mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
262 lines
No EOL
8.8 KiB
JSON
262 lines
No EOL
8.8 KiB
JSON
[
|
|
{
|
|
"id": 260659368,
|
|
"name": "CVE-2020-10977",
|
|
"full_name": "KooroshRZ\/CVE-2020-10977",
|
|
"owner": {
|
|
"login": "KooroshRZ",
|
|
"id": 24431926,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24431926?v=4",
|
|
"html_url": "https:\/\/github.com\/KooroshRZ",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/KooroshRZ\/CVE-2020-10977",
|
|
"description": "Exploit for \"GitLab Instance\" Arbitrary server file read vulnerability",
|
|
"fork": false,
|
|
"created_at": "2020-05-02T10:03:31Z",
|
|
"updated_at": "2021-03-30T01:51:50Z",
|
|
"pushed_at": "2020-05-15T08:30:48Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-10977",
|
|
"exploit",
|
|
"gitlab-instance",
|
|
"vulnerability"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 314596440,
|
|
"name": "cve-2020-10977",
|
|
"full_name": "thewhiteh4t\/cve-2020-10977",
|
|
"owner": {
|
|
"login": "thewhiteh4t",
|
|
"id": 36354846,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
|
|
"html_url": "https:\/\/github.com\/thewhiteh4t",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2020-10977",
|
|
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
|
"fork": false,
|
|
"created_at": "2020-11-20T15:40:03Z",
|
|
"updated_at": "2024-10-01T08:41:40Z",
|
|
"pushed_at": "2021-04-23T19:21:16Z",
|
|
"stargazers_count": 69,
|
|
"watchers_count": 69,
|
|
"has_discussions": false,
|
|
"forks_count": 21,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 21,
|
|
"watchers": 69,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 316070312,
|
|
"name": "CVE-2020-10977.py",
|
|
"full_name": "JustMichi\/CVE-2020-10977.py",
|
|
"owner": {
|
|
"login": "JustMichi",
|
|
"id": 10670516,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10670516?v=4",
|
|
"html_url": "https:\/\/github.com\/JustMichi",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JustMichi\/CVE-2020-10977.py",
|
|
"description": "authenticated arbitrary file read for Gitlab (CVE-2020-10977)",
|
|
"fork": false,
|
|
"created_at": "2020-11-25T22:48:26Z",
|
|
"updated_at": "2020-11-26T19:40:32Z",
|
|
"pushed_at": "2020-11-26T19:40:30Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 334197749,
|
|
"name": "gitlab-12.9.0-file-read",
|
|
"full_name": "erk3\/gitlab-12.9.0-file-read",
|
|
"owner": {
|
|
"login": "erk3",
|
|
"id": 3186136,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3186136?v=4",
|
|
"html_url": "https:\/\/github.com\/erk3",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/erk3\/gitlab-12.9.0-file-read",
|
|
"description": "A (wanted to be) better script than what can be found on exploit-db about the authenticated arbitrary read file on GitLab v12.9.0 (CVE-2020-10977)",
|
|
"fork": false,
|
|
"created_at": "2021-01-29T16:17:10Z",
|
|
"updated_at": "2021-01-29T17:54:42Z",
|
|
"pushed_at": "2021-01-29T17:54:27Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 342445393,
|
|
"name": "cve-2020-10977",
|
|
"full_name": "possib1e\/cve-2020-10977",
|
|
"owner": {
|
|
"login": "possib1e",
|
|
"id": 30862319,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30862319?v=4",
|
|
"html_url": "https:\/\/github.com\/possib1e",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/possib1e\/cve-2020-10977",
|
|
"description": "GitLab 12.9 Arbitrary File Read",
|
|
"fork": false,
|
|
"created_at": "2021-02-26T02:57:05Z",
|
|
"updated_at": "2021-02-26T02:57:06Z",
|
|
"pushed_at": "2021-01-23T18:34:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 345284390,
|
|
"name": "CVE-2020-10977",
|
|
"full_name": "liath\/CVE-2020-10977",
|
|
"owner": {
|
|
"login": "liath",
|
|
"id": 1565435,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1565435?v=4",
|
|
"html_url": "https:\/\/github.com\/liath",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/liath\/CVE-2020-10977",
|
|
"description": "Gitlab v12.4.0-8.1 RCE",
|
|
"fork": false,
|
|
"created_at": "2021-03-07T07:26:38Z",
|
|
"updated_at": "2021-03-25T07:02:30Z",
|
|
"pushed_at": "2021-03-07T07:28:59Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 356786384,
|
|
"name": "cve-2020-10977-read-and-execute",
|
|
"full_name": "lisp3r\/cve-2020-10977-read-and-execute",
|
|
"owner": {
|
|
"login": "lisp3r",
|
|
"id": 6272944,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6272944?v=4",
|
|
"html_url": "https:\/\/github.com\/lisp3r",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/lisp3r\/cve-2020-10977-read-and-execute",
|
|
"description": "cve-2020-10977 read and execute",
|
|
"fork": false,
|
|
"created_at": "2021-04-11T06:31:06Z",
|
|
"updated_at": "2021-04-23T20:13:51Z",
|
|
"pushed_at": "2021-04-23T20:13:49Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 363605353,
|
|
"name": "gitlab-cve-2020-10977",
|
|
"full_name": "vandycknick\/gitlab-cve-2020-10977",
|
|
"owner": {
|
|
"login": "vandycknick",
|
|
"id": 6469315,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6469315?v=4",
|
|
"html_url": "https:\/\/github.com\/vandycknick",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/vandycknick\/gitlab-cve-2020-10977",
|
|
"description": "GitLab Arbitrary File Read Exploit",
|
|
"fork": false,
|
|
"created_at": "2021-05-02T08:45:03Z",
|
|
"updated_at": "2024-01-07T16:17:25Z",
|
|
"pushed_at": "2021-05-04T22:25:51Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-10977",
|
|
"exploit",
|
|
"gitlab",
|
|
"lfi",
|
|
"python",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
}
|
|
] |