[ { "id": 171996551, "name": "CVE-2018-20250", "full_name": "WyAtu\/CVE-2018-20250", "owner": { "login": "WyAtu", "id": 23521935, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23521935?v=4", "html_url": "https:\/\/github.com\/WyAtu" }, "html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-20250", "description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar", "fork": false, "created_at": "2019-02-22T04:52:08Z", "updated_at": "2020-02-25T11:12:15Z", "pushed_at": "2019-08-05T10:45:34Z", "stargazers_count": 385, "watchers_count": 385, "forks_count": 169, "forks": 169, "watchers": 385, "score": 0 }, { "id": 172009558, "name": "CVE-2018-20250", "full_name": "QAX-A-Team\/CVE-2018-20250", "owner": { "login": "QAX-A-Team", "id": 35417332, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/35417332?v=4", "html_url": "https:\/\/github.com\/QAX-A-Team" }, "html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250", "description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]", "fork": false, "created_at": "2019-02-22T06:47:01Z", "updated_at": "2019-10-22T04:28:28Z", "pushed_at": "2019-02-22T07:47:26Z", "stargazers_count": 23, "watchers_count": 23, "forks_count": 10, "forks": 10, "watchers": 23, "score": 0 }, { "id": 172069488, "name": "CVE-2018-20250-poc-winrar", "full_name": "nmweizi\/CVE-2018-20250-poc-winrar", "owner": { "login": "nmweizi", "id": 1232444, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1232444?v=4", "html_url": "https:\/\/github.com\/nmweizi" }, "html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar", "description": null, "fork": false, "created_at": "2019-02-22T13:18:14Z", "updated_at": "2019-02-22T13:20:31Z", "pushed_at": "2019-02-22T13:20:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "forks": 2, "watchers": 0, "score": 0 }, { "id": 172078598, "name": "UNACEV2.DLL-CVE-2018-20250", "full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250", "owner": { "login": "blunden", "id": 249915, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/249915?v=4", "html_url": "https:\/\/github.com\/blunden" }, "html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250", "description": "A version of the binary patched to address CVE-2018-20250", "fork": false, "created_at": "2019-02-22T14:19:20Z", "updated_at": "2019-02-22T14:29:30Z", "pushed_at": "2019-02-22T14:29:29Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 172156568, "name": "CVE-2018-20250-WinRAR-ACE", "full_name": "easis\/CVE-2018-20250-WinRAR-ACE", "owner": { "login": "easis", "id": 50383201, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/50383201?v=4", "html_url": "https:\/\/github.com\/easis" }, "html_url": "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE", "description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).", "fork": false, "created_at": "2019-02-23T01:20:34Z", "updated_at": "2019-12-20T10:41:29Z", "pushed_at": "2019-03-01T13:35:59Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 15, "forks": 15, "watchers": 16, "score": 0 }, { "id": 173153306, "name": "CVE-2018-20250", "full_name": "STP5940\/CVE-2018-20250", "owner": { "login": "STP5940", "id": 21144303, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21144303?v=4", "html_url": "https:\/\/github.com\/STP5940" }, "html_url": "https:\/\/github.com\/STP5940\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2019-02-28T17:07:52Z", "updated_at": "2019-10-30T09:58:35Z", "pushed_at": "2019-02-28T17:10:39Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 5, "forks": 5, "watchers": 2, "score": 0 }, { "id": 173733018, "name": "WinAce-POC", "full_name": "n4r1b\/WinAce-POC", "owner": { "login": "n4r1b", "id": 7025964, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7025964?v=4", "html_url": "https:\/\/github.com\/n4r1b" }, "html_url": "https:\/\/github.com\/n4r1b\/WinAce-POC", "description": "Simple POC to leverage CVE-2018-20250 from inside an EXE", "fork": false, "created_at": "2019-03-04T11:34:17Z", "updated_at": "2019-03-04T14:32:05Z", "pushed_at": "2019-03-04T14:42:04Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 173733367, "name": "hack-winrar", "full_name": "technicaldada\/hack-winrar", "owner": { "login": "technicaldada", "id": 32122182, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32122182?v=4", "html_url": "https:\/\/github.com\/technicaldada" }, "html_url": "https:\/\/github.com\/technicaldada\/hack-winrar", "description": "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]", "fork": false, "created_at": "2019-03-04T11:36:43Z", "updated_at": "2019-03-25T16:54:05Z", "pushed_at": "2019-03-04T11:39:34Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 173947919, "name": "ezwinrar", "full_name": "Ektoplasma\/ezwinrar", "owner": { "login": "Ektoplasma", "id": 15208659, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/15208659?v=4", "html_url": "https:\/\/github.com\/Ektoplasma" }, "html_url": "https:\/\/github.com\/Ektoplasma\/ezwinrar", "description": "Python tool exploiting CVE-2018-20250 found by CheckPoint folks", "fork": false, "created_at": "2019-03-05T13:05:03Z", "updated_at": "2019-10-19T08:36:59Z", "pushed_at": "2019-03-05T15:51:12Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "forks": 0, "watchers": 3, "score": 0 }, { "id": 174533873, "name": "CVE-2018-20250-WINRAR-ACE-GUI", "full_name": "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI", "owner": { "login": "arkangel-dev", "id": 31138457, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/31138457?v=4", "html_url": "https:\/\/github.com\/arkangel-dev" }, "html_url": "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI", "description": "CVE-2018-20250-WINRAR-ACE Exploit with a UI", "fork": false, "created_at": "2019-03-08T12:27:12Z", "updated_at": "2019-10-30T09:59:05Z", "pushed_at": "2019-05-10T05:37:10Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 1, "forks": 1, "watchers": 9, "score": 0 }, { "id": 174948316, "name": "CVE-2018-20250", "full_name": "AeolusTF\/CVE-2018-20250", "owner": { "login": "AeolusTF", "id": 29159416, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29159416?v=4", "html_url": "https:\/\/github.com\/AeolusTF" }, "html_url": "https:\/\/github.com\/AeolusTF\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2019-03-11T07:33:45Z", "updated_at": "2019-03-11T07:37:51Z", "pushed_at": "2019-03-11T07:37:50Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 176534636, "name": "Detect-CVE-2018-20250", "full_name": "joydragon\/Detect-CVE-2018-20250", "owner": { "login": "joydragon", "id": 4154219, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4154219?v=4", "html_url": "https:\/\/github.com\/joydragon" }, "html_url": "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250", "description": "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250", "fork": false, "created_at": "2019-03-19T14:51:52Z", "updated_at": "2019-03-19T15:03:27Z", "pushed_at": "2019-03-19T15:03:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 177513614, "name": "WinRar_ACE_exploit_CVE-2018-20250", "full_name": "DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250", "owner": { "login": "DANIELVISPOBLOG", "id": 26053534, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26053534?v=4", "html_url": "https:\/\/github.com\/DANIELVISPOBLOG" }, "html_url": "https:\/\/github.com\/DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250", "description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250", "fork": false, "created_at": "2019-03-25T04:22:14Z", "updated_at": "2020-01-18T19:58:21Z", "pushed_at": "2019-03-26T04:54:35Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "forks": 2, "watchers": 2, "score": 0 }, { "id": 183341455, "name": "CVE-2018-20250", "full_name": "denmilu\/CVE-2018-20250", "owner": { "login": "denmilu", "id": 2469038, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4", "html_url": "https:\/\/github.com\/denmilu" }, "html_url": "https:\/\/github.com\/denmilu\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2019-04-25T02:30:50Z", "updated_at": "2019-04-25T02:31:01Z", "pushed_at": "2019-04-25T02:30:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 185440756, "name": "CVE-2018-20250", "full_name": "930201676\/CVE-2018-20250", "owner": { "login": "930201676", "id": 20335327, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20335327?v=4", "html_url": "https:\/\/github.com\/930201676" }, "html_url": "https:\/\/github.com\/930201676\/CVE-2018-20250", "description": null, "fork": false, "created_at": "2019-05-07T16:34:10Z", "updated_at": "2019-05-07T16:34:31Z", "pushed_at": "2019-05-07T16:34:29Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 241136874, "name": "CVE-2018-20250-WinRAR", "full_name": "eastmountyxz\/CVE-2018-20250-WinRAR", "owner": { "login": "eastmountyxz", "id": 53172375, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4", "html_url": "https:\/\/github.com\/eastmountyxz" }, "html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR", "description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者,自己确实很菜,但希望坚持下去,一起加油!", "fork": false, "created_at": "2020-02-17T15:08:22Z", "updated_at": "2020-02-17T15:08:26Z", "pushed_at": "2020-02-17T15:08:24Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]