PoC-in-GitHub/2018/CVE-2018-20250.json
2021-05-30 06:11:30 +09:00

370 lines
No EOL
13 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 171996551,
"name": "CVE-2018-20250",
"full_name": "WyAtu\/CVE-2018-20250",
"owner": {
"login": "WyAtu",
"id": 23521935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23521935?v=4",
"html_url": "https:\/\/github.com\/WyAtu"
},
"html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-20250",
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2021-05-25T03:25:23Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 443,
"watchers_count": 443,
"forks_count": 181,
"forks": 181,
"watchers": 443,
"score": 0
},
{
"id": 172009558,
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team\/CVE-2018-20250",
"owner": {
"login": "QAX-A-Team",
"id": 35417332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4",
"html_url": "https:\/\/github.com\/QAX-A-Team"
},
"html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250",
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
"fork": false,
"created_at": "2019-02-22T06:47:01Z",
"updated_at": "2021-05-29T18:38:32Z",
"pushed_at": "2019-02-22T07:47:26Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 14,
"forks": 14,
"watchers": 25,
"score": 0
},
{
"id": 172069488,
"name": "CVE-2018-20250-poc-winrar",
"full_name": "nmweizi\/CVE-2018-20250-poc-winrar",
"owner": {
"login": "nmweizi",
"id": 1232444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1232444?v=4",
"html_url": "https:\/\/github.com\/nmweizi"
},
"html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar",
"description": null,
"fork": false,
"created_at": "2019-02-22T13:18:14Z",
"updated_at": "2019-02-22T13:20:31Z",
"pushed_at": "2019-02-22T13:20:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 172078598,
"name": "UNACEV2.DLL-CVE-2018-20250",
"full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250",
"owner": {
"login": "blunden",
"id": 249915,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249915?v=4",
"html_url": "https:\/\/github.com\/blunden"
},
"html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250",
"description": "A version of the binary patched to address CVE-2018-20250",
"fork": false,
"created_at": "2019-02-22T14:19:20Z",
"updated_at": "2019-02-22T14:29:30Z",
"pushed_at": "2019-02-22T14:29:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 172156568,
"name": "CVE-2018-20250-WinRAR-ACE",
"full_name": "easis\/CVE-2018-20250-WinRAR-ACE",
"owner": {
"login": "easis",
"id": 50383201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50383201?v=4",
"html_url": "https:\/\/github.com\/easis"
},
"html_url": "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE",
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
"fork": false,
"created_at": "2019-02-23T01:20:34Z",
"updated_at": "2021-05-01T14:14:55Z",
"pushed_at": "2019-03-01T13:35:59Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 19,
"forks": 19,
"watchers": 21,
"score": 0
},
{
"id": 173153306,
"name": "CVE-2018-20250",
"full_name": "STP5940\/CVE-2018-20250",
"owner": {
"login": "STP5940",
"id": 21144303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21144303?v=4",
"html_url": "https:\/\/github.com\/STP5940"
},
"html_url": "https:\/\/github.com\/STP5940\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-02-28T17:07:52Z",
"updated_at": "2021-05-14T13:49:21Z",
"pushed_at": "2019-02-28T17:10:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 7,
"forks": 7,
"watchers": 3,
"score": 0
},
{
"id": 173733018,
"name": "WinAce-POC",
"full_name": "n4r1b\/WinAce-POC",
"owner": {
"login": "n4r1b",
"id": 7025964,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7025964?v=4",
"html_url": "https:\/\/github.com\/n4r1b"
},
"html_url": "https:\/\/github.com\/n4r1b\/WinAce-POC",
"description": "Simple POC to leverage CVE-2018-20250 from inside an EXE",
"fork": false,
"created_at": "2019-03-04T11:34:17Z",
"updated_at": "2019-03-04T14:32:05Z",
"pushed_at": "2019-03-04T14:42:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173733367,
"name": "hack-winrar",
"full_name": "technicaldada\/hack-winrar",
"owner": {
"login": "technicaldada",
"id": 32122182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32122182?v=4",
"html_url": "https:\/\/github.com\/technicaldada"
},
"html_url": "https:\/\/github.com\/technicaldada\/hack-winrar",
"description": "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]",
"fork": false,
"created_at": "2019-03-04T11:36:43Z",
"updated_at": "2019-03-25T16:54:05Z",
"pushed_at": "2019-03-04T11:39:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 173947919,
"name": "ezwinrar",
"full_name": "Ektoplasma\/ezwinrar",
"owner": {
"login": "Ektoplasma",
"id": 15208659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15208659?v=4",
"html_url": "https:\/\/github.com\/Ektoplasma"
},
"html_url": "https:\/\/github.com\/Ektoplasma\/ezwinrar",
"description": "Python tool exploiting CVE-2018-20250 found by CheckPoint folks",
"fork": false,
"created_at": "2019-03-05T13:05:03Z",
"updated_at": "2019-10-19T08:36:59Z",
"pushed_at": "2019-03-05T15:51:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 174533873,
"name": "CVE-2018-20250-WINRAR-ACE-GUI",
"full_name": "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
"owner": {
"login": "arkangel-dev",
"id": 31138457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31138457?v=4",
"html_url": "https:\/\/github.com\/arkangel-dev"
},
"html_url": "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
"description": "CVE-2018-20250-WINRAR-ACE Exploit with a UI",
"fork": false,
"created_at": "2019-03-08T12:27:12Z",
"updated_at": "2020-06-06T06:38:59Z",
"pushed_at": "2019-05-10T05:37:10Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
},
{
"id": 174948316,
"name": "CVE-2018-20250",
"full_name": "AeolusTF\/CVE-2018-20250",
"owner": {
"login": "AeolusTF",
"id": 29159416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29159416?v=4",
"html_url": "https:\/\/github.com\/AeolusTF"
},
"html_url": "https:\/\/github.com\/AeolusTF\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-03-11T07:33:45Z",
"updated_at": "2019-03-11T07:37:51Z",
"pushed_at": "2019-03-11T07:37:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 176534636,
"name": "Detect-CVE-2018-20250",
"full_name": "joydragon\/Detect-CVE-2018-20250",
"owner": {
"login": "joydragon",
"id": 4154219,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4154219?v=4",
"html_url": "https:\/\/github.com\/joydragon"
},
"html_url": "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250",
"description": "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250",
"fork": false,
"created_at": "2019-03-19T14:51:52Z",
"updated_at": "2019-03-19T15:03:27Z",
"pushed_at": "2019-03-19T15:03:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 177513614,
"name": "WinRar_ACE_exploit_CVE-2018-20250",
"full_name": "DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
"owner": {
"login": "DANIELVISPOBLOG",
"id": 26053534,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26053534?v=4",
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG"
},
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
"fork": false,
"created_at": "2019-03-25T04:22:14Z",
"updated_at": "2021-03-14T04:46:54Z",
"pushed_at": "2019-03-26T04:54:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"watchers": 4,
"score": 0
},
{
"id": 183341455,
"name": "CVE-2018-20250",
"full_name": "likescam\/CVE-2018-20250",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-20250",
"description": null,
"fork": false,
"created_at": "2019-04-25T02:30:50Z",
"updated_at": "2019-04-25T02:31:01Z",
"pushed_at": "2019-04-25T02:30:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 241136874,
"name": "CVE-2018-20250-WinRAR",
"full_name": "eastmountyxz\/CVE-2018-20250-WinRAR",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53172375?v=4",
"html_url": "https:\/\/github.com\/eastmountyxz"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR",
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601结合相关资源及文章实现。推荐大家结合作者博客复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者自己确实很菜但希望坚持下去一起加油",
"fork": false,
"created_at": "2020-02-17T15:08:22Z",
"updated_at": "2021-03-14T04:44:31Z",
"pushed_at": "2020-05-19T07:55:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263515438,
"name": "cve-2018-20250",
"full_name": "lxg5763\/cve-2018-20250",
"owner": {
"login": "lxg5763",
"id": 36142720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36142720?v=4",
"html_url": "https:\/\/github.com\/lxg5763"
},
"html_url": "https:\/\/github.com\/lxg5763\/cve-2018-20250",
"description": "CVE-2018-20250漏洞利用",
"fork": false,
"created_at": "2020-05-13T03:28:04Z",
"updated_at": "2020-05-13T03:28:16Z",
"pushed_at": "2020-05-13T03:28:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]