mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
723 lines
No EOL
25 KiB
JSON
723 lines
No EOL
25 KiB
JSON
[
|
|
{
|
|
"id": 88117490,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "ryhanson\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "ryhanson",
|
|
"id": 3486433,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3486433?v=4",
|
|
"html_url": "https:\/\/github.com\/ryhanson",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-04-13T02:41:36Z",
|
|
"updated_at": "2017-04-13T02:41:36Z",
|
|
"pushed_at": "2017-04-13T02:41:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 88185964,
|
|
"name": "cve-2017-0199",
|
|
"full_name": "SyFi\/cve-2017-0199",
|
|
"owner": {
|
|
"login": "SyFi",
|
|
"id": 26314806,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4",
|
|
"html_url": "https:\/\/github.com\/SyFi",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SyFi\/cve-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-04-13T16:40:27Z",
|
|
"updated_at": "2024-08-12T19:29:04Z",
|
|
"pushed_at": "2017-04-13T16:45:10Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"has_discussions": false,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 12,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 88486475,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "bhdresh\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "bhdresh",
|
|
"id": 8931885,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
|
|
"html_url": "https:\/\/github.com\/bhdresh",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-0199",
|
|
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
|
"fork": false,
|
|
"created_at": "2017-04-17T08:10:07Z",
|
|
"updated_at": "2024-12-22T01:34:08Z",
|
|
"pushed_at": "2017-11-19T11:01:16Z",
|
|
"stargazers_count": 725,
|
|
"watchers_count": 725,
|
|
"has_discussions": false,
|
|
"forks_count": 260,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 260,
|
|
"watchers": 725,
|
|
"score": 0,
|
|
"subscribers_count": 46
|
|
},
|
|
{
|
|
"id": 88590374,
|
|
"name": "CVE-2017-0199-Fix",
|
|
"full_name": "NotAwful\/CVE-2017-0199-Fix",
|
|
"owner": {
|
|
"login": "NotAwful",
|
|
"id": 25178947,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25178947?v=4",
|
|
"html_url": "https:\/\/github.com\/NotAwful",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix",
|
|
"description": "Quick and dirty fix to OLE2 executing code via .hta",
|
|
"fork": false,
|
|
"created_at": "2017-04-18T06:33:45Z",
|
|
"updated_at": "2023-06-16T16:11:28Z",
|
|
"pushed_at": "2017-04-24T20:48:36Z",
|
|
"stargazers_count": 14,
|
|
"watchers_count": 14,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2017-0199",
|
|
"guide",
|
|
"registry",
|
|
"windows"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 14,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 88700030,
|
|
"name": "CVE-2017-0199-master",
|
|
"full_name": "haibara3839\/CVE-2017-0199-master",
|
|
"owner": {
|
|
"login": "haibara3839",
|
|
"id": 17246565,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17246565?v=4",
|
|
"html_url": "https:\/\/github.com\/haibara3839",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master",
|
|
"description": "CVE-2017-0199",
|
|
"fork": false,
|
|
"created_at": "2017-04-19T04:15:54Z",
|
|
"updated_at": "2020-08-13T13:59:18Z",
|
|
"pushed_at": "2017-04-19T04:25:47Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"has_discussions": false,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 16,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 89043209,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "Exploit-install\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "Exploit-install",
|
|
"id": 13824191,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13824191?v=4",
|
|
"html_url": "https:\/\/github.com\/Exploit-install",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Exploit-install\/CVE-2017-0199",
|
|
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.",
|
|
"fork": false,
|
|
"created_at": "2017-04-22T04:01:38Z",
|
|
"updated_at": "2024-08-12T19:29:17Z",
|
|
"pushed_at": "2017-04-22T04:01:54Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 9,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 9,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 89065031,
|
|
"name": "PoC-CVE-2017-0199",
|
|
"full_name": "mzakyz666\/PoC-CVE-2017-0199",
|
|
"owner": {
|
|
"login": "mzakyz666",
|
|
"id": 22362343,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22362343?v=4",
|
|
"html_url": "https:\/\/github.com\/mzakyz666",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mzakyz666\/PoC-CVE-2017-0199",
|
|
"description": "Exploit toolkit for vulnerability RCE Microsoft RTF",
|
|
"fork": false,
|
|
"created_at": "2017-04-22T11:32:39Z",
|
|
"updated_at": "2024-11-10T18:46:28Z",
|
|
"pushed_at": "2017-04-22T11:35:38Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 89145802,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "n1shant-sinha\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "n1shant-sinha",
|
|
"id": 8848453,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8848453?v=4",
|
|
"html_url": "https:\/\/github.com\/n1shant-sinha",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199",
|
|
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration.",
|
|
"fork": false,
|
|
"created_at": "2017-04-23T13:58:30Z",
|
|
"updated_at": "2024-08-12T19:29:19Z",
|
|
"pushed_at": "2017-04-23T14:05:24Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 89296859,
|
|
"name": "htattack",
|
|
"full_name": "kn0wm4d\/htattack",
|
|
"owner": {
|
|
"login": "kn0wm4d",
|
|
"id": 15344287,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15344287?v=4",
|
|
"html_url": "https:\/\/github.com\/kn0wm4d",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kn0wm4d\/htattack",
|
|
"description": "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)",
|
|
"fork": false,
|
|
"created_at": "2017-04-24T23:44:31Z",
|
|
"updated_at": "2025-01-06T16:15:26Z",
|
|
"pushed_at": "2017-04-24T23:45:18Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 89314149,
|
|
"name": "Cve-2017-0199",
|
|
"full_name": "joke998\/Cve-2017-0199",
|
|
"owner": {
|
|
"login": "joke998",
|
|
"id": 25948923,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25948923?v=4",
|
|
"html_url": "https:\/\/github.com\/joke998",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-04-25T03:38:15Z",
|
|
"updated_at": "2017-04-25T03:38:15Z",
|
|
"pushed_at": "2017-04-25T03:38:15Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 89314954,
|
|
"name": "Cve-2017-0199-",
|
|
"full_name": "joke998\/Cve-2017-0199-",
|
|
"owner": {
|
|
"login": "joke998",
|
|
"id": 25948923,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25948923?v=4",
|
|
"html_url": "https:\/\/github.com\/joke998",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199-",
|
|
"description": "Cve-2017-0199",
|
|
"fork": false,
|
|
"created_at": "2017-04-25T03:48:53Z",
|
|
"updated_at": "2017-04-25T03:48:53Z",
|
|
"pushed_at": "2017-04-25T03:48:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 95870771,
|
|
"name": "Microsoft-Word-CVE-2017-0199-",
|
|
"full_name": "sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
|
|
"owner": {
|
|
"login": "sUbc0ol",
|
|
"id": 24601456,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4",
|
|
"html_url": "https:\/\/github.com\/sUbc0ol",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sUbc0ol\/Microsoft-Word-CVE-2017-0199-",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-06-30T09:08:40Z",
|
|
"updated_at": "2024-08-12T19:30:58Z",
|
|
"pushed_at": "2017-06-30T09:11:27Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 104072875,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "viethdgit\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "viethdgit",
|
|
"id": 24888568,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24888568?v=4",
|
|
"html_url": "https:\/\/github.com\/viethdgit",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-09-19T12:38:47Z",
|
|
"updated_at": "2017-09-19T12:38:47Z",
|
|
"pushed_at": "2017-09-19T12:47:49Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 109420190,
|
|
"name": "RTF-Cleaner",
|
|
"full_name": "nicpenning\/RTF-Cleaner",
|
|
"owner": {
|
|
"login": "nicpenning",
|
|
"id": 5582679,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582679?v=4",
|
|
"html_url": "https:\/\/github.com\/nicpenning",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner",
|
|
"description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.",
|
|
"fork": false,
|
|
"created_at": "2017-11-03T16:47:16Z",
|
|
"updated_at": "2019-06-29T16:49:45Z",
|
|
"pushed_at": "2017-11-03T20:55:20Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 111145351,
|
|
"name": "2017-11-17-Maldoc-Using-CVE-2017-0199",
|
|
"full_name": "herbiezimmerman\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
|
"owner": {
|
|
"login": "herbiezimmerman",
|
|
"id": 12056770,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4",
|
|
"html_url": "https:\/\/github.com\/herbiezimmerman",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/herbiezimmerman\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-11-17T20:00:29Z",
|
|
"updated_at": "2024-08-12T19:34:09Z",
|
|
"pushed_at": "2017-11-17T20:00:42Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve2017-0199",
|
|
"malware-sample"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 113558617,
|
|
"name": "RTF-Cleaner",
|
|
"full_name": "jacobsoo\/RTF-Cleaner",
|
|
"owner": {
|
|
"login": "jacobsoo",
|
|
"id": 3516693,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3516693?v=4",
|
|
"html_url": "https:\/\/github.com\/jacobsoo",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner",
|
|
"description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-12-08T09:45:25Z",
|
|
"updated_at": "2022-06-23T11:59:37Z",
|
|
"pushed_at": "2017-12-08T09:46:07Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 126305253,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "likekabin\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "likekabin",
|
|
"id": 2469038,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
|
"html_url": "https:\/\/github.com\/likekabin",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/likekabin\/CVE-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-03-22T08:40:55Z",
|
|
"updated_at": "2018-03-22T08:41:14Z",
|
|
"pushed_at": "2018-03-22T08:41:11Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 305189722,
|
|
"name": "CVE-2017-0199-PY-KIT",
|
|
"full_name": "stealth-ronin\/CVE-2017-0199-PY-KIT",
|
|
"owner": {
|
|
"login": "stealth-ronin",
|
|
"id": 65579305,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65579305?v=4",
|
|
"html_url": "https:\/\/github.com\/stealth-ronin",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/stealth-ronin\/CVE-2017-0199-PY-KIT",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-10-18T20:24:38Z",
|
|
"updated_at": "2020-10-18T20:25:13Z",
|
|
"pushed_at": "2020-10-18T20:25:11Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 483583125,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "Phantomlancer123\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "Phantomlancer123",
|
|
"id": 102849364,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102849364?v=4",
|
|
"html_url": "https:\/\/github.com\/Phantomlancer123",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Phantomlancer123\/CVE-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-04-20T09:07:52Z",
|
|
"updated_at": "2022-04-20T10:30:42Z",
|
|
"pushed_at": "2022-04-20T09:09:01Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": true,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 484544802,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "BRAINIAC22\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "BRAINIAC22",
|
|
"id": 89447379,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89447379?v=4",
|
|
"html_url": "https:\/\/github.com\/BRAINIAC22",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BRAINIAC22\/CVE-2017-0199",
|
|
"description": "A python script\/generator, for generating and exploiting Microsoft vulnerability",
|
|
"fork": false,
|
|
"created_at": "2022-04-22T19:10:16Z",
|
|
"updated_at": "2022-04-22T19:14:36Z",
|
|
"pushed_at": "2022-04-22T19:14:33Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 524890302,
|
|
"name": "CVE-2017-0199-reprofuction",
|
|
"full_name": "Sunqiz\/CVE-2017-0199-reprofuction",
|
|
"owner": {
|
|
"login": "Sunqiz",
|
|
"id": 59192636,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4",
|
|
"html_url": "https:\/\/github.com\/Sunqiz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Sunqiz\/CVE-2017-0199-reprofuction",
|
|
"description": "CVE-2017-0199复现",
|
|
"fork": false,
|
|
"created_at": "2022-08-15T07:15:55Z",
|
|
"updated_at": "2024-08-12T20:26:13Z",
|
|
"pushed_at": "2022-08-19T02:09:03Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 686431739,
|
|
"name": "CVE-2017-0199-v5.0",
|
|
"full_name": "TheCyberWatchers\/CVE-2017-0199-v5.0",
|
|
"owner": {
|
|
"login": "TheCyberWatchers",
|
|
"id": 110695357,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110695357?v=4",
|
|
"html_url": "https:\/\/github.com\/TheCyberWatchers",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TheCyberWatchers\/CVE-2017-0199-v5.0",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-09-02T19:15:12Z",
|
|
"updated_at": "2023-09-02T19:17:12Z",
|
|
"pushed_at": "2023-09-02T19:40:57Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 855196797,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "kash-123\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "kash-123",
|
|
"id": 66589525,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66589525?v=4",
|
|
"html_url": "https:\/\/github.com\/kash-123",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kash-123\/CVE-2017-0199",
|
|
"description": "Python3 toolkit update",
|
|
"fork": false,
|
|
"created_at": "2024-09-10T13:31:55Z",
|
|
"updated_at": "2024-09-10T13:40:42Z",
|
|
"pushed_at": "2024-09-10T13:37:40Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |