[ { "id": 191233980, "name": "exim-rce-quickfix", "full_name": "bananaphones\/exim-rce-quickfix", "owner": { "login": "bananaphones", "id": 4877449, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4877449?v=4", "html_url": "https:\/\/github.com\/bananaphones" }, "html_url": "https:\/\/github.com\/bananaphones\/exim-rce-quickfix", "description": "quick fix for CVE-2019-10149, works on Debian\\Ubuntu\\Centos", "fork": false, "created_at": "2019-06-10T19:37:05Z", "updated_at": "2020-01-11T07:45:20Z", "pushed_at": "2019-06-14T10:16:02Z", "stargazers_count": 20, "watchers_count": 20, "forks_count": 18, "forks": 18, "watchers": 20, "score": 0 }, { "id": 191493140, "name": "eximrce-CVE-2019-10149", "full_name": "cowbe0x004\/eximrce-CVE-2019-10149", "owner": { "login": "cowbe0x004", "id": 3072913, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3072913?v=4", "html_url": "https:\/\/github.com\/cowbe0x004" }, "html_url": "https:\/\/github.com\/cowbe0x004\/eximrce-CVE-2019-10149", "description": "simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in \/tmp\/eximrce.", "fork": false, "created_at": "2019-06-12T03:47:16Z", "updated_at": "2019-11-15T03:38:41Z", "pushed_at": "2019-07-08T18:25:12Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 8, "forks": 8, "watchers": 9, "score": 0 }, { "id": 191845568, "name": "PoC--CVE-2019-10149_Exim", "full_name": "MNEMO-CERT\/PoC--CVE-2019-10149_Exim", "owner": { "login": "MNEMO-CERT", "id": 51804856, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51804856?v=4", "html_url": "https:\/\/github.com\/MNEMO-CERT" }, "html_url": "https:\/\/github.com\/MNEMO-CERT\/PoC--CVE-2019-10149_Exim", "description": "PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.", "fork": false, "created_at": "2019-06-13T23:21:53Z", "updated_at": "2019-10-29T17:17:45Z", "pushed_at": "2019-06-18T14:57:22Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 4, "forks": 4, "watchers": 10, "score": 0 }, { "id": 191952969, "name": "CVE-2019-10149-quick", "full_name": "aishee\/CVE-2019-10149-quick", "owner": { "login": "aishee", "id": 8377283, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8377283?v=4", "html_url": "https:\/\/github.com\/aishee" }, "html_url": "https:\/\/github.com\/aishee\/CVE-2019-10149-quick", "description": "Simple Bash shell quick fix CVE-2019-10149", "fork": false, "created_at": "2019-06-14T14:02:43Z", "updated_at": "2019-06-14T14:03:33Z", "pushed_at": "2019-06-14T14:03:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 194002154, "name": "CVE-2019-10149-privilege-escalation", "full_name": "AzizMea\/CVE-2019-10149-privilege-escalation", "owner": { "login": "AzizMea", "id": 30970260, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30970260?v=4", "html_url": "https:\/\/github.com\/AzizMea" }, "html_url": "https:\/\/github.com\/AzizMea\/CVE-2019-10149-privilege-escalation", "description": "CVE-2019-10149 privilege escalation", "fork": false, "created_at": "2019-06-27T01:34:41Z", "updated_at": "2020-01-07T08:25:21Z", "pushed_at": "2019-06-27T17:46:25Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 5, "forks": 5, "watchers": 8, "score": 0 }, { "id": 198729185, "name": "StickyExim", "full_name": "Brets0150\/StickyExim", "owner": { "login": "Brets0150", "id": 40045956, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40045956?v=4", "html_url": "https:\/\/github.com\/Brets0150" }, "html_url": "https:\/\/github.com\/Brets0150\/StickyExim", "description": "Exim Honey Pot for CVE-2019-10149 exploit attempts.", "fork": false, "created_at": "2019-07-25T00:46:37Z", "updated_at": "2019-08-06T20:21:47Z", "pushed_at": "2019-08-06T20:21:46Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 206647936, "name": "exim.exp", "full_name": "ChrissHack\/exim.exp", "owner": { "login": "ChrissHack", "id": 36897897, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36897897?v=4", "html_url": "https:\/\/github.com\/ChrissHack" }, "html_url": "https:\/\/github.com\/ChrissHack\/exim.exp", "description": "CVE-2019-10149", "fork": false, "created_at": "2019-09-05T20:04:14Z", "updated_at": "2019-09-11T01:27:28Z", "pushed_at": "2019-09-05T20:34:18Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "forks": 1, "watchers": 3, "score": 0 }, { "id": 216513053, "name": "CVE-2019-10149", "full_name": "darsigovrustam\/CVE-2019-10149", "owner": { "login": "darsigovrustam", "id": 36308333, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36308333?v=4", "html_url": "https:\/\/github.com\/darsigovrustam" }, "html_url": "https:\/\/github.com\/darsigovrustam\/CVE-2019-10149", "description": "Instructions for installing a vulnerable version of Exim and its expluatation", "fork": false, "created_at": "2019-10-21T08:13:27Z", "updated_at": "2019-10-24T07:19:30Z", "pushed_at": "2019-10-24T07:19:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 217788444, "name": "CVE-2019-10149", "full_name": "Diefunction\/CVE-2019-10149", "owner": { "login": "Diefunction", "id": 17242631, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17242631?v=4", "html_url": "https:\/\/github.com\/Diefunction" }, "html_url": "https:\/\/github.com\/Diefunction\/CVE-2019-10149", "description": "CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in \/src\/deliver.c may lead to remote command execution.", "fork": false, "created_at": "2019-10-27T01:03:11Z", "updated_at": "2019-12-07T17:35:04Z", "pushed_at": "2019-10-27T01:08:17Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 3, "forks": 3, "watchers": 7, "score": 0 } ]