PoC-in-GitHub/2013/CVE-2013-2028.json
2024-12-28 03:31:15 +09:00

224 lines
No EOL
7.4 KiB
JSON

[
{
"id": 10198831,
"name": "nginx-1.4.0",
"full_name": "danghvu\/nginx-1.4.0",
"owner": {
"login": "danghvu",
"id": 1152714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1152714?v=4",
"html_url": "https:\/\/github.com\/danghvu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/danghvu\/nginx-1.4.0",
"description": "For the analysis of CVE-2013-2028",
"fork": false,
"created_at": "2013-05-21T15:20:05Z",
"updated_at": "2024-08-12T19:11:50Z",
"pushed_at": "2018-06-07T23:22:38Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 30,
"score": 0,
"subscribers_count": 4
},
{
"id": 54551843,
"name": "nginxpwn",
"full_name": "kitctf\/nginxpwn",
"owner": {
"login": "kitctf",
"id": 8018062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8018062?v=4",
"html_url": "https:\/\/github.com\/kitctf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kitctf\/nginxpwn",
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
"fork": false,
"created_at": "2016-03-23T10:41:00Z",
"updated_at": "2024-11-08T18:41:20Z",
"pushed_at": "2016-03-23T12:05:38Z",
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 54,
"score": 0,
"subscribers_count": 6
},
{
"id": 200347068,
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"owner": {
"login": "tachibana51",
"id": 29031994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4",
"html_url": "https:\/\/github.com\/tachibana51",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"description": "this is not stable",
"fork": false,
"created_at": "2019-08-03T07:38:18Z",
"updated_at": "2019-10-26T18:48:26Z",
"pushed_at": "2019-08-03T07:58:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 275396332,
"name": "CVE-2013-2028-Exploit",
"full_name": "m4drat\/CVE-2013-2028-Exploit",
"owner": {
"login": "m4drat",
"id": 39669467,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39669467?v=4",
"html_url": "https:\/\/github.com\/m4drat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit",
"description": "CVE-2013-2028 python exploit",
"fork": false,
"created_at": "2020-06-27T15:08:26Z",
"updated_at": "2024-12-27T15:31:34Z",
"pushed_at": "2020-06-27T15:08:58Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"nginx",
"pwn"
],
"visibility": "public",
"forks": 1,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
{
"id": 384198605,
"name": "nginxhack",
"full_name": "jptr218\/nginxhack",
"owner": {
"login": "jptr218",
"id": 84092766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
"html_url": "https:\/\/github.com\/jptr218",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jptr218\/nginxhack",
"description": "A CVE-2013-2028 implementation",
"fork": false,
"created_at": "2021-07-08T17:17:34Z",
"updated_at": "2021-07-27T10:19:45Z",
"pushed_at": "2021-07-27T10:19:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 524887947,
"name": "CVE-2013-2028-reproduction",
"full_name": "Sunqiz\/CVE-2013-2028-reproduction",
"owner": {
"login": "Sunqiz",
"id": 59192636,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4",
"html_url": "https:\/\/github.com\/Sunqiz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sunqiz\/CVE-2013-2028-reproduction",
"description": "CVE-2013-2028复现",
"fork": false,
"created_at": "2022-08-15T07:06:23Z",
"updated_at": "2022-08-15T07:09:13Z",
"pushed_at": "2022-08-15T07:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 832619909,
"name": "CVE-2013-2028_Checker",
"full_name": "xiw1ll\/CVE-2013-2028_Checker",
"owner": {
"login": "xiw1ll",
"id": 69167284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69167284?v=4",
"html_url": "https:\/\/github.com\/xiw1ll",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xiw1ll\/CVE-2013-2028_Checker",
"description": "Tool for checking Nginx CVE-2013-2028",
"fork": false,
"created_at": "2024-07-23T11:40:26Z",
"updated_at": "2024-07-23T11:40:55Z",
"pushed_at": "2024-07-23T11:40:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]