mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
256 lines
No EOL
9 KiB
JSON
256 lines
No EOL
9 KiB
JSON
[
|
|
{
|
|
"id": 401821096,
|
|
"name": "CVE-2019-17662",
|
|
"full_name": "MuirlandOracle\/CVE-2019-17662",
|
|
"owner": {
|
|
"login": "MuirlandOracle",
|
|
"id": 58998623,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58998623?v=4",
|
|
"html_url": "https:\/\/github.com\/MuirlandOracle",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MuirlandOracle\/CVE-2019-17662",
|
|
"description": "Exploit code for CVE-2019-17662",
|
|
"fork": false,
|
|
"created_at": "2021-08-31T19:30:09Z",
|
|
"updated_at": "2024-08-12T20:16:03Z",
|
|
"pushed_at": "2021-09-12T14:43:25Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 16,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 412325467,
|
|
"name": "Bash-Script-CVE-2019-17662",
|
|
"full_name": "kxisxr\/Bash-Script-CVE-2019-17662",
|
|
"owner": {
|
|
"login": "kxisxr",
|
|
"id": 47679627,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47679627?v=4",
|
|
"html_url": "https:\/\/github.com\/kxisxr",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kxisxr\/Bash-Script-CVE-2019-17662",
|
|
"description": "ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise of the VNC server. The vulnerability exists even when authentication is turned on during the deployment of the VNC server. The password for authentication is stored in cleartext in a file that can be read via a ..\/..\/ThinVnc.ini directory traversal attack vector.",
|
|
"fork": false,
|
|
"created_at": "2021-10-01T04:27:28Z",
|
|
"updated_at": "2021-12-02T07:31:31Z",
|
|
"pushed_at": "2022-08-20T07:19:43Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 412842804,
|
|
"name": "CVE-2019-17662",
|
|
"full_name": "whokilleddb\/CVE-2019-17662",
|
|
"owner": {
|
|
"login": "whokilleddb",
|
|
"id": 56482137,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56482137?v=4",
|
|
"html_url": "https:\/\/github.com\/whokilleddb",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/whokilleddb\/CVE-2019-17662",
|
|
"description": "Exploit for CVE-2019-17662 (ThinVNC 1.0b1)",
|
|
"fork": false,
|
|
"created_at": "2021-10-02T15:57:11Z",
|
|
"updated_at": "2021-10-17T18:05:31Z",
|
|
"pushed_at": "2021-10-02T22:35:59Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2019-17662",
|
|
"exploit",
|
|
"poc",
|
|
"thinvnc"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 418410228,
|
|
"name": "CVE-2019-17662-Exploit",
|
|
"full_name": "rajendrakumaryadav\/CVE-2019-17662-Exploit",
|
|
"owner": {
|
|
"login": "rajendrakumaryadav",
|
|
"id": 13816347,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13816347?v=4",
|
|
"html_url": "https:\/\/github.com\/rajendrakumaryadav",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/rajendrakumaryadav\/CVE-2019-17662-Exploit",
|
|
"description": "Exploit For CVE-2019-17662",
|
|
"fork": false,
|
|
"created_at": "2021-10-18T08:26:47Z",
|
|
"updated_at": "2021-10-19T01:41:15Z",
|
|
"pushed_at": "2021-10-18T10:16:32Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 505163308,
|
|
"name": "CVE-2019-17662",
|
|
"full_name": "Tamagaft\/CVE-2019-17662",
|
|
"owner": {
|
|
"login": "Tamagaft",
|
|
"id": 38216030,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38216030?v=4",
|
|
"html_url": "https:\/\/github.com\/Tamagaft",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Tamagaft\/CVE-2019-17662",
|
|
"description": "Golang implementation of CVE-2019-17662 TinyVNC Arbitrary File Read leading to Authentication Bypass Exploit",
|
|
"fork": false,
|
|
"created_at": "2022-06-19T16:33:04Z",
|
|
"updated_at": "2022-06-20T11:41:51Z",
|
|
"pushed_at": "2022-06-20T11:37:58Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 536061121,
|
|
"name": "CVE-2019-17662",
|
|
"full_name": "bl4ck574r\/CVE-2019-17662",
|
|
"owner": {
|
|
"login": "bl4ck574r",
|
|
"id": 94787830,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94787830?v=4",
|
|
"html_url": "https:\/\/github.com\/bl4ck574r",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bl4ck574r\/CVE-2019-17662",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-09-13T09:53:45Z",
|
|
"updated_at": "2022-11-15T12:42:11Z",
|
|
"pushed_at": "2022-11-11T18:00:58Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 642644869,
|
|
"name": "CVE-2019-17662",
|
|
"full_name": "thomas-osgood\/CVE-2019-17662",
|
|
"owner": {
|
|
"login": "thomas-osgood",
|
|
"id": 20747585,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20747585?v=4",
|
|
"html_url": "https:\/\/github.com\/thomas-osgood",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/thomas-osgood\/CVE-2019-17662",
|
|
"description": "Golang implementation of ThinVNC exploit CVE-2019-17662. For educational purposes only.",
|
|
"fork": false,
|
|
"created_at": "2023-05-19T03:12:44Z",
|
|
"updated_at": "2024-11-19T01:29:59Z",
|
|
"pushed_at": "2023-05-19T03:20:32Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": true,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 657123561,
|
|
"name": "vnc-lab-cve-2019-17662",
|
|
"full_name": "medarov411\/vnc-lab-cve-2019-17662",
|
|
"owner": {
|
|
"login": "medarov411",
|
|
"id": 60567375,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60567375?v=4",
|
|
"html_url": "https:\/\/github.com\/medarov411",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/medarov411\/vnc-lab-cve-2019-17662",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-06-22T11:19:27Z",
|
|
"updated_at": "2024-10-02T10:33:46Z",
|
|
"pushed_at": "2023-06-22T11:24:57Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |