PoC-in-GitHub/2006/CVE-2006-5051.json

98 lines
3.7 KiB
JSON
Raw Normal View History

2024-07-02 09:28:35 +09:00
[
{
"id": 822792125,
"name": "CVE-2024-6387",
"full_name": "bigb0x\/CVE-2024-6387",
"owner": {
"login": "bigb0x",
"id": 13532434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
"html_url": "https:\/\/github.com\/bigb0x"
},
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
2024-07-02 21:29:08 +09:00
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
2024-07-02 09:28:35 +09:00
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
2024-07-14 21:29:25 +09:00
"updated_at": "2024-07-14T10:04:53Z",
2024-07-06 21:28:59 +09:00
"pushed_at": "2024-07-06T10:47:30Z",
2024-07-14 21:29:25 +09:00
"stargazers_count": 23,
"watchers_count": 23,
2024-07-02 09:28:35 +09:00
"has_discussions": false,
2024-07-18 09:29:23 +09:00
"forks_count": 6,
2024-07-02 09:28:35 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2024-07-06 21:28:59 +09:00
"topics": [
"openssh",
"security-audit",
"security-tools",
"ssh",
"ssh-server"
],
2024-07-02 09:28:35 +09:00
"visibility": "public",
2024-07-18 09:29:23 +09:00
"forks": 6,
2024-07-14 21:29:25 +09:00
"watchers": 23,
2024-07-02 09:28:35 +09:00
"score": 0,
2024-07-03 03:29:18 +09:00
"subscribers_count": 1
2024-07-05 21:29:27 +09:00
},
{
"id": 824318880,
"name": "CVE-2024-6387_Check",
"full_name": "sardine-web\/CVE-2024-6387_Check",
"owner": {
"login": "sardine-web",
"id": 80635620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
"html_url": "https:\/\/github.com\/sardine-web"
},
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"fork": false,
"created_at": "2024-07-04T21:20:26Z",
"updated_at": "2024-07-05T10:10:03Z",
"pushed_at": "2024-07-04T21:31:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2024-07-06 21:28:59 +09:00
"forks_count": 1,
2024-07-05 21:29:27 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-07-06 21:28:59 +09:00
"forks": 1,
2024-07-05 21:29:27 +09:00
"watchers": 0,
"score": 0,
2024-07-06 03:28:52 +09:00
"subscribers_count": 1
2024-07-11 21:29:37 +09:00
},
{
2024-07-12 03:29:12 +09:00
"id": 827378414,
"name": "CVE-2024-6387",
"full_name": "ThemeHackers\/CVE-2024-6387",
2024-07-11 21:29:37 +09:00
"owner": {
2024-07-12 03:29:12 +09:00
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers"
2024-07-11 21:29:37 +09:00
},
2024-07-12 03:29:12 +09:00
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-6387",
"description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.",
2024-07-11 21:29:37 +09:00
"fork": false,
2024-07-12 03:29:12 +09:00
"created_at": "2024-07-11T14:37:17Z",
"updated_at": "2024-07-11T14:59:23Z",
"pushed_at": "2024-07-11T14:59:20Z",
2024-07-11 21:29:37 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-07-13 03:29:28 +09:00
"subscribers_count": 1
2024-07-02 09:28:35 +09:00
}
]