2021-04-04 17:10:08 +02:00
[
2023-06-22 08:34:01 +02:00
{
"id" : 168361115 ,
"name" : "CVE-2019-1653" ,
"full_name" : "dubfr33\/CVE-2019-1653" ,
"owner" : {
"login" : "dubfr33" ,
"id" : 20056018 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20056018?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/dubfr33" ,
"user_view_type" : "public"
2023-06-22 08:34:01 +02:00
} ,
"html_url" : "https:\/\/github.com\/dubfr33\/CVE-2019-1653" ,
"description" : "NSE script to scan for Cisco routers vulnerable to CVE-2019-1653" ,
"fork" : false ,
"created_at" : "2019-01-30T14:58:48Z" ,
"updated_at" : "2023-01-10T03:20:00Z" ,
"pushed_at" : "2019-01-30T15:01:41Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
2022-08-05 02:16:53 +02:00
{
"id" : 178810790 ,
"name" : "CiscoSpill" ,
"full_name" : "shaheemirza\/CiscoSpill" ,
"owner" : {
"login" : "shaheemirza" ,
"id" : 4853436 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4853436?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/shaheemirza" ,
"user_view_type" : "public"
2022-08-05 02:16:53 +02:00
} ,
"html_url" : "https:\/\/github.com\/shaheemirza\/CiscoSpill" ,
"description" : "Just a PoC tool to extract password using CVE-2019-1653." ,
"fork" : false ,
"created_at" : "2019-04-01T07:40:01Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T19:47:29Z" ,
2022-08-05 02:16:53 +02:00
"pushed_at" : "2019-04-01T07:50:48Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2022-08-05 02:16:53 +02:00
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cisco" ,
"exploit" ,
"exploitation" ,
"extract-passwords" ,
"pentest" ,
"securiy"
] ,
"visibility" : "public" ,
"forks" : 5 ,
2024-08-13 02:29:46 +02:00
"watchers" : 3 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 3
2023-01-07 01:35:14 +01:00
} ,
2023-05-19 14:30:08 +02:00
{
"id" : 619228408 ,
"name" : "CVE-2019-1653" ,
"full_name" : "ibrahimzx\/CVE-2019-1653" ,
"owner" : {
"login" : "ibrahimzx" ,
"id" : 69252640 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69252640?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/ibrahimzx" ,
"user_view_type" : "public"
2023-05-19 14:30:08 +02:00
} ,
"html_url" : "https:\/\/github.com\/ibrahimzx\/CVE-2019-1653" ,
"description" : "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to retrieve sensitive information." ,
"fork" : false ,
"created_at" : "2023-03-26T16:36:22Z" ,
"updated_at" : "2023-03-26T16:44:56Z" ,
"pushed_at" : "2023-03-26T16:55:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2021-04-04 17:10:08 +02:00
}
]