mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
310 lines
No EOL
10 KiB
JSON
310 lines
No EOL
10 KiB
JSON
[
|
|
{
|
|
"id": 285161762,
|
|
"name": "CVE-2012-2982-Python-PoC",
|
|
"full_name": "cd6629\/CVE-2012-2982-Python-PoC",
|
|
"owner": {
|
|
"login": "cd6629",
|
|
"id": 63489620,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489620?v=4",
|
|
"html_url": "https:\/\/github.com\/cd6629"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cd6629\/CVE-2012-2982-Python-PoC",
|
|
"description": "This was converted from a metasploit module as an exercise for OSCP studying",
|
|
"fork": false,
|
|
"created_at": "2020-08-05T02:54:10Z",
|
|
"updated_at": "2024-01-01T13:58:52Z",
|
|
"pushed_at": "2020-10-30T19:56:54Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 307214937,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "OstojaOfficial\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "OstojaOfficial",
|
|
"id": 21225822,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21225822?v=4",
|
|
"html_url": "https:\/\/github.com\/OstojaOfficial"
|
|
},
|
|
"html_url": "https:\/\/github.com\/OstojaOfficial\/CVE-2012-2982",
|
|
"description": "Python exploit for CVE-2012-2982",
|
|
"fork": false,
|
|
"created_at": "2020-10-25T23:37:32Z",
|
|
"updated_at": "2021-10-16T16:16:43Z",
|
|
"pushed_at": "2020-10-25T23:53:20Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 349149619,
|
|
"name": "CVE-2012-2982_Python",
|
|
"full_name": "AlexJS6\/CVE-2012-2982_Python",
|
|
"owner": {
|
|
"login": "AlexJS6",
|
|
"id": 63366907,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63366907?v=4",
|
|
"html_url": "https:\/\/github.com\/AlexJS6"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AlexJS6\/CVE-2012-2982_Python",
|
|
"description": "PoC Python script as an exercice from tryhackme.",
|
|
"fork": false,
|
|
"created_at": "2021-03-18T16:47:43Z",
|
|
"updated_at": "2021-04-30T16:06:28Z",
|
|
"pushed_at": "2021-03-19T22:56:16Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 355021311,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "Ari-Weinberg\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "Ari-Weinberg",
|
|
"id": 67128976,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67128976?v=4",
|
|
"html_url": "https:\/\/github.com\/Ari-Weinberg"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ari-Weinberg\/CVE-2012-2982",
|
|
"description": "Exploit for CVE-2012-2982",
|
|
"fork": false,
|
|
"created_at": "2021-04-06T01:31:58Z",
|
|
"updated_at": "2021-04-06T01:35:54Z",
|
|
"pushed_at": "2021-04-06T01:35:52Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 402959369,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "JohnHammond\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "JohnHammond",
|
|
"id": 6288722,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
|
|
"html_url": "https:\/\/github.com\/JohnHammond"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2012-2982",
|
|
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
|
|
"fork": false,
|
|
"created_at": "2021-09-04T04:01:56Z",
|
|
"updated_at": "2024-01-20T08:46:27Z",
|
|
"pushed_at": "2021-09-28T16:14:13Z",
|
|
"stargazers_count": 38,
|
|
"watchers_count": 38,
|
|
"has_discussions": false,
|
|
"forks_count": 12,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 12,
|
|
"watchers": 38,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 437025849,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "R00tendo\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "R00tendo",
|
|
"id": 72181445,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72181445?v=4",
|
|
"html_url": "https:\/\/github.com\/R00tendo"
|
|
},
|
|
"html_url": "https:\/\/github.com\/R00tendo\/CVE-2012-2982",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-12-10T15:29:07Z",
|
|
"updated_at": "2022-06-04T18:05:57Z",
|
|
"pushed_at": "2023-03-10T13:09:08Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2012-2982"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 460158603,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "blu3ming\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "blu3ming",
|
|
"id": 25083316,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25083316?v=4",
|
|
"html_url": "https:\/\/github.com\/blu3ming"
|
|
},
|
|
"html_url": "https:\/\/github.com\/blu3ming\/CVE-2012-2982",
|
|
"description": "POC en Python para el CVE-2012-2982 mejorado del original por el usuario @OstojaOfficial",
|
|
"fork": false,
|
|
"created_at": "2022-02-16T20:00:36Z",
|
|
"updated_at": "2022-02-16T20:19:20Z",
|
|
"pushed_at": "2022-02-16T20:44:24Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 503979062,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "0xF331-D3AD\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "0xF331-D3AD",
|
|
"id": 107276306,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107276306?v=4",
|
|
"html_url": "https:\/\/github.com\/0xF331-D3AD"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xF331-D3AD\/CVE-2012-2982",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-06-16T01:59:28Z",
|
|
"updated_at": "2022-06-16T01:59:46Z",
|
|
"pushed_at": "2022-06-16T01:59:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 578599869,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "0xTas\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "0xTas",
|
|
"id": 103238549,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103238549?v=4",
|
|
"html_url": "https:\/\/github.com\/0xTas"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xTas\/CVE-2012-2982",
|
|
"description": "An exploit for CVE-2012-2982 implemented in Rust",
|
|
"fork": false,
|
|
"created_at": "2022-12-15T12:45:48Z",
|
|
"updated_at": "2024-01-21T01:34:28Z",
|
|
"pushed_at": "2022-12-15T15:35:15Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2012-2982",
|
|
"exploit",
|
|
"poc",
|
|
"rust",
|
|
"tryhackme"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 679476726,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "Dawnn3619\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "Dawnn3619",
|
|
"id": 103837282,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103837282?v=4",
|
|
"html_url": "https:\/\/github.com\/Dawnn3619"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Dawnn3619\/CVE-2012-2982",
|
|
"description": "Python Code For CVE-2012-2982",
|
|
"fork": false,
|
|
"created_at": "2023-08-16T23:58:49Z",
|
|
"updated_at": "2023-08-17T00:21:28Z",
|
|
"pushed_at": "2023-08-17T00:58:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |