[ { "id": 97701175, "name": "CVE-2017-7529", "full_name": "liusec\/CVE-2017-7529", "owner": { "login": "liusec", "id": 13982415, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4", "html_url": "https:\/\/github.com\/liusec" }, "html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529", "description": null, "fork": false, "created_at": "2017-07-19T09:55:42Z", "updated_at": "2023-05-22T02:09:11Z", "pushed_at": "2017-07-21T06:29:35Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 16, "score": 0, "subscribers_count": 2 }, { "id": 138050203, "name": "CVE-2017-7529_PoC", "full_name": "en0f\/CVE-2017-7529_PoC", "owner": { "login": "en0f", "id": 5394464, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5394464?v=4", "html_url": "https:\/\/github.com\/en0f" }, "html_url": "https:\/\/github.com\/en0f\/CVE-2017-7529_PoC", "description": "CVE-2017-7529_PoC", "fork": false, "created_at": "2018-06-20T15:16:10Z", "updated_at": "2024-01-10T08:39:38Z", "pushed_at": "2018-06-20T15:16:39Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 26, "watchers": 18, "score": 0, "subscribers_count": 2 }, { "id": 166269997, "name": "cve-2017-7529", "full_name": "cved-sources\/cve-2017-7529", "owner": { "login": "cved-sources", "id": 46423677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", "html_url": "https:\/\/github.com\/cved-sources" }, "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-7529", "description": "cve-2017-7529", "fork": false, "created_at": "2019-01-17T17:47:34Z", "updated_at": "2021-04-15T21:27:29Z", "pushed_at": "2021-04-15T21:27:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 190598569, "name": "CVE-2017-7529-POC", "full_name": "MaxSecurity\/CVE-2017-7529-POC", "owner": { "login": "MaxSecurity", "id": 16812469, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16812469?v=4", "html_url": "https:\/\/github.com\/MaxSecurity" }, "html_url": "https:\/\/github.com\/MaxSecurity\/CVE-2017-7529-POC", "description": null, "fork": false, "created_at": "2019-06-06T14:47:17Z", "updated_at": "2023-07-13T10:42:57Z", "pushed_at": "2019-06-06T14:53:51Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 272001877, "name": "CVE-2017-7529", "full_name": "cyberk1w1\/CVE-2017-7529", "owner": { "login": "cyberk1w1", "id": 66871294, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66871294?v=4", "html_url": "https:\/\/github.com\/cyberk1w1" }, "html_url": "https:\/\/github.com\/cyberk1w1\/CVE-2017-7529", "description": "Exploit for NGiX 1.6.2 Remote Integer Overflow Vulnerability CVE-2017-7529", "fork": false, "created_at": "2020-06-13T12:11:19Z", "updated_at": "2020-06-18T06:46:05Z", "pushed_at": "2020-06-18T06:46:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 274587350, "name": "nginx-CVE-2017-7529", "full_name": "cyberharsh\/nginx-CVE-2017-7529", "owner": { "login": "cyberharsh", "id": 57433814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57433814?v=4", "html_url": "https:\/\/github.com\/cyberharsh" }, "html_url": "https:\/\/github.com\/cyberharsh\/nginx-CVE-2017-7529", "description": null, "fork": false, "created_at": "2020-06-24T05:57:33Z", "updated_at": "2021-01-16T15:52:15Z", "pushed_at": "2020-07-02T08:48:49Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 295851673, "name": "nginx-overflow", "full_name": "daehee\/nginx-overflow", "owner": { "login": "daehee", "id": 81271, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81271?v=4", "html_url": "https:\/\/github.com\/daehee" }, "html_url": "https:\/\/github.com\/daehee\/nginx-overflow", "description": "Scans for nginx integer overflow vulnerability (CVE-2017-7529)", "fork": false, "created_at": "2020-09-15T21:19:17Z", "updated_at": "2020-09-16T17:44:12Z", "pushed_at": "2020-09-16T17:44:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 330894535, "name": "exploit-nginx-1.10.3", "full_name": "gemboxteam\/exploit-nginx-1.10.3", "owner": { "login": "gemboxteam", "id": 27276452, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27276452?v=4", "html_url": "https:\/\/github.com\/gemboxteam" }, "html_url": "https:\/\/github.com\/gemboxteam\/exploit-nginx-1.10.3", "description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2", "fork": false, "created_at": "2021-01-19T07:12:10Z", "updated_at": "2023-12-26T17:34:28Z", "pushed_at": "2021-01-19T07:17:52Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 8, "score": 0, "subscribers_count": 2 }, { "id": 331347189, "name": "Remote-Integer-Overflow-Vulnerability", "full_name": "fardeen-ahmed\/Remote-Integer-Overflow-Vulnerability", "owner": { "login": "fardeen-ahmed", "id": 47289822, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47289822?v=4", "html_url": "https:\/\/github.com\/fardeen-ahmed" }, "html_url": "https:\/\/github.com\/fardeen-ahmed\/Remote-Integer-Overflow-Vulnerability", "description": "Added Vulnerability Code in Python for Nginx Vulnerability (CVE-2017-7529)", "fork": false, "created_at": "2021-01-20T15:24:10Z", "updated_at": "2021-06-07T10:52:03Z", "pushed_at": "2021-06-07T10:52:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 353402530, "name": "Nginx-Remote-Integer-Overflow-Vulnerability", "full_name": "mo3zj\/Nginx-Remote-Integer-Overflow-Vulnerability", "owner": { "login": "mo3zj", "id": 38070226, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38070226?v=4", "html_url": "https:\/\/github.com\/mo3zj" }, "html_url": "https:\/\/github.com\/mo3zj\/Nginx-Remote-Integer-Overflow-Vulnerability", "description": "CVE-2017-7529", "fork": false, "created_at": "2021-03-31T15:24:07Z", "updated_at": "2022-09-05T13:57:33Z", "pushed_at": "2021-03-31T15:27:36Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 402153068, "name": "CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit", "full_name": "fu2x2000\/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit", "owner": { "login": "fu2x2000", "id": 34998869, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34998869?v=4", "html_url": "https:\/\/github.com\/fu2x2000" }, "html_url": "https:\/\/github.com\/fu2x2000\/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit", "description": null, "fork": false, "created_at": "2021-09-01T17:49:11Z", "updated_at": "2021-09-01T17:49:46Z", "pushed_at": "2021-09-01T17:49:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 515043572, "name": "CVE-2017-7529", "full_name": "Shehzadcyber\/CVE-2017-7529", "owner": { "login": "Shehzadcyber", "id": 65858237, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65858237?v=4", "html_url": "https:\/\/github.com\/Shehzadcyber" }, "html_url": "https:\/\/github.com\/Shehzadcyber\/CVE-2017-7529", "description": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.", "fork": false, "created_at": "2022-07-18T05:14:55Z", "updated_at": "2024-04-11T10:19:13Z", "pushed_at": "2022-07-18T05:36:33Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 733323140, "name": "-Exploit-CVE-2017-7529", "full_name": "coolman6942o\/-Exploit-CVE-2017-7529", "owner": { "login": "coolman6942o", "id": 76984265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76984265?v=4", "html_url": "https:\/\/github.com\/coolman6942o" }, "html_url": "https:\/\/github.com\/coolman6942o\/-Exploit-CVE-2017-7529", "description": "CVE-2017-7529: Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. ", "fork": false, "created_at": "2023-12-19T04:21:18Z", "updated_at": "2023-12-19T04:25:47Z", "pushed_at": "2023-12-19T04:32:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]