PoC-in-GitHub/2017/CVE-2017-8759.json
2021-07-03 06:11:28 +09:00

416 lines
No EOL
15 KiB
JSON

[
{
"id": 103382657,
"name": "CVE-2017-8759-Exploit-sample",
"full_name": "Voulnet\/CVE-2017-8759-Exploit-sample",
"owner": {
"login": "Voulnet",
"id": 1334847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1334847?v=4",
"html_url": "https:\/\/github.com\/Voulnet"
},
"html_url": "https:\/\/github.com\/Voulnet\/CVE-2017-8759-Exploit-sample",
"description": "Running CVE-2017-8759 exploit sample.",
"fork": false,
"created_at": "2017-09-13T09:50:04Z",
"updated_at": "2021-02-24T08:50:34Z",
"pushed_at": "2020-01-23T06:53:00Z",
"stargazers_count": 259,
"watchers_count": 259,
"forks_count": 112,
"forks": 112,
"watchers": 259,
"score": 0
},
{
"id": 103416775,
"name": "CVE-2017-8759",
"full_name": "nccgroup\/CVE-2017-8759",
"owner": {
"login": "nccgroup",
"id": 4067082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4",
"html_url": "https:\/\/github.com\/nccgroup"
},
"html_url": "https:\/\/github.com\/nccgroup\/CVE-2017-8759",
"description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements",
"fork": false,
"created_at": "2017-09-13T15:24:10Z",
"updated_at": "2021-06-11T19:04:54Z",
"pushed_at": "2017-09-19T18:06:41Z",
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 50,
"forks": 50,
"watchers": 95,
"score": 0
},
{
"id": 103428172,
"name": "CVE-2017-8759",
"full_name": "vysecurity\/CVE-2017-8759",
"owner": {
"login": "vysecurity",
"id": 3596242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
"html_url": "https:\/\/github.com\/vysecurity"
},
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759",
"description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.",
"fork": false,
"created_at": "2017-09-13T17:10:18Z",
"updated_at": "2021-06-11T19:17:58Z",
"pushed_at": "2017-09-14T10:18:40Z",
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 85,
"forks": 85,
"watchers": 172,
"score": 0
},
{
"id": 103447049,
"name": "CVE-2017-8759",
"full_name": "BasuCert\/CVE-2017-8759",
"owner": {
"login": "BasuCert",
"id": 29852431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
"html_url": "https:\/\/github.com\/BasuCert"
},
"html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759",
"description": "CVE-2017-8759 Research",
"fork": false,
"created_at": "2017-09-13T20:27:29Z",
"updated_at": "2020-05-18T10:42:14Z",
"pushed_at": "2017-09-15T13:14:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 103447404,
"name": "CVE-2017-8759-Exploit-sample2",
"full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2",
"owner": {
"login": "tahisaad6",
"id": 21042116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4",
"html_url": "https:\/\/github.com\/tahisaad6"
},
"html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2",
"description": null,
"fork": false,
"created_at": "2017-09-13T20:31:43Z",
"updated_at": "2017-09-13T20:31:43Z",
"pushed_at": "2017-09-13T20:31:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 103493845,
"name": "CVE-2017-8759_-SOAP_WSDL",
"full_name": "homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
"description": "CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5",
"fork": false,
"created_at": "2017-09-14T06:20:28Z",
"updated_at": "2018-11-16T12:24:03Z",
"pushed_at": "2017-09-21T16:41:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 6,
"forks": 6,
"watchers": 1,
"score": 0
},
{
"id": 103517315,
"name": "CVE-2017-8759",
"full_name": "bhdresh\/CVE-2017-8759",
"owner": {
"login": "bhdresh",
"id": 8931885,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
"html_url": "https:\/\/github.com\/bhdresh"
},
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-8759",
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2021-07-02T19:20:00Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 312,
"watchers_count": 312,
"forks_count": 122,
"forks": 122,
"watchers": 312,
"score": 0
},
{
"id": 103595749,
"name": "CVE-2017-8759",
"full_name": "Lz1y\/CVE-2017-8759",
"owner": {
"login": "Lz1y",
"id": 23468993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23468993?v=4",
"html_url": "https:\/\/github.com\/Lz1y"
},
"html_url": "https:\/\/github.com\/Lz1y\/CVE-2017-8759",
"description": "CVE-2017-8759",
"fork": false,
"created_at": "2017-09-15T00:36:17Z",
"updated_at": "2021-01-08T03:56:13Z",
"pushed_at": "2017-12-28T07:16:15Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 50,
"forks": 50,
"watchers": 84,
"score": 0
},
{
"id": 103865283,
"name": "CVE-2017-8759",
"full_name": "JonasUliana\/CVE-2017-8759",
"owner": {
"login": "JonasUliana",
"id": 29503841,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29503841?v=4",
"html_url": "https:\/\/github.com\/JonasUliana"
},
"html_url": "https:\/\/github.com\/JonasUliana\/CVE-2017-8759",
"description": "Simple C# implementation of CVE-2017-8759",
"fork": false,
"created_at": "2017-09-17T22:05:56Z",
"updated_at": "2018-11-16T12:24:03Z",
"pushed_at": "2017-09-17T22:20:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 103896322,
"name": "CVE-2017-8759",
"full_name": "Securitykid\/CVE-2017-8759",
"owner": {
"login": "Securitykid",
"id": 30798606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4",
"html_url": "https:\/\/github.com\/Securitykid"
},
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8759",
"description": "CVE-2017-8759",
"fork": false,
"created_at": "2017-09-18T05:35:57Z",
"updated_at": "2017-09-18T05:35:57Z",
"pushed_at": "2017-09-18T05:35:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 104033989,
"name": "CVE-2017-8759-exploits",
"full_name": "ashr\/CVE-2017-8759-exploits",
"owner": {
"login": "ashr",
"id": 171286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171286?v=4",
"html_url": "https:\/\/github.com\/ashr"
},
"html_url": "https:\/\/github.com\/ashr\/CVE-2017-8759-exploits",
"description": "Two versions of CVE-2017-8759 exploits",
"fork": false,
"created_at": "2017-09-19T06:12:10Z",
"updated_at": "2020-04-07T05:43:28Z",
"pushed_at": "2017-09-19T06:19:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
},
{
"id": 104625403,
"name": "CVE-2017-8759",
"full_name": "l0n3rs\/CVE-2017-8759",
"owner": {
"login": "l0n3rs",
"id": 31120718,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4",
"html_url": "https:\/\/github.com\/l0n3rs"
},
"html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-8759",
"description": null,
"fork": false,
"created_at": "2017-09-24T06:58:55Z",
"updated_at": "2017-09-24T06:58:55Z",
"pushed_at": "2017-09-24T06:59:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 161397133,
"name": "CVE-2017-8759",
"full_name": "ChaitanyaHaritash\/CVE-2017-8759",
"owner": {
"login": "ChaitanyaHaritash",
"id": 16261173,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16261173?v=4",
"html_url": "https:\/\/github.com\/ChaitanyaHaritash"
},
"html_url": "https:\/\/github.com\/ChaitanyaHaritash\/CVE-2017-8759",
"description": "Just My ports of CVE-2017-8759",
"fork": false,
"created_at": "2018-12-11T21:39:39Z",
"updated_at": "2020-10-27T03:30:41Z",
"pushed_at": "2018-12-11T22:02:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 188365315,
"name": "CVE-2017-8759Expoit",
"full_name": "smashinu\/CVE-2017-8759Expoit",
"owner": {
"login": "smashinu",
"id": 30433218,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30433218?v=4",
"html_url": "https:\/\/github.com\/smashinu"
},
"html_url": "https:\/\/github.com\/smashinu\/CVE-2017-8759Expoit",
"description": "yehnah",
"fork": false,
"created_at": "2019-05-24T06:29:45Z",
"updated_at": "2019-05-30T02:01:34Z",
"pushed_at": "2019-05-30T02:01:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 193617602,
"name": "CVE-2017-8759",
"full_name": "adeljck\/CVE-2017-8759",
"owner": {
"login": "adeljck",
"id": 24542600,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24542600?v=4",
"html_url": "https:\/\/github.com\/adeljck"
},
"html_url": "https:\/\/github.com\/adeljck\/CVE-2017-8759",
"description": "CVE-2017-8759 微软word漏洞利用脚本",
"fork": false,
"created_at": "2019-06-25T02:17:04Z",
"updated_at": "2019-06-25T02:17:51Z",
"pushed_at": "2019-06-25T02:17:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 231332316,
"name": "CVE-2017-8759",
"full_name": "zhengkook\/CVE-2017-8759",
"owner": {
"login": "zhengkook",
"id": 32629417,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32629417?v=4",
"html_url": "https:\/\/github.com\/zhengkook"
},
"html_url": "https:\/\/github.com\/zhengkook\/CVE-2017-8759",
"description": "CVE-2017-8759 use file",
"fork": false,
"created_at": "2020-01-02T07:43:19Z",
"updated_at": "2020-01-02T07:45:48Z",
"pushed_at": "2020-01-02T07:45:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263371988,
"name": "SNP",
"full_name": "varunsaru\/SNP",
"owner": {
"login": "varunsaru",
"id": 39478192,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39478192?v=4",
"html_url": "https:\/\/github.com\/varunsaru"
},
"html_url": "https:\/\/github.com\/varunsaru\/SNP",
"description": "CVE-2017-8759 || report related with execute code vulnerability",
"fork": false,
"created_at": "2020-05-12T15:11:42Z",
"updated_at": "2020-05-12T18:14:25Z",
"pushed_at": "2020-05-12T18:14:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263384480,
"name": "OHTS",
"full_name": "GayashanM\/OHTS",
"owner": {
"login": "GayashanM",
"id": 42294440,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42294440?v=4",
"html_url": "https:\/\/github.com\/GayashanM"
},
"html_url": "https:\/\/github.com\/GayashanM\/OHTS",
"description": "CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2020-05-12T16:00:39Z",
"updated_at": "2020-05-13T17:30:30Z",
"pushed_at": "2020-05-13T17:30:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]