PoC-in-GitHub/2019/CVE-2019-0604.json
2024-12-17 21:33:34 +09:00

227 lines
No EOL
7.6 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 177246255,
"name": "CVE-2019-0604",
"full_name": "linhlhq\/CVE-2019-0604",
"owner": {
"login": "linhlhq",
"id": 28854132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28854132?v=4",
"html_url": "https:\/\/github.com\/linhlhq",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2024-12-17T10:35:30Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 134,
"score": 0,
"subscribers_count": 4
},
{
"id": 179413290,
"name": "CVE-2019-0604_sharepoint_CVE",
"full_name": "likekabin\/CVE-2019-0604_sharepoint_CVE",
"owner": {
"login": "likekabin",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likekabin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/likekabin\/CVE-2019-0604_sharepoint_CVE",
"description": null,
"fork": false,
"created_at": "2019-04-04T03:17:30Z",
"updated_at": "2024-08-12T19:47:35Z",
"pushed_at": "2019-04-04T03:17:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 193926769,
"name": "CVE-2019-0604",
"full_name": "k8gege\/CVE-2019-0604",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/k8gege\/CVE-2019-0604",
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2024-08-12T19:50:29Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2019-0604",
"exp",
"exploit",
"hacking",
"k8cscan",
"pentest",
"sharepoint"
],
"visibility": "public",
"forks": 67,
"watchers": 101,
"score": 0,
"subscribers_count": 4
},
{
"id": 208650796,
"name": "CVE-2019-0604",
"full_name": "m5050\/CVE-2019-0604",
"owner": {
"login": "m5050",
"id": 18764171,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18764171?v=4",
"html_url": "https:\/\/github.com\/m5050",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/m5050\/CVE-2019-0604",
"description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP",
"fork": false,
"created_at": "2019-09-15T20:06:54Z",
"updated_at": "2024-08-12T19:53:02Z",
"pushed_at": "2019-09-17T19:40:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 227013447,
"name": "CVE-2019-0604",
"full_name": "boxhg\/CVE-2019-0604",
"owner": {
"login": "boxhg",
"id": 40994449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40994449?v=4",
"html_url": "https:\/\/github.com\/boxhg",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/boxhg\/CVE-2019-0604",
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码动手制作自己的payload",
"fork": false,
"created_at": "2019-12-10T02:39:57Z",
"updated_at": "2024-08-12T19:55:36Z",
"pushed_at": "2021-04-02T09:12:32Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 30,
"score": 0,
"subscribers_count": 3
},
{
"id": 360506351,
"name": "weaponized-0604",
"full_name": "Gh0st0ne\/weaponized-0604",
"owner": {
"login": "Gh0st0ne",
"id": 47971115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47971115?v=4",
"html_url": "https:\/\/github.com\/Gh0st0ne",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gh0st0ne\/weaponized-0604",
"description": "Automated tool to exploit sharepoint CVE-2019-0604",
"fork": false,
"created_at": "2021-04-22T12:11:22Z",
"updated_at": "2024-09-30T10:43:25Z",
"pushed_at": "2021-02-12T14:04:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 687505103,
"name": "cve-2019-0604-SP2010-netv3.5",
"full_name": "davidlebr1\/cve-2019-0604-SP2010-netv3.5",
"owner": {
"login": "davidlebr1",
"id": 838845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/838845?v=4",
"html_url": "https:\/\/github.com\/davidlebr1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/davidlebr1\/cve-2019-0604-SP2010-netv3.5",
"description": "Generate Seralize Payload for CVE-2019-0604 for Sharepoint 2010 SP2 .net 3.5",
"fork": false,
"created_at": "2023-09-05T13:47:17Z",
"updated_at": "2023-09-05T13:51:36Z",
"pushed_at": "2023-09-05T13:51:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]