mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
370 lines
No EOL
13 KiB
JSON
370 lines
No EOL
13 KiB
JSON
[
|
|
{
|
|
"id": 145897861,
|
|
"name": "CVE-2018-11776",
|
|
"full_name": "trbpnd\/CVE-2018-11776",
|
|
"owner": {
|
|
"login": "trbpnd",
|
|
"id": 39193403,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39193403?v=4",
|
|
"html_url": "https:\/\/github.com\/trbpnd"
|
|
},
|
|
"html_url": "https:\/\/github.com\/trbpnd\/CVE-2018-11776",
|
|
"description": "Docker image for a vulnerable struts app",
|
|
"fork": false,
|
|
"created_at": "2018-08-23T19:25:26Z",
|
|
"updated_at": "2018-08-23T19:28:53Z",
|
|
"pushed_at": "2018-08-23T19:28:51Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 145901668,
|
|
"name": "CVE-2018-11776",
|
|
"full_name": "xfox64x\/CVE-2018-11776",
|
|
"owner": {
|
|
"login": "xfox64x",
|
|
"id": 11416821,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11416821?v=4",
|
|
"html_url": "https:\/\/github.com\/xfox64x"
|
|
},
|
|
"html_url": "https:\/\/github.com\/xfox64x\/CVE-2018-11776",
|
|
"description": "Creating a vulnerable environment and the PoC ",
|
|
"fork": false,
|
|
"created_at": "2018-08-23T20:06:17Z",
|
|
"updated_at": "2019-11-25T21:32:38Z",
|
|
"pushed_at": "2019-11-25T21:21:55Z",
|
|
"stargazers_count": 13,
|
|
"watchers_count": 13,
|
|
"forks_count": 7,
|
|
"forks": 7,
|
|
"watchers": 13,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 145935231,
|
|
"name": "CVE-2018-11776",
|
|
"full_name": "jiguangin\/CVE-2018-11776",
|
|
"owner": {
|
|
"login": "jiguangin",
|
|
"id": 22545712,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22545712?v=4",
|
|
"html_url": "https:\/\/github.com\/jiguangin"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jiguangin\/CVE-2018-11776",
|
|
"description": "CVE-2018-11776(S2-057) EXPLOIT CODE",
|
|
"fork": false,
|
|
"created_at": "2018-08-24T03:01:29Z",
|
|
"updated_at": "2019-06-18T01:56:08Z",
|
|
"pushed_at": "2018-08-24T03:27:02Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 145985371,
|
|
"name": "CVE-2018-11776-Python-PoC",
|
|
"full_name": "hook-s3c\/CVE-2018-11776-Python-PoC",
|
|
"owner": {
|
|
"login": "hook-s3c",
|
|
"id": 31825993,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/31825993?v=4",
|
|
"html_url": "https:\/\/github.com\/hook-s3c"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-11776-Python-PoC",
|
|
"description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab",
|
|
"fork": false,
|
|
"created_at": "2018-08-24T11:53:02Z",
|
|
"updated_at": "2019-12-30T13:14:02Z",
|
|
"pushed_at": "2018-08-25T02:14:49Z",
|
|
"stargazers_count": 112,
|
|
"watchers_count": 112,
|
|
"forks_count": 42,
|
|
"forks": 42,
|
|
"watchers": 112,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 146056002,
|
|
"name": "struts-pwn_CVE-2018-11776",
|
|
"full_name": "mazen160\/struts-pwn_CVE-2018-11776",
|
|
"owner": {
|
|
"login": "mazen160",
|
|
"id": 8996052,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8996052?v=4",
|
|
"html_url": "https:\/\/github.com\/mazen160"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2018-11776",
|
|
"description": " An exploit for Apache Struts CVE-2018-11776",
|
|
"fork": false,
|
|
"created_at": "2018-08-25T01:53:30Z",
|
|
"updated_at": "2020-01-02T11:11:49Z",
|
|
"pushed_at": "2018-08-26T02:31:39Z",
|
|
"stargazers_count": 285,
|
|
"watchers_count": 285,
|
|
"forks_count": 99,
|
|
"forks": 99,
|
|
"watchers": 285,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 146060181,
|
|
"name": "CVE-2018-11776",
|
|
"full_name": "bhdresh\/CVE-2018-11776",
|
|
"owner": {
|
|
"login": "bhdresh",
|
|
"id": 8931885,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8931885?v=4",
|
|
"html_url": "https:\/\/github.com\/bhdresh"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2018-11776",
|
|
"description": "Vulnerable docker container for CVE-2018-11776",
|
|
"fork": false,
|
|
"created_at": "2018-08-25T03:06:30Z",
|
|
"updated_at": "2020-01-06T22:41:00Z",
|
|
"pushed_at": "2018-08-25T04:53:35Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 8,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 146094544,
|
|
"name": "CVE-2018-11776",
|
|
"full_name": "knqyf263\/CVE-2018-11776",
|
|
"owner": {
|
|
"login": "knqyf263",
|
|
"id": 2253692,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2253692?v=4",
|
|
"html_url": "https:\/\/github.com\/knqyf263"
|
|
},
|
|
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-11776",
|
|
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
|
|
"fork": false,
|
|
"created_at": "2018-08-25T12:45:15Z",
|
|
"updated_at": "2019-09-12T19:52:48Z",
|
|
"pushed_at": "2018-08-25T14:20:46Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 146330536,
|
|
"name": "Strutter",
|
|
"full_name": "Ekultek\/Strutter",
|
|
"owner": {
|
|
"login": "Ekultek",
|
|
"id": 14183473,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
|
|
"html_url": "https:\/\/github.com\/Ekultek"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ekultek\/Strutter",
|
|
"description": "Proof of Concept for CVE-2018-11776",
|
|
"fork": false,
|
|
"created_at": "2018-08-27T17:22:16Z",
|
|
"updated_at": "2019-07-08T12:23:26Z",
|
|
"pushed_at": "2018-09-12T14:28:35Z",
|
|
"stargazers_count": 20,
|
|
"watchers_count": 20,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 20,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 146373342,
|
|
"name": "cve-2018-11776-docker",
|
|
"full_name": "tuxotron\/cve-2018-11776-docker",
|
|
"owner": {
|
|
"login": "tuxotron",
|
|
"id": 937637,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/937637?v=4",
|
|
"html_url": "https:\/\/github.com\/tuxotron"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tuxotron\/cve-2018-11776-docker",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-08-28T01:14:52Z",
|
|
"updated_at": "2019-09-24T14:38:18Z",
|
|
"pushed_at": "2018-08-29T17:58:27Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 146519519,
|
|
"name": "S2-057-CVE-2018-11776",
|
|
"full_name": "brianwrf\/S2-057-CVE-2018-11776",
|
|
"owner": {
|
|
"login": "brianwrf",
|
|
"id": 8141813,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8141813?v=4",
|
|
"html_url": "https:\/\/github.com\/brianwrf"
|
|
},
|
|
"html_url": "https:\/\/github.com\/brianwrf\/S2-057-CVE-2018-11776",
|
|
"description": "A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)",
|
|
"fork": false,
|
|
"created_at": "2018-08-28T23:48:14Z",
|
|
"updated_at": "2018-12-23T03:47:07Z",
|
|
"pushed_at": "2018-08-29T00:03:56Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 15,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 146650579,
|
|
"name": "Apache-Struts-Shodan-Exploit",
|
|
"full_name": "649\/Apache-Struts-Shodan-Exploit",
|
|
"owner": {
|
|
"login": "649",
|
|
"id": 23534047,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23534047?v=4",
|
|
"html_url": "https:\/\/github.com\/649"
|
|
},
|
|
"html_url": "https:\/\/github.com\/649\/Apache-Struts-Shodan-Exploit",
|
|
"description": "This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.",
|
|
"fork": false,
|
|
"created_at": "2018-08-29T19:50:26Z",
|
|
"updated_at": "2020-01-05T18:02:50Z",
|
|
"pushed_at": "2018-08-30T00:16:01Z",
|
|
"stargazers_count": 44,
|
|
"watchers_count": 44,
|
|
"forks_count": 12,
|
|
"forks": 12,
|
|
"watchers": 44,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 147746262,
|
|
"name": "CVE-2018-11776-Python-PoC",
|
|
"full_name": "jezzus\/CVE-2018-11776-Python-PoC",
|
|
"owner": {
|
|
"login": "jezzus",
|
|
"id": 9899999,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/9899999?v=4",
|
|
"html_url": "https:\/\/github.com\/jezzus"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jezzus\/CVE-2018-11776-Python-PoC",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-09-06T23:49:20Z",
|
|
"updated_at": "2018-09-06T23:49:20Z",
|
|
"pushed_at": "2018-09-06T23:49:20Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 164352202,
|
|
"name": "cve-2018-11776",
|
|
"full_name": "cved-sources\/cve-2018-11776",
|
|
"owner": {
|
|
"login": "cved-sources",
|
|
"id": 46423677,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
|
"html_url": "https:\/\/github.com\/cved-sources"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-11776",
|
|
"description": "cve-2018-11776",
|
|
"fork": false,
|
|
"created_at": "2019-01-06T22:47:25Z",
|
|
"updated_at": "2019-09-12T19:52:44Z",
|
|
"pushed_at": "2019-02-01T21:29:54Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 193423029,
|
|
"name": "apche-struts-vuln-demo-cve-2018-11776",
|
|
"full_name": "OzNetNerd\/apche-struts-vuln-demo-cve-2018-11776",
|
|
"owner": {
|
|
"login": "OzNetNerd",
|
|
"id": 21230469,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/21230469?v=4",
|
|
"html_url": "https:\/\/github.com\/OzNetNerd"
|
|
},
|
|
"html_url": "https:\/\/github.com\/OzNetNerd\/apche-struts-vuln-demo-cve-2018-11776",
|
|
"description": "Spins up an isolated test environment for experimentation with Apache Struts vulnerability CVE-2018-11776.",
|
|
"fork": false,
|
|
"created_at": "2019-06-24T02:51:09Z",
|
|
"updated_at": "2019-07-09T05:38:58Z",
|
|
"pushed_at": "2019-06-24T03:14:17Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 213772542,
|
|
"name": "CVE-2018-11776",
|
|
"full_name": "cucadili\/CVE-2018-11776",
|
|
"owner": {
|
|
"login": "cucadili",
|
|
"id": 48569185,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48569185?v=4",
|
|
"html_url": "https:\/\/github.com\/cucadili"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cucadili\/CVE-2018-11776",
|
|
"description": "Investigation of CVE-2018-11776 vulnerability that allows attackers to remotely execute code and gain control over Apache Struts-based applications.",
|
|
"fork": false,
|
|
"created_at": "2019-10-08T23:01:49Z",
|
|
"updated_at": "2019-10-08T23:46:28Z",
|
|
"pushed_at": "2019-10-08T23:46:27Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 214186123,
|
|
"name": "Apache-Struts-0Day-Exploit",
|
|
"full_name": "LightC0der\/Apache-Struts-0Day-Exploit",
|
|
"owner": {
|
|
"login": "LightC0der",
|
|
"id": 24475929,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24475929?v=4",
|
|
"html_url": "https:\/\/github.com\/LightC0der"
|
|
},
|
|
"html_url": "https:\/\/github.com\/LightC0der\/Apache-Struts-0Day-Exploit",
|
|
"description": "Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.",
|
|
"fork": false,
|
|
"created_at": "2019-10-10T13:09:50Z",
|
|
"updated_at": "2019-12-02T07:48:33Z",
|
|
"pushed_at": "2019-11-25T11:11:45Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
}
|
|
] |