PoC-in-GitHub/2017/CVE-2017-9805.json
2024-11-29 03:31:51 +09:00

507 lines
No EOL
17 KiB
JSON
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 102583828,
"name": "struts-rce-cve-2017-9805",
"full_name": "luc10\/struts-rce-cve-2017-9805",
"owner": {
"login": "luc10",
"id": 7849730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7849730?v=4",
"html_url": "https:\/\/github.com\/luc10",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/luc10\/struts-rce-cve-2017-9805",
"description": "CVE 2017-9805",
"fork": false,
"created_at": "2017-09-06T08:32:01Z",
"updated_at": "2024-08-12T19:32:25Z",
"pushed_at": "2020-08-31T04:34:29Z",
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 59,
"score": 0,
"subscribers_count": 5
},
{
"id": 102714061,
"name": "struts2-rce-cve-2017-9805-ruby",
"full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby",
"owner": {
"login": "hahwul",
"id": 13212227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13212227?v=4",
"html_url": "https:\/\/github.com\/hahwul",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby",
"description": "cve -2017-9805",
"fork": false,
"created_at": "2017-09-07T08:49:14Z",
"updated_at": "2024-01-11T07:41:07Z",
"pushed_at": "2017-09-07T08:55:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve--2017-9805"
],
"visibility": "public",
"forks": 5,
"watchers": 3,
"score": 0,
"subscribers_count": 3
},
{
"id": 102917821,
"name": "struts-pwn_CVE-2017-9805",
"full_name": "mazen160\/struts-pwn_CVE-2017-9805",
"owner": {
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2024-10-16T07:20:46Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 249,
"watchers_count": 249,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"struts-pwn"
],
"visibility": "public",
"forks": 69,
"watchers": 249,
"score": 0,
"subscribers_count": 17
},
{
"id": 103005989,
"name": "apache-struts-pwn_CVE-2017-9805",
"full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"owner": {
"login": "Lone-Ranger",
"id": 15882470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15882470?v=4",
"html_url": "https:\/\/github.com\/Lone-Ranger",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-10T05:26:03Z",
"updated_at": "2024-08-12T19:32:30Z",
"pushed_at": "2017-09-10T05:28:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 5,
"score": 0,
"subscribers_count": 3
},
{
"id": 111928630,
"name": "-CVE-2017-9805",
"full_name": "0x00-0x00\/-CVE-2017-9805",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/-CVE-2017-9805",
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)",
"fork": false,
"created_at": "2017-11-24T14:46:35Z",
"updated_at": "2024-08-12T19:34:18Z",
"pushed_at": "2020-11-26T18:35:29Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"exploit",
"struts"
],
"visibility": "public",
"forks": 12,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},
{
"id": 112276528,
"name": "S2-052",
"full_name": "BeyondCy\/S2-052",
"owner": {
"login": "BeyondCy",
"id": 4694785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4694785?v=4",
"html_url": "https:\/\/github.com\/BeyondCy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BeyondCy\/S2-052",
"description": "CVE-2017-9805 - Exploit",
"fork": false,
"created_at": "2017-11-28T02:46:07Z",
"updated_at": "2020-11-24T14:16:12Z",
"pushed_at": "2017-10-20T21:04:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 113078841,
"name": "cve-2017-9805.py",
"full_name": "chrisjd20\/cve-2017-9805.py",
"owner": {
"login": "chrisjd20",
"id": 11812223,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11812223?v=4",
"html_url": "https:\/\/github.com\/chrisjd20",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/chrisjd20\/cve-2017-9805.py",
"description": "Better Exploit Code For CVE 2017 9805 apache struts",
"fork": false,
"created_at": "2017-12-04T18:23:53Z",
"updated_at": "2024-08-12T19:34:32Z",
"pushed_at": "2017-12-23T14:07:59Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 21,
"score": 0,
"subscribers_count": 3
},
{
"id": 205600969,
"name": "struts_rest_rce_fuzz-CVE-2017-9805-",
"full_name": "UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-",
"owner": {
"login": "UbuntuStrike",
"id": 30779753,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30779753?v=4",
"html_url": "https:\/\/github.com\/UbuntuStrike",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-",
"description": "Simple python script to fuzz site for CVE-2017-9805",
"fork": false,
"created_at": "2019-08-31T22:06:31Z",
"updated_at": "2019-08-31T23:36:02Z",
"pushed_at": "2019-08-31T23:36:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 205945238,
"name": "CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"full_name": "UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"owner": {
"login": "UbuntuStrike",
"id": 30779753,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30779753?v=4",
"html_url": "https:\/\/github.com\/UbuntuStrike",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"description": "A script to Fuzz and and exploit Apache struts CVE-2017-9805",
"fork": false,
"created_at": "2019-09-02T22:24:07Z",
"updated_at": "2020-06-18T02:43:56Z",
"pushed_at": "2019-09-02T22:36:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 263410855,
"name": "CVE-2017-9805---Documentation---IT19143378",
"full_name": "AvishkaSenadheera\/CVE-2017-9805---Documentation---IT19143378",
"owner": {
"login": "AvishkaSenadheera",
"id": 48066295,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48066295?v=4",
"html_url": "https:\/\/github.com\/AvishkaSenadheera",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AvishkaSenadheera\/CVE-2017-9805---Documentation---IT19143378",
"description": null,
"fork": false,
"created_at": "2020-05-12T17:53:57Z",
"updated_at": "2020-05-12T18:15:38Z",
"pushed_at": "2020-05-12T18:15:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 271482237,
"name": "CVE-2017-9805-Exploit",
"full_name": "wifido\/CVE-2017-9805-Exploit",
"owner": {
"login": "wifido",
"id": 16313853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16313853?v=4",
"html_url": "https:\/\/github.com\/wifido",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wifido\/CVE-2017-9805-Exploit",
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
"fork": false,
"created_at": "2020-06-11T07:36:56Z",
"updated_at": "2021-04-04T04:33:56Z",
"pushed_at": "2020-05-17T13:37:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 312564506,
"name": "apache-struts-cve-2017-9805",
"full_name": "rvermeulen\/apache-struts-cve-2017-9805",
"owner": {
"login": "rvermeulen",
"id": 636626,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/636626?v=4",
"html_url": "https:\/\/github.com\/rvermeulen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rvermeulen\/apache-struts-cve-2017-9805",
"description": null,
"fork": false,
"created_at": "2020-11-13T12:04:32Z",
"updated_at": "2020-11-13T12:12:37Z",
"pushed_at": "2020-11-13T12:07:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 316623697,
"name": "-CVE-2017-9805-",
"full_name": "jongmartinez\/-CVE-2017-9805-",
"owner": {
"login": "jongmartinez",
"id": 11743460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11743460?v=4",
"html_url": "https:\/\/github.com\/jongmartinez",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jongmartinez\/-CVE-2017-9805-",
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805) ",
"fork": false,
"created_at": "2020-11-28T00:00:37Z",
"updated_at": "2022-06-16T02:49:48Z",
"pushed_at": "2020-11-28T00:34:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 344944105,
"name": "CVE-2017-9805",
"full_name": "z3bd\/CVE-2017-9805",
"owner": {
"login": "z3bd",
"id": 79710562,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79710562?v=4",
"html_url": "https:\/\/github.com\/z3bd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3bd\/CVE-2017-9805",
"description": "struts2-rest-showcase 2.5.10",
"fork": false,
"created_at": "2021-03-05T21:57:11Z",
"updated_at": "2021-03-05T23:26:32Z",
"pushed_at": "2021-03-05T23:26:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 354456108,
"name": "CVE-2017-9805-Exploit",
"full_name": "0xd3vil\/CVE-2017-9805-Exploit",
"owner": {
"login": "0xd3vil",
"id": 32324065,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32324065?v=4",
"html_url": "https:\/\/github.com\/0xd3vil",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xd3vil\/CVE-2017-9805-Exploit",
"description": "CVE-2017-9805-Exploit",
"fork": false,
"created_at": "2021-04-04T04:35:19Z",
"updated_at": "2024-08-12T20:11:49Z",
"pushed_at": "2021-04-04T04:35:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 544634552,
"name": "CVE-2017-9805",
"full_name": "Shakun8\/CVE-2017-9805",
"owner": {
"login": "Shakun8",
"id": 87657631,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87657631?v=4",
"html_url": "https:\/\/github.com\/Shakun8",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Shakun8\/CVE-2017-9805",
"description": "CVE-2017-9805 POC",
"fork": false,
"created_at": "2022-10-03T00:15:31Z",
"updated_at": "2023-03-22T17:11:56Z",
"pushed_at": "2022-10-03T00:16:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}
]