PoC-in-GitHub/2018/CVE-2018-6789.json
2021-01-22 00:10:20 +09:00

94 lines
No EOL
3.2 KiB
JSON

[
{
"id": 125541441,
"name": "exim-vuln-poc",
"full_name": "c0llision\/exim-vuln-poc",
"owner": {
"login": "c0llision",
"id": 32601427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32601427?v=4",
"html_url": "https:\/\/github.com\/c0llision"
},
"html_url": "https:\/\/github.com\/c0llision\/exim-vuln-poc",
"description": "CVE-2018-6789",
"fork": false,
"created_at": "2018-03-16T16:21:22Z",
"updated_at": "2018-05-03T17:20:25Z",
"pushed_at": "2018-05-03T17:20:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 156674030,
"name": "CVE-2018-6789",
"full_name": "beraphin\/CVE-2018-6789",
"owner": {
"login": "beraphin",
"id": 25315905,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315905?v=4",
"html_url": "https:\/\/github.com\/beraphin"
},
"html_url": "https:\/\/github.com\/beraphin\/CVE-2018-6789",
"description": null,
"fork": false,
"created_at": "2018-11-08T08:25:42Z",
"updated_at": "2020-03-06T03:34:15Z",
"pushed_at": "2020-03-06T03:34:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 214143215,
"name": "Exim-CVE-2018-6789",
"full_name": "synacktiv\/Exim-CVE-2018-6789",
"owner": {
"login": "synacktiv",
"id": 50145679,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
"html_url": "https:\/\/github.com\/synacktiv"
},
"html_url": "https:\/\/github.com\/synacktiv\/Exim-CVE-2018-6789",
"description": "PoC materials to exploit CVE-2018-6789",
"fork": false,
"created_at": "2019-10-10T09:36:03Z",
"updated_at": "2020-06-29T20:41:40Z",
"pushed_at": "2019-10-10T09:54:07Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
},
{
"id": 244424491,
"name": "exim-rce-cve-2018-6789",
"full_name": "martinclauss\/exim-rce-cve-2018-6789",
"owner": {
"login": "martinclauss",
"id": 51541424,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51541424?v=4",
"html_url": "https:\/\/github.com\/martinclauss"
},
"html_url": "https:\/\/github.com\/martinclauss\/exim-rce-cve-2018-6789",
"description": "This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.",
"fork": false,
"created_at": "2020-03-02T16:53:02Z",
"updated_at": "2020-03-14T20:40:04Z",
"pushed_at": "2020-03-03T07:57:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}
]