PoC-in-GitHub/2013/CVE-2013-2028.json
2020-03-29 18:07:23 +09:00

71 lines
No EOL
2.4 KiB
JSON

[
{
"id": 10198831,
"name": "nginx-1.4.0",
"full_name": "danghvu\/nginx-1.4.0",
"owner": {
"login": "danghvu",
"id": 1152714,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1152714?v=4",
"html_url": "https:\/\/github.com\/danghvu"
},
"html_url": "https:\/\/github.com\/danghvu\/nginx-1.4.0",
"description": "For the analysis of CVE-2013-2028",
"fork": false,
"created_at": "2013-05-21T15:20:05Z",
"updated_at": "2020-03-29T02:00:27Z",
"pushed_at": "2018-06-07T23:22:38Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 11,
"forks": 11,
"watchers": 28,
"score": 0
},
{
"id": 54551843,
"name": "nginxpwn",
"full_name": "kitctf\/nginxpwn",
"owner": {
"login": "kitctf",
"id": 8018062,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8018062?v=4",
"html_url": "https:\/\/github.com\/kitctf"
},
"html_url": "https:\/\/github.com\/kitctf\/nginxpwn",
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
"fork": false,
"created_at": "2016-03-23T10:41:00Z",
"updated_at": "2020-03-29T03:48:44Z",
"pushed_at": "2016-03-23T12:05:38Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 19,
"forks": 19,
"watchers": 41,
"score": 0
},
{
"id": 200347068,
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"owner": {
"login": "tachibana51",
"id": 29031994,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29031994?v=4",
"html_url": "https:\/\/github.com\/tachibana51"
},
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"description": "this is not stable",
"fork": false,
"created_at": "2019-08-03T07:38:18Z",
"updated_at": "2019-10-26T18:48:26Z",
"pushed_at": "2019-08-03T07:58:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]