mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
669 lines
No EOL
23 KiB
JSON
669 lines
No EOL
23 KiB
JSON
[
|
|
{
|
|
"id": 212541592,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "dorkerdevil\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "dorkerdevil",
|
|
"id": 15796745,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
|
|
"html_url": "https:\/\/github.com\/dorkerdevil",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2019-11932",
|
|
"description": " double-free bug in WhatsApp exploit poc",
|
|
"fork": false,
|
|
"created_at": "2019-10-03T09:26:24Z",
|
|
"updated_at": "2024-10-12T20:37:42Z",
|
|
"pushed_at": "2021-03-19T17:23:25Z",
|
|
"stargazers_count": 269,
|
|
"watchers_count": 269,
|
|
"has_discussions": false,
|
|
"forks_count": 77,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 77,
|
|
"watchers": 269,
|
|
"score": 0,
|
|
"subscribers_count": 16
|
|
},
|
|
{
|
|
"id": 212837105,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "awakened1712\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "awakened1712",
|
|
"id": 628212,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628212?v=4",
|
|
"html_url": "https:\/\/github.com\/awakened1712",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/awakened1712\/CVE-2019-11932",
|
|
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
|
"fork": false,
|
|
"created_at": "2019-10-04T14:43:57Z",
|
|
"updated_at": "2024-11-14T02:43:03Z",
|
|
"pushed_at": "2019-11-30T10:28:01Z",
|
|
"stargazers_count": 200,
|
|
"watchers_count": 200,
|
|
"has_discussions": false,
|
|
"forks_count": 105,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 105,
|
|
"watchers": 200,
|
|
"score": 0,
|
|
"subscribers_count": 10
|
|
},
|
|
{
|
|
"id": 212845397,
|
|
"name": "WhatsRCE",
|
|
"full_name": "JasonJerry\/WhatsRCE",
|
|
"owner": {
|
|
"login": "JasonJerry",
|
|
"id": 40905631,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40905631?v=4",
|
|
"html_url": "https:\/\/github.com\/JasonJerry",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JasonJerry\/WhatsRCE",
|
|
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
|
|
"fork": false,
|
|
"created_at": "2019-10-04T15:19:41Z",
|
|
"updated_at": "2024-09-14T08:58:24Z",
|
|
"pushed_at": "2019-10-04T14:43:37Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 36,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 36,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 212954402,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "TulungagungCyberLink\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "TulungagungCyberLink",
|
|
"id": 46483873,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46483873?v=4",
|
|
"html_url": "https:\/\/github.com\/TulungagungCyberLink",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TulungagungCyberLink\/CVE-2019-11932",
|
|
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
|
"fork": false,
|
|
"created_at": "2019-10-05T06:24:08Z",
|
|
"updated_at": "2023-02-03T09:00:19Z",
|
|
"pushed_at": "2019-10-08T06:17:40Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2019-11932",
|
|
"proofofconcept",
|
|
"tulungagungcyberlink",
|
|
"whatsapp-exploit",
|
|
"whatsapp-rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 213187543,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "infiniteLoopers\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "infiniteLoopers",
|
|
"id": 27885817,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27885817?v=4",
|
|
"html_url": "https:\/\/github.com\/infiniteLoopers",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-10-06T14:54:35Z",
|
|
"updated_at": "2022-06-01T18:02:34Z",
|
|
"pushed_at": "2019-10-06T15:34:22Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 215516489,
|
|
"name": "CVE-2019-11932-SupportApp",
|
|
"full_name": "valbrux\/CVE-2019-11932-SupportApp",
|
|
"owner": {
|
|
"login": "valbrux",
|
|
"id": 20357515,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20357515?v=4",
|
|
"html_url": "https:\/\/github.com\/valbrux",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/valbrux\/CVE-2019-11932-SupportApp",
|
|
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
|
|
"fork": false,
|
|
"created_at": "2019-10-16T10:04:30Z",
|
|
"updated_at": "2024-08-12T19:53:57Z",
|
|
"pushed_at": "2019-10-16T12:20:53Z",
|
|
"stargazers_count": 36,
|
|
"watchers_count": 36,
|
|
"has_discussions": false,
|
|
"forks_count": 23,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 23,
|
|
"watchers": 36,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 215635890,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "fastmo\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "fastmo",
|
|
"id": 53575270,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
|
|
"html_url": "https:\/\/github.com\/fastmo",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fastmo\/CVE-2019-11932",
|
|
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
|
|
"fork": false,
|
|
"created_at": "2019-10-16T20:13:23Z",
|
|
"updated_at": "2024-12-28T01:04:41Z",
|
|
"pushed_at": "2021-06-16T16:49:33Z",
|
|
"stargazers_count": 13,
|
|
"watchers_count": 13,
|
|
"has_discussions": false,
|
|
"forks_count": 9,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 9,
|
|
"watchers": 13,
|
|
"score": 0,
|
|
"subscribers_count": 5
|
|
},
|
|
{
|
|
"id": 217001772,
|
|
"name": "CVE-2019-11932-whatsApp-exploit",
|
|
"full_name": "mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
|
|
"owner": {
|
|
"login": "mRanonyMousTZ",
|
|
"id": 38766899,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38766899?v=4",
|
|
"html_url": "https:\/\/github.com\/mRanonyMousTZ",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
|
|
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
|
"fork": false,
|
|
"created_at": "2019-10-23T08:02:15Z",
|
|
"updated_at": "2024-08-12T19:54:10Z",
|
|
"pushed_at": "2019-10-23T08:25:48Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 15,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 228222453,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "SmoZy92\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "SmoZy92",
|
|
"id": 58377338,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58377338?v=4",
|
|
"html_url": "https:\/\/github.com\/SmoZy92",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SmoZy92\/CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-12-15T17:21:26Z",
|
|
"updated_at": "2020-09-02T11:23:41Z",
|
|
"pushed_at": "2019-12-15T17:40:15Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 239654888,
|
|
"name": "https-github.com-awakened171",
|
|
"full_name": "dashtic172\/https-github.com-awakened171",
|
|
"owner": {
|
|
"login": "dashtic172",
|
|
"id": 60906735,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60906735?v=4",
|
|
"html_url": "https:\/\/github.com\/dashtic172",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dashtic172\/https-github.com-awakened171",
|
|
"description": "https:\/\/github.com\/awakened1712\/CVE-2019-11932",
|
|
"fork": false,
|
|
"created_at": "2020-02-11T02:00:14Z",
|
|
"updated_at": "2020-02-11T02:00:14Z",
|
|
"pushed_at": "2020-02-11T02:00:15Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 258020988,
|
|
"name": "WhatsPayloadRCE",
|
|
"full_name": "Err0r-ICA\/WhatsPayloadRCE",
|
|
"owner": {
|
|
"login": "Err0r-ICA",
|
|
"id": 59941931,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59941931?v=4",
|
|
"html_url": "https:\/\/github.com\/Err0r-ICA",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Err0r-ICA\/WhatsPayloadRCE",
|
|
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
|
|
"fork": false,
|
|
"created_at": "2020-04-22T21:11:27Z",
|
|
"updated_at": "2024-09-21T18:21:59Z",
|
|
"pushed_at": "2022-01-02T20:40:58Z",
|
|
"stargazers_count": 31,
|
|
"watchers_count": 31,
|
|
"has_discussions": false,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"exploit",
|
|
"hacking",
|
|
"hacking-tools",
|
|
"linux",
|
|
"payload",
|
|
"termux",
|
|
"whatsapp",
|
|
"whatsapp-chat"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 31,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 288889170,
|
|
"name": "CVE-2019-11932-SupportApp",
|
|
"full_name": "starling021\/CVE-2019-11932-SupportApp",
|
|
"owner": {
|
|
"login": "starling021",
|
|
"id": 69880426,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69880426?v=4",
|
|
"html_url": "https:\/\/github.com\/starling021",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/starling021\/CVE-2019-11932-SupportApp",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-08-20T02:45:40Z",
|
|
"updated_at": "2020-08-20T02:45:54Z",
|
|
"pushed_at": "2020-08-20T02:45:51Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 294892081,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "primebeast\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "primebeast",
|
|
"id": 64252861,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64252861?v=4",
|
|
"html_url": "https:\/\/github.com\/primebeast",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/primebeast\/CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-12T07:18:57Z",
|
|
"updated_at": "2020-09-12T07:19:57Z",
|
|
"pushed_at": "2020-09-12T07:19:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 323076010,
|
|
"name": "hello",
|
|
"full_name": "BadAssAiras\/hello",
|
|
"owner": {
|
|
"login": "BadAssAiras",
|
|
"id": 76394667,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76394667?v=4",
|
|
"html_url": "https:\/\/github.com\/BadAssAiras",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BadAssAiras\/hello",
|
|
"description": "https:\/\/github.com\/awakened1712\/CVE-2019-11932:\/\/github.com\/awakened1712\/CVE-2019-11932",
|
|
"fork": false,
|
|
"created_at": "2020-12-20T13:17:19Z",
|
|
"updated_at": "2020-12-20T13:17:19Z",
|
|
"pushed_at": "2020-12-20T13:17:21Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 349491080,
|
|
"name": "WhatsAppHACK-RCE",
|
|
"full_name": "kal1gh0st\/WhatsAppHACK-RCE",
|
|
"owner": {
|
|
"login": "kal1gh0st",
|
|
"id": 56889513,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
|
|
"html_url": "https:\/\/github.com\/kal1gh0st",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kal1gh0st\/WhatsAppHACK-RCE",
|
|
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
|
"fork": false,
|
|
"created_at": "2021-03-19T16:41:31Z",
|
|
"updated_at": "2024-11-24T14:51:20Z",
|
|
"pushed_at": "2021-11-17T14:40:14Z",
|
|
"stargazers_count": 21,
|
|
"watchers_count": 21,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 21,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 382906478,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "zxn1\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "zxn1",
|
|
"id": 32796539,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32796539?v=4",
|
|
"html_url": "https:\/\/github.com\/zxn1",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zxn1\/CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-04T17:07:19Z",
|
|
"updated_at": "2022-08-01T09:48:29Z",
|
|
"pushed_at": "2021-07-04T17:08:31Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 388931033,
|
|
"name": "WhatsApp-Double-Free-Vulnerability_CVE-2019-11932",
|
|
"full_name": "k3vinlusec\/WhatsApp-Double-Free-Vulnerability_CVE-2019-11932",
|
|
"owner": {
|
|
"login": "k3vinlusec",
|
|
"id": 19988136,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19988136?v=4",
|
|
"html_url": "https:\/\/github.com\/k3vinlusec",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/k3vinlusec\/WhatsApp-Double-Free-Vulnerability_CVE-2019-11932",
|
|
"description": "Exploit Analysis of The WhatsApp Double-Free Vulnerability (CVE-2019-11932) Using the GEF-GDB Debugger",
|
|
"fork": false,
|
|
"created_at": "2021-07-23T21:29:56Z",
|
|
"updated_at": "2023-05-23T04:53:50Z",
|
|
"pushed_at": "2021-07-23T23:07:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 397173185,
|
|
"name": "https-github.com-awakened1712-CVE-2019-11932",
|
|
"full_name": "Tabni\/https-github.com-awakened1712-CVE-2019-11932",
|
|
"owner": {
|
|
"login": "Tabni",
|
|
"id": 89070276,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89070276?v=4",
|
|
"html_url": "https:\/\/github.com\/Tabni",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Tabni\/https-github.com-awakened1712-CVE-2019-11932",
|
|
"description": "CVE-2019-11932",
|
|
"fork": false,
|
|
"created_at": "2021-08-17T08:35:11Z",
|
|
"updated_at": "2021-10-24T12:41:35Z",
|
|
"pushed_at": "2021-08-17T08:35:12Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 620782596,
|
|
"name": "cd-CVE-2019-11932",
|
|
"full_name": "0759104103\/cd-CVE-2019-11932",
|
|
"owner": {
|
|
"login": "0759104103",
|
|
"id": 129280794,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129280794?v=4",
|
|
"html_url": "https:\/\/github.com\/0759104103",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0759104103\/cd-CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-03-29T11:12:36Z",
|
|
"updated_at": "2023-03-29T11:12:36Z",
|
|
"pushed_at": "2023-03-29T11:12:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 696155530,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "tucommenceapousser\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "tucommenceapousser",
|
|
"id": 129875733,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2019-11932",
|
|
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
|
"fork": false,
|
|
"created_at": "2023-09-25T07:45:49Z",
|
|
"updated_at": "2023-09-25T07:47:32Z",
|
|
"pushed_at": "2023-09-25T07:56:18Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 696211441,
|
|
"name": "CVE-2019-11932deta",
|
|
"full_name": "tucommenceapousser\/CVE-2019-11932deta",
|
|
"owner": {
|
|
"login": "tucommenceapousser",
|
|
"id": 129875733,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2019-11932deta",
|
|
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
|
"fork": false,
|
|
"created_at": "2023-09-25T10:08:15Z",
|
|
"updated_at": "2023-09-25T10:09:20Z",
|
|
"pushed_at": "2023-09-25T10:15:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |