PoC-in-GitHub/2014/CVE-2014-6332.json
2024-10-18 09:30:24 +09:00

95 lines
No EOL
6.4 KiB
JSON

[
{
"id": 27299504,
"name": "metasploit-framework",
"full_name": "MarkoArmitage\/metasploit-framework",
"owner": {
"login": "MarkoArmitage",
"id": 9991392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9991392?v=4",
"html_url": "https:\/\/github.com\/MarkoArmitage",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MarkoArmitage\/metasploit-framework",
"description": " app \tturn nil publics and privates into blanks \t3 months ago \tconfig \tUse bundler\/setup for more graceful bundler related failures \t11 days ago \tdata \tAdd token fiddling from nishang \t12 hours ago \tdb \tRevert \"Diff triggering comment\" \t12 days ago \tdocumentation \tSwitch to Msf::OperatingSystems::Match::WINDOWS \t2 months ago \texternal \tUse PDWORD_PTR and DWORD_PTR \t29 days ago \tfeatures \tUp aruba timeout for simplecov overhead \t4 days ago \tlib \tCheck for load errors in reload_all \t4 days ago \tmodules \tLand #4255 - CVE-2014-6332 Internet Explorer \t19 hours ago \tplugins \tLand #3588, @tobd-r7's Fix SpaceBeforeModifierKeyword Rubocop warning \t4 months ago \tscript \trails generate cucumber:install \t3 months ago \tscripts \tdelete the old script \ta month ago \tspec \tRemove debug file writes \t2 days ago \ttest \tFix up comment splats with the correct URI \ta month ago \ttools \tFix bugs \t24 days ago \t.gitignore \tAdd note about rbenv for rvm .versions.conf local override \t24 days ago \t.gitmodules \tAdd RDI submodule, port Kitrap0d \ta year ago \t.mailmap \tAdd @trosen-r7's alias for commits \t6 months ago \t.rspec \tAdd modern --require to .rspec \t2 months ago \t.rubocop.yml \tReapply PR #4113 (removed via #4175) \t18 days ago \t.ruby-gemset \tRestoring ruby and gemset files \t6 months ago \t.ruby-version \tOh good, another Ruby version bump \t14 days ago \t.simplecov \tRemove fastlib \t2 months ago \t.travis.yml \tEnable fast_finish on travis-ci \t12 days ago \t.yardopts \tVarious merge resolutions from master <- staging \t4 months ago \tCONTRIBUTING.md \tAdd a don't to CONTRIBUTING about merge messages \t11 days ago \tCOPYING \tWith 66 days left in 2014, may as well update \ta month ago \tGemfile \tmetasploit-credential bump to 0.13.3 \t16 days ago \tGemfile.local.example \tVarious merge resolutions from master <- staging \t4 months ago \tGemfile.lock \tBump mdm version number \t12 days ago \tHACKING \tUpdate link for The Metasploit Development Environment \t5 months ago \tLICENSE \tRemove fastlib \t2 months ago \tREADME.md \tEncourage use of the installer for users. \t8 months ago \tRakefile \tMerge branch 'feature\/MSP-11130\/metasploit-framework-spec-constants' … \t24 days ago \tmetasploit-framework-db.gemspec \tmetasploit-credential bump to 0.13.3 \t16 days ago \tmetasploit-framework-full.gemspec \tUpdate metasploit-framework-full.gemspec \t23 days ago \tmetasploit-framework-pcap.gemspec \tDepend on metasloit-framework in optional gemspecs \t24 days ago \tmetasploit-framework.gemspec \tUpdate meterpreter_bins to 0.0.11 \t18 days ago \tmsfbinscan \tRemove fastlib \t2 months ago \tmsfcli \tFix thread-leaks in msfcli spec \t17 days ago \tmsfconsole \t@wvu-r7 is a skilled negotiator. s\/stdout\/stderr\/ \ta month ago \tmsfd \tRemove fastlib \t2 months ago \tmsfelfscan \tRemove fastlib \t2 months ago \tmsfencode \tRemove fastlib \t2 months ago \tmsfmachscan \tRemove fastlib \t2 months ago \tmsfpayload \tfixes merge conflicts msfpayload & exe \ta month ago \tmsfpescan \tRemove fastlib \t2 months ago \tmsfrop \tRemove fastlib \t2 months ago \tmsfrpc \tRemove fastlib \t2 months ago \tmsfrpcd \tRemove call to legacy db.sink queue, closes #4244 \t7 days ago \tmsfupdate \tAlways use maybe_wait_and_exit in msfupdate \ta year ago \tmsfvenom \tFix #4047 - undefined method `rank' due to an invalid encoder name \t19 days ago README.md ",
"fork": false,
"created_at": "2014-11-29T11:01:01Z",
"updated_at": "2023-12-25T17:23:24Z",
"pushed_at": "2020-10-17T18:11:01Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
{
"id": 29238061,
"name": "cve-2014-6332",
"full_name": "tjjh89017\/cve-2014-6332",
"owner": {
"login": "tjjh89017",
"id": 2821179,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2821179?v=4",
"html_url": "https:\/\/github.com\/tjjh89017",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tjjh89017\/cve-2014-6332",
"description": null,
"fork": false,
"created_at": "2015-01-14T09:57:34Z",
"updated_at": "2024-05-08T08:45:51Z",
"pushed_at": "2015-01-17T15:14:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 66863858,
"name": "CVE-2014-6332",
"full_name": "mourr\/CVE-2014-6332",
"owner": {
"login": "mourr",
"id": 15272257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15272257?v=4",
"html_url": "https:\/\/github.com\/mourr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mourr\/CVE-2014-6332",
"description": "CVE-2014-6332 ZeroDay POC - Starts PowerShell",
"fork": false,
"created_at": "2016-08-29T17:13:07Z",
"updated_at": "2024-05-08T08:48:18Z",
"pushed_at": "2016-08-29T21:09:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]