PoC-in-GitHub/2011/CVE-2011-2523.json
2024-12-27 03:31:45 +09:00

683 lines
No EOL
23 KiB
JSON

[
{
"id": 356390440,
"name": "vsftpd2.3.4PyExploit",
"full_name": "HerculesRD\/vsftpd2.3.4PyExploit",
"owner": {
"login": "HerculesRD",
"id": 73125772,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4",
"html_url": "https:\/\/github.com\/HerculesRD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HerculesRD\/vsftpd2.3.4PyExploit",
"description": "An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python",
"fork": false,
"created_at": "2021-04-09T20:26:01Z",
"updated_at": "2021-04-12T17:16:08Z",
"pushed_at": "2021-04-12T17:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 363437748,
"name": "CVE-2011-2523",
"full_name": "nobodyatall648\/CVE-2011-2523",
"owner": {
"login": "nobodyatall648",
"id": 35725871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
"html_url": "https:\/\/github.com\/nobodyatall648",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2011-2523",
"description": "vsftpd 2.3.4 Backdoor Exploit",
"fork": false,
"created_at": "2021-05-01T15:03:55Z",
"updated_at": "2023-08-21T04:47:15Z",
"pushed_at": "2021-06-25T19:05:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 401789640,
"name": "CVE-2011-2523",
"full_name": "Gr4ykt\/CVE-2011-2523",
"owner": {
"login": "Gr4ykt",
"id": 78503985,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78503985?v=4",
"html_url": "https:\/\/github.com\/Gr4ykt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gr4ykt\/CVE-2011-2523",
"description": "https:\/\/www.exploit-db.com\/exploits\/49757",
"fork": false,
"created_at": "2021-08-31T17:31:30Z",
"updated_at": "2021-08-31T17:34:41Z",
"pushed_at": "2021-08-31T17:34:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 425428807,
"name": "CVE-2011-2523",
"full_name": "padsalatushal\/CVE-2011-2523",
"owner": {
"login": "padsalatushal",
"id": 57517785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4",
"html_url": "https:\/\/github.com\/padsalatushal",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2021-11-07T06:20:27Z",
"updated_at": "2024-09-02T04:20:45Z",
"pushed_at": "2023-01-08T17:46:12Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"python",
"security",
"vsftpd-exploit"
],
"visibility": "public",
"forks": 2,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
{
"id": 497133986,
"name": "OffensivePascal-CVE-2011-2523",
"full_name": "MFernstrom\/OffensivePascal-CVE-2011-2523",
"owner": {
"login": "MFernstrom",
"id": 9220603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
"html_url": "https:\/\/github.com\/MFernstrom",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2011-2523",
"description": "FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523",
"fork": false,
"created_at": "2022-05-27T20:47:01Z",
"updated_at": "2022-05-29T18:03:07Z",
"pushed_at": "2022-05-28T00:24:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 501728395,
"name": "-CVE-2011-2523",
"full_name": "0xSojalSec\/-CVE-2011-2523",
"owner": {
"login": "0xSojalSec",
"id": 92203029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4",
"html_url": "https:\/\/github.com\/0xSojalSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xSojalSec\/-CVE-2011-2523",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-09T16:25:25Z",
"updated_at": "2024-08-12T20:23:59Z",
"pushed_at": "2022-06-09T16:31:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 501728828,
"name": "CVE-2011-2523",
"full_name": "0xSojalSec\/CVE-2011-2523",
"owner": {
"login": "0xSojalSec",
"id": 92203029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4",
"html_url": "https:\/\/github.com\/0xSojalSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xSojalSec\/CVE-2011-2523",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-09T16:26:43Z",
"updated_at": "2023-02-16T21:08:24Z",
"pushed_at": "2022-06-04T17:26:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 573823365,
"name": "CTF---CVE-2011-2523",
"full_name": "XiangSi-Howard\/CTF---CVE-2011-2523",
"owner": {
"login": "XiangSi-Howard",
"id": 54540850,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54540850?v=4",
"html_url": "https:\/\/github.com\/XiangSi-Howard",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiangSi-Howard\/CTF---CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2022-12-03T14:47:52Z",
"updated_at": "2022-12-03T14:47:52Z",
"pushed_at": "2022-12-04T15:22:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 597877966,
"name": "CVE-2011-2523",
"full_name": "cowsecurity\/CVE-2011-2523",
"owner": {
"login": "cowsecurity",
"id": 74612612,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74612612?v=4",
"html_url": "https:\/\/github.com\/cowsecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cowsecurity\/CVE-2011-2523",
"description": "CVE-2011-2523 exploit",
"fork": false,
"created_at": "2023-02-05T22:17:34Z",
"updated_at": "2023-04-01T15:46:38Z",
"pushed_at": "2023-02-05T22:19:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 638624173,
"name": "CVE-2011-2523",
"full_name": "Lynk4\/CVE-2011-2523",
"owner": {
"login": "Lynk4",
"id": 44930131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44930131?v=4",
"html_url": "https:\/\/github.com\/Lynk4",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Lynk4\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2023-05-09T18:44:05Z",
"updated_at": "2024-03-26T03:45:20Z",
"pushed_at": "2023-05-09T19:14:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"metasploitable",
"metasploitable-2",
"metasploitable-3",
"python",
"vsftpd-exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 705865634,
"name": "CVE-2011-2523",
"full_name": "vaishnavucv\/CVE-2011-2523",
"owner": {
"login": "vaishnavucv",
"id": 76824366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76824366?v=4",
"html_url": "https:\/\/github.com\/vaishnavucv",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vaishnavucv\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution ",
"fork": false,
"created_at": "2023-10-16T21:00:27Z",
"updated_at": "2024-10-22T16:11:18Z",
"pushed_at": "2024-10-22T16:11:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 723160395,
"name": "vsftpd-exploit",
"full_name": "chleba124\/vsftpd-exploit",
"owner": {
"login": "chleba124",
"id": 121700816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121700816?v=4",
"html_url": "https:\/\/github.com\/chleba124",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/chleba124\/vsftpd-exploit",
"description": "A tool that exploits the CVE-2011-2523 vulnerability.",
"fork": false,
"created_at": "2023-11-24T21:09:00Z",
"updated_at": "2024-03-02T06:59:24Z",
"pushed_at": "2024-03-02T07:04:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 724568768,
"name": "CVE-2011-2523-poc",
"full_name": "4m3rr0r\/CVE-2011-2523-poc",
"owner": {
"login": "4m3rr0r",
"id": 90191914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90191914?v=4",
"html_url": "https:\/\/github.com\/4m3rr0r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/4m3rr0r\/CVE-2011-2523-poc",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2023-11-28T10:52:33Z",
"updated_at": "2023-12-13T13:37:13Z",
"pushed_at": "2023-11-28T13:36:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"python",
"security",
"vsftpd-exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 767459057,
"name": "Exploit-CVE-2011-2523",
"full_name": "Shubham-2k1\/Exploit-CVE-2011-2523",
"owner": {
"login": "Shubham-2k1",
"id": 71768868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71768868?v=4",
"html_url": "https:\/\/github.com\/Shubham-2k1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Shubham-2k1\/Exploit-CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2024-03-05T10:31:42Z",
"updated_at": "2024-03-05T10:32:04Z",
"pushed_at": "2024-03-05T10:35:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 790562403,
"name": "SmileySploit",
"full_name": "Tenor-Z\/SmileySploit",
"owner": {
"login": "Tenor-Z",
"id": 55516164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55516164?v=4",
"html_url": "https:\/\/github.com\/Tenor-Z",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Tenor-Z\/SmileySploit",
"description": "A basic script that exploits CVE-2011-2523",
"fork": false,
"created_at": "2024-04-23T05:33:39Z",
"updated_at": "2024-04-23T05:36:57Z",
"pushed_at": "2024-04-23T05:36:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 806726183,
"name": "CVE-2011-2523-PoC",
"full_name": "0xB0y426\/CVE-2011-2523-PoC",
"owner": {
"login": "0xB0y426",
"id": 132174647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4",
"html_url": "https:\/\/github.com\/0xB0y426",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xB0y426\/CVE-2011-2523-PoC",
"description": "PoC CVE-2011-2523 ",
"fork": false,
"created_at": "2024-05-27T19:13:59Z",
"updated_at": "2024-09-15T18:39:16Z",
"pushed_at": "2024-05-27T19:16:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 815324755,
"name": "CVE-2011-2523",
"full_name": "sug4r-wr41th\/CVE-2011-2523",
"owner": {
"login": "sug4r-wr41th",
"id": 136193030,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136193030?v=4",
"html_url": "https:\/\/github.com\/sug4r-wr41th",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sug4r-wr41th\/CVE-2011-2523",
"description": "vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoC",
"fork": false,
"created_at": "2024-06-14T21:32:09Z",
"updated_at": "2024-11-22T07:39:06Z",
"pushed_at": "2024-06-15T18:03:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823495260,
"name": "CVE-Research",
"full_name": "AnugiArrawwala\/CVE-Research",
"owner": {
"login": "AnugiArrawwala",
"id": 141626082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141626082?v=4",
"html_url": "https:\/\/github.com\/AnugiArrawwala",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AnugiArrawwala\/CVE-Research",
"description": "CVE-2017-0144 (Eternal Blue) | CVE-2023-3881 | CVE-2011-2523",
"fork": false,
"created_at": "2024-07-03T06:30:54Z",
"updated_at": "2024-07-03T06:52:39Z",
"pushed_at": "2024-07-03T06:52:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 837704091,
"name": "vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"full_name": "Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"owner": {
"login": "Gill-Singh-A",
"id": 123238182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123238182?v=4",
"html_url": "https:\/\/github.com\/Gill-Singh-A",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"description": "A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4",
"fork": false,
"created_at": "2024-08-03T19:06:59Z",
"updated_at": "2024-11-20T16:30:59Z",
"pushed_at": "2024-08-03T19:07:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"ftp",
"python3",
"remote-exploit",
"ssh",
"vsftp"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 852500356,
"name": "vsFTPd-Backdoor-Exploit-CVE-2011-2523-",
"full_name": "everythingBlackkk\/vsFTPd-Backdoor-Exploit-CVE-2011-2523-",
"owner": {
"login": "everythingBlackkk",
"id": 142638957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142638957?v=4",
"html_url": "https:\/\/github.com\/everythingBlackkk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/everythingBlackkk\/vsFTPd-Backdoor-Exploit-CVE-2011-2523-",
"description": "This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523)",
"fork": false,
"created_at": "2024-09-04T23:10:14Z",
"updated_at": "2024-09-15T19:55:00Z",
"pushed_at": "2024-09-04T23:42:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 908317555,
"name": "CVE-2011-2523",
"full_name": "NullBrunk\/CVE-2011-2523",
"owner": {
"login": "NullBrunk",
"id": 125673909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125673909?v=4",
"html_url": "https:\/\/github.com\/NullBrunk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NullBrunk\/CVE-2011-2523",
"description": "VsFTPd 2.3.4 Backdoor Command Execution",
"fork": false,
"created_at": "2024-12-25T18:04:10Z",
"updated_at": "2024-12-26T13:05:44Z",
"pushed_at": "2024-12-26T13:05:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}
]