128976?v=4",
"html_url": "https:\/\/github.com\/Ari-Weinberg"
},
"html_url": "https:\/\/github.com\/Ari-Weinberg\/CVE-2012-2982",
"description": "Exploit for CVE-2012-2982",
"fork": false,
"created_at": "2021-04-06T01:31:58Z",
"updated_at": "2021-04-06T01:35:54Z",
"pushed_at": "2021-04-06T01:35:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-04-06 12:11:05 +09:00
"forks": 0,
"watchers": 0,
"score": 0
2021-09-04 18:12:10 +09:00
},
{
"id": 402959369,
"name": "CVE-2012-2982",
"full_name": "JohnHammond\/CVE-2012-2982",
"owner": {
"login": "JohnHammond",
"id": 6288722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
"html_url": "https:\/\/github.com\/JohnHammond"
},
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2012-2982",
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
2022-09-07 21:17:14 +09:00
"updated_at": "2022-09-07T07:20:07Z",
2021-09-29 06:15:09 +09:00
"pushed_at": "2021-09-28T16:14:13Z",
2022-09-07 21:17:14 +09:00
"stargazers_count": 25,
"watchers_count": 25,
2022-07-25 21:21:38 +09:00
"forks_count": 9,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-07-25 21:21:38 +09:00
"forks": 9,
2022-09-07 21:17:14 +09:00
"watchers": 25,
2021-09-04 18:12:10 +09:00
"score": 0
2021-12-11 03:13:57 +09:00
},
{
"id": 437025849,
"name": "CVE-2012-2982",
"full_name": "R00tendo\/CVE-2012-2982",
"owner": {
"login": "R00tendo",
"id": 72181445,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72181445?v=4",
"html_url": "https:\/\/github.com\/R00tendo"
},
"html_url": "https:\/\/github.com\/R00tendo\/CVE-2012-2982",
"description": null,
"fork": false,
"created_at": "2021-12-10T15:29:07Z",
2022-06-05 09:15:18 +09:00
"updated_at": "2022-06-04T18:05:57Z",
"pushed_at": "2022-06-04T18:05:35Z",
2021-12-11 03:13:57 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2022-06-05 09:15:18 +09:00
"topics": [
"cve-2012-2982"
],
2021-12-11 03:13:57 +09:00
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-02-17 09:14:11 +09:00
},
{
"id": 460158603,
"name": "CVE-2012-2982",
"full_name": "blu3ming\/CVE-2012-2982",
"owner": {
"login": "blu3ming",
"id": 25083316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25083316?v=4",
"html_url": "https:\/\/github.com\/blu3ming"
},
"html_url": "https:\/\/github.com\/blu3ming\/CVE-2012-2982",
"description": "POC en Python para el CVE-2012-2982 mejorado del original por el usuario @OstojaOfficial",
"fork": false,
"created_at": "2022-02-16T20:00:36Z",
"updated_at": "2022-02-16T20:19:20Z",
"pushed_at": "2022-02-16T20:44:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2022-02-17 09:14:11 +09:00
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-16 15:19:32 +09:00
},
{
"id": 503979062,
"name": "CVE-2012-2982",
"full_name": "0xF331-D3AD\/CVE-2012-2982",
"owner": {
"login": "0xF331-D3AD",
"id": 107276306,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107276306?v=4",
"html_url": "https:\/\/github.com\/0xF331-D3AD"
},
"html_url": "https:\/\/github.com\/0xF331-D3AD\/CVE-2012-2982",
"description": null,
"fork": false,
"created_at": "2022-06-16T01:59:28Z",
"updated_at": "2022-06-16T01:59:46Z",
"pushed_at": "2022-06-16T01:59:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2022-06-16 15:19:32 +09:00
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2020-08-05 12:09:01 +09:00
}
]