PoC-in-GitHub/2018/CVE-2018-20250.json
2025-01-12 15:31:49 +09:00

599 lines
No EOL
21 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 171996551,
"name": "CVE-2018-20250",
"full_name": "WyAtu\/CVE-2018-20250",
"owner": {
"login": "WyAtu",
"id": 23521935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23521935?v=4",
"html_url": "https:\/\/github.com\/WyAtu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-20250",
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2024-12-03T10:19:33Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 488,
"watchers_count": 488,
"has_discussions": false,
"forks_count": 177,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 177,
"watchers": 488,
"score": 0,
"subscribers_count": 10
},
{
"id": 172009558,
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team\/CVE-2018-20250",
"owner": {
"login": "QAX-A-Team",
"id": 35417332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4",
"html_url": "https:\/\/github.com\/QAX-A-Team",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250",
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
"fork": false,
"created_at": "2019-02-22T06:47:01Z",
"updated_at": "2021-05-29T18:38:32Z",
"pushed_at": "2019-02-22T07:47:26Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 25,
"score": 0,
"subscribers_count": 2
},
{
"id": 172069488,
"name": "CVE-2018-20250-poc-winrar",
"full_name": "nmweizi\/CVE-2018-20250-poc-winrar",
"owner": {
"login": "nmweizi",
"id": 1232444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1232444?v=4",
"html_url": "https:\/\/github.com\/nmweizi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar",
"description": null,
"fork": false,
"created_at": "2019-02-22T13:18:14Z",
"updated_at": "2019-02-22T13:20:31Z",
"pushed_at": "2019-02-22T13:20:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 172078598,
"name": "UNACEV2.DLL-CVE-2018-20250",
"full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250",
"owner": {
"login": "blunden",
"id": 249915,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249915?v=4",
"html_url": "https:\/\/github.com\/blunden",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250",
"description": "A version of the binary patched to address CVE-2018-20250",
"fork": false,
"created_at": "2019-02-22T14:19:20Z",
"updated_at": "2019-02-22T14:29:30Z",
"pushed_at": "2019-02-22T14:29:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 172156568,
"name": "CVE-2018-20250-WinRAR-ACE",
"full_name": "easis\/CVE-2018-20250-WinRAR-ACE",
"owner": {
"login": "easis",
"id": 50383201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50383201?v=4",
"html_url": "https:\/\/github.com\/easis",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE",
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
"fork": false,
"created_at": "2019-02-23T01:20:34Z",
"updated_at": "2024-10-24T14:43:31Z",
"pushed_at": "2019-03-01T13:35:59Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 21,
"score": 0,
"subscribers_count": 6
},
{
"id": 173153306,
"name": "CVE-2018-20250",
"full_name": "STP5940\/CVE-2018-20250",
"owner": {
"login": "STP5940",
"id": 21144303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21144303?v=4",
"html_url": "https:\/\/github.com\/STP5940",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/STP5940\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-02-28T17:07:52Z",
"updated_at": "2024-08-12T19:46:13Z",
"pushed_at": "2019-02-28T17:10:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 173733367,
"name": "hack-winrar",
"full_name": "technicaldada\/hack-winrar",
"owner": {
"login": "technicaldada",
"id": 32122182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32122182?v=4",
"html_url": "https:\/\/github.com\/technicaldada",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/technicaldada\/hack-winrar",
"description": "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]",
"fork": false,
"created_at": "2019-03-04T11:36:43Z",
"updated_at": "2023-01-02T23:04:53Z",
"pushed_at": "2019-03-04T11:39:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"absolute-path-traversal-bug",
"bug",
"hack",
"windows",
"winrar"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 173947919,
"name": "ezwinrar",
"full_name": "Ektoplasma\/ezwinrar",
"owner": {
"login": "Ektoplasma",
"id": 15208659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15208659?v=4",
"html_url": "https:\/\/github.com\/Ektoplasma",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ektoplasma\/ezwinrar",
"description": "Python tool exploiting CVE-2018-20250 found by CheckPoint folks",
"fork": false,
"created_at": "2019-03-05T13:05:03Z",
"updated_at": "2023-03-14T14:38:11Z",
"pushed_at": "2019-03-05T15:51:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 174533873,
"name": "CVE-2018-20250-WINRAR-ACE-GUI",
"full_name": "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
"owner": {
"login": "arkangel-dev",
"id": 31138457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31138457?v=4",
"html_url": "https:\/\/github.com\/arkangel-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
"description": "CVE-2018-20250-WINRAR-ACE Exploit with a UI",
"fork": false,
"created_at": "2019-03-08T12:27:12Z",
"updated_at": "2024-08-29T01:22:26Z",
"pushed_at": "2019-05-10T05:37:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 3
},
{
"id": 174948316,
"name": "CVE-2018-20250",
"full_name": "AeolusTF\/CVE-2018-20250",
"owner": {
"login": "AeolusTF",
"id": 29159416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29159416?v=4",
"html_url": "https:\/\/github.com\/AeolusTF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AeolusTF\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-03-11T07:33:45Z",
"updated_at": "2019-03-11T07:37:51Z",
"pushed_at": "2019-03-11T07:37:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 176534636,
"name": "Detect-CVE-2018-20250",
"full_name": "joydragon\/Detect-CVE-2018-20250",
"owner": {
"login": "joydragon",
"id": 4154219,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4154219?v=4",
"html_url": "https:\/\/github.com\/joydragon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250",
"description": "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250",
"fork": false,
"created_at": "2019-03-19T14:51:52Z",
"updated_at": "2019-03-19T15:03:27Z",
"pushed_at": "2019-03-19T15:03:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 183341455,
"name": "CVE-2018-20250",
"full_name": "likekabin\/CVE-2018-20250",
"owner": {
"login": "likekabin",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likekabin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/likekabin\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-04-25T02:30:50Z",
"updated_at": "2019-04-25T02:31:01Z",
"pushed_at": "2019-04-25T02:30:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 187096096,
"name": "WinRar_ACE_exploit_CVE-2018-20250",
"full_name": "H4xl0r\/WinRar_ACE_exploit_CVE-2018-20250",
"owner": {
"login": "H4xl0r",
"id": 31049432,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31049432?v=4",
"html_url": "https:\/\/github.com\/H4xl0r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/H4xl0r\/WinRar_ACE_exploit_CVE-2018-20250",
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
"fork": false,
"created_at": "2019-05-16T20:21:50Z",
"updated_at": "2019-05-16T20:21:53Z",
"pushed_at": "2019-03-26T04:54:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 241136874,
"name": "CVE-2018-20250-WinRAR",
"full_name": "eastmountyxz\/CVE-2018-20250-WinRAR",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53172375?v=4",
"html_url": "https:\/\/github.com\/eastmountyxz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR",
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601结合相关资源及文章实现。推荐大家结合作者博客复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者自己确实很菜但希望坚持下去一起加油",
"fork": false,
"created_at": "2020-02-17T15:08:22Z",
"updated_at": "2024-08-12T19:57:49Z",
"pushed_at": "2020-05-19T07:55:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 263515438,
"name": "cve-2018-20250",
"full_name": "lxg5763\/cve-2018-20250",
"owner": {
"login": "lxg5763",
"id": 36142720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36142720?v=4",
"html_url": "https:\/\/github.com\/lxg5763",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lxg5763\/cve-2018-20250",
"description": "CVE-2018-20250漏洞利用",
"fork": false,
"created_at": "2020-05-13T03:28:04Z",
"updated_at": "2020-05-13T03:28:16Z",
"pushed_at": "2020-05-13T03:28:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 391782512,
"name": "CVE-2018-20250",
"full_name": "zeronohacker\/CVE-2018-20250",
"owner": {
"login": "zeronohacker",
"id": 65578786,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65578786?v=4",
"html_url": "https:\/\/github.com\/zeronohacker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zeronohacker\/CVE-2018-20250",
"description": "CVE-2018-20250",
"fork": false,
"created_at": "2021-08-02T01:24:01Z",
"updated_at": "2021-08-03T01:57:08Z",
"pushed_at": "2021-08-03T01:54:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2018-20250"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 474011573,
"name": "CVE-2018-20250",
"full_name": "tzwlhack\/CVE-2018-20250",
"owner": {
"login": "tzwlhack",
"id": 86322859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86322859?v=4",
"html_url": "https:\/\/github.com\/tzwlhack",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tzwlhack\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2022-03-25T13:02:41Z",
"updated_at": "2022-03-25T13:02:53Z",
"pushed_at": "2022-03-25T13:02:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 735884488,
"name": "CVE-2018-20250",
"full_name": "tannlh\/CVE-2018-20250",
"owner": {
"login": "tannlh",
"id": 129723015,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129723015?v=4",
"html_url": "https:\/\/github.com\/tannlh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tannlh\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2023-12-26T11:01:32Z",
"updated_at": "2023-12-26T11:45:04Z",
"pushed_at": "2023-12-26T11:45:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 792099382,
"name": "CVE-2018-20250",
"full_name": "LamSonBinh\/CVE-2018-20250",
"owner": {
"login": "LamSonBinh",
"id": 94208851,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94208851?v=4",
"html_url": "https:\/\/github.com\/LamSonBinh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LamSonBinh\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2024-04-26T01:18:45Z",
"updated_at": "2024-04-26T01:49:38Z",
"pushed_at": "2024-04-26T01:49:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]