mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
436 lines
No EOL
15 KiB
JSON
436 lines
No EOL
15 KiB
JSON
[
|
|
{
|
|
"id": 97701175,
|
|
"name": "CVE-2017-7529",
|
|
"full_name": "liusec\/CVE-2017-7529",
|
|
"owner": {
|
|
"login": "liusec",
|
|
"id": 13982415,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13982415?v=4",
|
|
"html_url": "https:\/\/github.com\/liusec",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/liusec\/CVE-2017-7529",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-07-19T09:55:42Z",
|
|
"updated_at": "2023-05-22T02:09:11Z",
|
|
"pushed_at": "2017-07-21T06:29:35Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"has_discussions": false,
|
|
"forks_count": 8,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 8,
|
|
"watchers": 16,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 138050203,
|
|
"name": "CVE-2017-7529_PoC",
|
|
"full_name": "en0f\/CVE-2017-7529_PoC",
|
|
"owner": {
|
|
"login": "en0f",
|
|
"id": 5394464,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5394464?v=4",
|
|
"html_url": "https:\/\/github.com\/en0f",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/en0f\/CVE-2017-7529_PoC",
|
|
"description": "CVE-2017-7529_PoC",
|
|
"fork": false,
|
|
"created_at": "2018-06-20T15:16:10Z",
|
|
"updated_at": "2024-01-10T08:39:38Z",
|
|
"pushed_at": "2018-06-20T15:16:39Z",
|
|
"stargazers_count": 18,
|
|
"watchers_count": 18,
|
|
"has_discussions": false,
|
|
"forks_count": 26,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 26,
|
|
"watchers": 18,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 166269997,
|
|
"name": "cve-2017-7529",
|
|
"full_name": "cved-sources\/cve-2017-7529",
|
|
"owner": {
|
|
"login": "cved-sources",
|
|
"id": 46423677,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
|
|
"html_url": "https:\/\/github.com\/cved-sources",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-7529",
|
|
"description": "cve-2017-7529",
|
|
"fork": false,
|
|
"created_at": "2019-01-17T17:47:34Z",
|
|
"updated_at": "2021-04-15T21:27:29Z",
|
|
"pushed_at": "2021-04-15T21:27:27Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 190598569,
|
|
"name": "CVE-2017-7529-POC",
|
|
"full_name": "MaxSecurity\/CVE-2017-7529-POC",
|
|
"owner": {
|
|
"login": "MaxSecurity",
|
|
"id": 16812469,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16812469?v=4",
|
|
"html_url": "https:\/\/github.com\/MaxSecurity",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MaxSecurity\/CVE-2017-7529-POC",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-06-06T14:47:17Z",
|
|
"updated_at": "2023-07-13T10:42:57Z",
|
|
"pushed_at": "2019-06-06T14:53:51Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 272001877,
|
|
"name": "CVE-2017-7529",
|
|
"full_name": "cyberk1w1\/CVE-2017-7529",
|
|
"owner": {
|
|
"login": "cyberk1w1",
|
|
"id": 66871294,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66871294?v=4",
|
|
"html_url": "https:\/\/github.com\/cyberk1w1",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cyberk1w1\/CVE-2017-7529",
|
|
"description": "Exploit for NGiX 1.6.2 Remote Integer Overflow Vulnerability CVE-2017-7529",
|
|
"fork": false,
|
|
"created_at": "2020-06-13T12:11:19Z",
|
|
"updated_at": "2020-06-18T06:46:05Z",
|
|
"pushed_at": "2020-06-18T06:46:03Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 274587350,
|
|
"name": "nginx-CVE-2017-7529",
|
|
"full_name": "cyberharsh\/nginx-CVE-2017-7529",
|
|
"owner": {
|
|
"login": "cyberharsh",
|
|
"id": 57433814,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57433814?v=4",
|
|
"html_url": "https:\/\/github.com\/cyberharsh",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cyberharsh\/nginx-CVE-2017-7529",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-06-24T05:57:33Z",
|
|
"updated_at": "2021-01-16T15:52:15Z",
|
|
"pushed_at": "2020-07-02T08:48:49Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 295851673,
|
|
"name": "nginx-overflow",
|
|
"full_name": "daehee\/nginx-overflow",
|
|
"owner": {
|
|
"login": "daehee",
|
|
"id": 81271,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81271?v=4",
|
|
"html_url": "https:\/\/github.com\/daehee",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/daehee\/nginx-overflow",
|
|
"description": "Scans for nginx integer overflow vulnerability (CVE-2017-7529)",
|
|
"fork": false,
|
|
"created_at": "2020-09-15T21:19:17Z",
|
|
"updated_at": "2020-09-16T17:44:12Z",
|
|
"pushed_at": "2020-09-16T17:44:10Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 330894535,
|
|
"name": "exploit-nginx-1.10.3",
|
|
"full_name": "gemboxteam\/exploit-nginx-1.10.3",
|
|
"owner": {
|
|
"login": "gemboxteam",
|
|
"id": 27276452,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27276452?v=4",
|
|
"html_url": "https:\/\/github.com\/gemboxteam",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/gemboxteam\/exploit-nginx-1.10.3",
|
|
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
|
|
"fork": false,
|
|
"created_at": "2021-01-19T07:12:10Z",
|
|
"updated_at": "2024-12-01T16:42:12Z",
|
|
"pushed_at": "2021-01-19T07:17:52Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 13,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 13,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 331347189,
|
|
"name": "Remote-Integer-Overflow-Vulnerability",
|
|
"full_name": "fardeen-ahmed\/Remote-Integer-Overflow-Vulnerability",
|
|
"owner": {
|
|
"login": "fardeen-ahmed",
|
|
"id": 47289822,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47289822?v=4",
|
|
"html_url": "https:\/\/github.com\/fardeen-ahmed",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fardeen-ahmed\/Remote-Integer-Overflow-Vulnerability",
|
|
"description": "Added Vulnerability Code in Python for Nginx Vulnerability (CVE-2017-7529)",
|
|
"fork": false,
|
|
"created_at": "2021-01-20T15:24:10Z",
|
|
"updated_at": "2021-06-07T10:52:03Z",
|
|
"pushed_at": "2021-06-07T10:52:01Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 353402530,
|
|
"name": "Nginx-Remote-Integer-Overflow-Vulnerability",
|
|
"full_name": "mo3zj\/Nginx-Remote-Integer-Overflow-Vulnerability",
|
|
"owner": {
|
|
"login": "mo3zj",
|
|
"id": 38070226,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38070226?v=4",
|
|
"html_url": "https:\/\/github.com\/mo3zj",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mo3zj\/Nginx-Remote-Integer-Overflow-Vulnerability",
|
|
"description": "CVE-2017-7529",
|
|
"fork": false,
|
|
"created_at": "2021-03-31T15:24:07Z",
|
|
"updated_at": "2022-09-05T13:57:33Z",
|
|
"pushed_at": "2021-03-31T15:27:36Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 402153068,
|
|
"name": "CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit",
|
|
"full_name": "fu2x2000\/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit",
|
|
"owner": {
|
|
"login": "fu2x2000",
|
|
"id": 34998869,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34998869?v=4",
|
|
"html_url": "https:\/\/github.com\/fu2x2000",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fu2x2000\/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-09-01T17:49:11Z",
|
|
"updated_at": "2021-09-01T17:49:46Z",
|
|
"pushed_at": "2021-09-01T17:49:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 515043572,
|
|
"name": "CVE-2017-7529",
|
|
"full_name": "Shehzadcyber\/CVE-2017-7529",
|
|
"owner": {
|
|
"login": "Shehzadcyber",
|
|
"id": 65858237,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65858237?v=4",
|
|
"html_url": "https:\/\/github.com\/Shehzadcyber",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Shehzadcyber\/CVE-2017-7529",
|
|
"description": "Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.",
|
|
"fork": false,
|
|
"created_at": "2022-07-18T05:14:55Z",
|
|
"updated_at": "2024-10-11T15:37:36Z",
|
|
"pushed_at": "2022-07-18T05:36:33Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 733323140,
|
|
"name": "-Exploit-CVE-2017-7529",
|
|
"full_name": "coolman6942o\/-Exploit-CVE-2017-7529",
|
|
"owner": {
|
|
"login": "coolman6942o",
|
|
"id": 76984265,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76984265?v=4",
|
|
"html_url": "https:\/\/github.com\/coolman6942o",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/coolman6942o\/-Exploit-CVE-2017-7529",
|
|
"description": "CVE-2017-7529: Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. ",
|
|
"fork": false,
|
|
"created_at": "2023-12-19T04:21:18Z",
|
|
"updated_at": "2023-12-19T04:25:47Z",
|
|
"pushed_at": "2023-12-19T04:32:36Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 791854049,
|
|
"name": "CVE-2017-7529",
|
|
"full_name": "SirEagIe\/CVE-2017-7529",
|
|
"owner": {
|
|
"login": "SirEagIe",
|
|
"id": 57668483,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57668483?v=4",
|
|
"html_url": "https:\/\/github.com\/SirEagIe",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SirEagIe\/CVE-2017-7529",
|
|
"description": "Nginx (ver. 0.5.6 - 1.13.2) Remote Integer Overflow",
|
|
"fork": false,
|
|
"created_at": "2024-04-25T13:56:31Z",
|
|
"updated_at": "2024-06-26T08:11:54Z",
|
|
"pushed_at": "2024-04-25T14:04:42Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |