[ { "id": 171996551, "name": "CVE-2018-20250", "full_name": "WyAtu\/CVE-2018-20250", "owner": { "login": "WyAtu", "id": 23521935, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23521935?v=4", "html_url": "https:\/\/github.com\/WyAtu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-20250", "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "fork": false, "created_at": "2019-02-22T04:52:08Z", "updated_at": "2024-09-09T06:55:53Z", "pushed_at": "2019-08-05T10:45:34Z", "stargazers_count": 487, "watchers_count": 487, "has_discussions": false, "forks_count": 177, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 177, "watchers": 487, "score": 0, "subscribers_count": 10 }, { "id": 172009558, "name": "CVE-2018-20250", "full_name": "QAX-A-Team\/CVE-2018-20250", "owner": { "login": "QAX-A-Team", "id": 35417332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4", "html_url": "https:\/\/github.com\/QAX-A-Team", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250", "description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]", "fork": false, "created_at": "2019-02-22T06:47:01Z", "updated_at": "2021-05-29T18:38:32Z", "pushed_at": "2019-02-22T07:47:26Z", "stargazers_count": 25, "watchers_count": 25, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 25, "score": 0, "subscribers_count": 2 }, { "id": 172069488, "name": "CVE-2018-20250-poc-winrar", "full_name": "nmweizi\/CVE-2018-20250-poc-winrar", "owner": { "login": "nmweizi", "id": 1232444, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1232444?v=4", "html_url": "https:\/\/github.com\/nmweizi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar", "description": null, "fork": false, "created_at": "2019-02-22T13:18:14Z", "updated_at": "2019-02-22T13:20:31Z", "pushed_at": "2019-02-22T13:20:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 172078598, "name": "UNACEV2.DLL-CVE-2018-20250", "full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250", "owner": { "login": "blunden", "id": 249915, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249915?v=4", "html_url": "https:\/\/github.com\/blunden", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250", "description": "A version of the binary patched to address CVE-2018-20250", "fork": false, "created_at": "2019-02-22T14:19:20Z", "updated_at": "2019-02-22T14:29:30Z", "pushed_at": "2019-02-22T14:29:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 172156568, "name": "CVE-2018-20250-WinRAR-ACE", "full_name": "easis\/CVE-2018-20250-WinRAR-ACE", "owner": { "login": "easis", "id": 50383201, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50383201?v=4", "html_url": "https:\/\/github.com\/easis", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE", "description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).", "fork": false, "created_at": "2019-02-23T01:20:34Z", "updated_at": "2024-10-24T14:43:31Z", "pushed_at": "2019-03-01T13:35:59Z", "stargazers_count": 21, "watchers_count": 21, "has_discussions": false, "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 18, "watchers": 21, "score": 0, "subscribers_count": 6 }, { "id": 173153306, "name": "CVE-2018-20250", "full_name": "STP5940\/CVE-2018-20250", "owner": { "login": "STP5940", "id": 21144303, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21144303?v=4", "html_url": "https:\/\/github.com\/STP5940", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/STP5940\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2019-02-28T17:07:52Z", "updated_at": "2024-08-12T19:46:13Z", "pushed_at": "2019-02-28T17:10:39Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 173733367, "name": "hack-winrar", "full_name": "technicaldada\/hack-winrar", "owner": { "login": "technicaldada", "id": 32122182, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32122182?v=4", "html_url": "https:\/\/github.com\/technicaldada", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/technicaldada\/hack-winrar", "description": "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]", "fork": false, "created_at": "2019-03-04T11:36:43Z", "updated_at": "2023-01-02T23:04:53Z", "pushed_at": "2019-03-04T11:39:34Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "absolute-path-traversal-bug", "bug", "hack", "windows", "winrar" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 173947919, "name": "ezwinrar", "full_name": "Ektoplasma\/ezwinrar", "owner": { "login": "Ektoplasma", "id": 15208659, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15208659?v=4", "html_url": "https:\/\/github.com\/Ektoplasma", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ektoplasma\/ezwinrar", "description": "Python tool exploiting CVE-2018-20250 found by CheckPoint folks", "fork": false, "created_at": "2019-03-05T13:05:03Z", "updated_at": "2023-03-14T14:38:11Z", "pushed_at": "2019-03-05T15:51:12Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 174533873, "name": "CVE-2018-20250-WINRAR-ACE-GUI", "full_name": "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI", "owner": { "login": "arkangel-dev", "id": 31138457, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31138457?v=4", "html_url": "https:\/\/github.com\/arkangel-dev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI", "description": "CVE-2018-20250-WINRAR-ACE Exploit with a UI", "fork": false, "created_at": "2019-03-08T12:27:12Z", "updated_at": "2024-08-29T01:22:26Z", "pushed_at": "2019-05-10T05:37:10Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 7, "score": 0, "subscribers_count": 3 }, { "id": 174948316, "name": "CVE-2018-20250", "full_name": "AeolusTF\/CVE-2018-20250", "owner": { "login": "AeolusTF", "id": 29159416, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29159416?v=4", "html_url": "https:\/\/github.com\/AeolusTF", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AeolusTF\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2019-03-11T07:33:45Z", "updated_at": "2019-03-11T07:37:51Z", "pushed_at": "2019-03-11T07:37:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 176534636, "name": "Detect-CVE-2018-20250", "full_name": "joydragon\/Detect-CVE-2018-20250", "owner": { "login": "joydragon", "id": 4154219, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4154219?v=4", "html_url": "https:\/\/github.com\/joydragon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250", "description": "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250", "fork": false, "created_at": "2019-03-19T14:51:52Z", "updated_at": "2019-03-19T15:03:27Z", "pushed_at": "2019-03-19T15:03:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 183341455, "name": "CVE-2018-20250", "full_name": "likekabin\/CVE-2018-20250", "owner": { "login": "likekabin", "id": 2469038, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", "html_url": "https:\/\/github.com\/likekabin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/likekabin\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2019-04-25T02:30:50Z", "updated_at": "2019-04-25T02:31:01Z", "pushed_at": "2019-04-25T02:30:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 187096096, "name": "WinRar_ACE_exploit_CVE-2018-20250", "full_name": "H4xl0r\/WinRar_ACE_exploit_CVE-2018-20250", "owner": { "login": "H4xl0r", "id": 31049432, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31049432?v=4", "html_url": "https:\/\/github.com\/H4xl0r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/H4xl0r\/WinRar_ACE_exploit_CVE-2018-20250", "description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250", "fork": false, "created_at": "2019-05-16T20:21:50Z", "updated_at": "2019-05-16T20:21:53Z", "pushed_at": "2019-03-26T04:54:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 241136874, "name": "CVE-2018-20250-WinRAR", "full_name": "eastmountyxz\/CVE-2018-20250-WinRAR", "owner": { "login": "eastmountyxz", "id": 53172375, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53172375?v=4", "html_url": "https:\/\/github.com\/eastmountyxz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR", "description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者,自己确实很菜,但希望坚持下去,一起加油!", "fork": false, "created_at": "2020-02-17T15:08:22Z", "updated_at": "2024-08-12T19:57:49Z", "pushed_at": "2020-05-19T07:55:32Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 263515438, "name": "cve-2018-20250", "full_name": "lxg5763\/cve-2018-20250", "owner": { "login": "lxg5763", "id": 36142720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36142720?v=4", "html_url": "https:\/\/github.com\/lxg5763", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lxg5763\/cve-2018-20250", "description": "CVE-2018-20250漏洞利用", "fork": false, "created_at": "2020-05-13T03:28:04Z", "updated_at": "2020-05-13T03:28:16Z", "pushed_at": "2020-05-13T03:28:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 391782512, "name": "CVE-2018-20250", "full_name": "zeronohacker\/CVE-2018-20250", "owner": { "login": "zeronohacker", "id": 65578786, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65578786?v=4", "html_url": "https:\/\/github.com\/zeronohacker", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zeronohacker\/CVE-2018-20250", "description": "CVE-2018-20250", "fork": false, "created_at": "2021-08-02T01:24:01Z", "updated_at": "2021-08-03T01:57:08Z", "pushed_at": "2021-08-03T01:54:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2018-20250" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 474011573, "name": "CVE-2018-20250", "full_name": "tzwlhack\/CVE-2018-20250", "owner": { "login": "tzwlhack", "id": 86322859, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86322859?v=4", "html_url": "https:\/\/github.com\/tzwlhack", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tzwlhack\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2022-03-25T13:02:41Z", "updated_at": "2022-03-25T13:02:53Z", "pushed_at": "2022-03-25T13:02:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 735884488, "name": "CVE-2018-20250", "full_name": "tannlh\/CVE-2018-20250", "owner": { "login": "tannlh", "id": 129723015, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129723015?v=4", "html_url": "https:\/\/github.com\/tannlh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tannlh\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2023-12-26T11:01:32Z", "updated_at": "2023-12-26T11:45:04Z", "pushed_at": "2023-12-26T11:45:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 792099382, "name": "CVE-2018-20250", "full_name": "LamSonBinh\/CVE-2018-20250", "owner": { "login": "LamSonBinh", "id": 94208851, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94208851?v=4", "html_url": "https:\/\/github.com\/LamSonBinh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LamSonBinh\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2024-04-26T01:18:45Z", "updated_at": "2024-04-26T01:49:38Z", "pushed_at": "2024-04-26T01:49:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]