PoC-in-GitHub/2018/CVE-2018-14847.json
2021-08-11 12:12:17 +09:00

209 lines
No EOL
7.6 KiB
JSON

[
{
"id": 138456315,
"name": "WinboxPoC",
"full_name": "BasuCert\/WinboxPoC",
"owner": {
"login": "BasuCert",
"id": 29852431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
"html_url": "https:\/\/github.com\/BasuCert"
},
"html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2021-08-11T03:07:57Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 436,
"watchers_count": 436,
"forks_count": 414,
"forks": 414,
"watchers": 436,
"score": 0
},
{
"id": 148370201,
"name": "WinboxExploit",
"full_name": "msterusky\/WinboxExploit",
"owner": {
"login": "msterusky",
"id": 29436829,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
"html_url": "https:\/\/github.com\/msterusky"
},
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
"fork": false,
"created_at": "2018-09-11T19:36:49Z",
"updated_at": "2021-03-13T16:56:42Z",
"pushed_at": "2018-09-11T20:12:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 152906288,
"name": "MikroRoot",
"full_name": "syrex1013\/MikroRoot",
"owner": {
"login": "syrex1013",
"id": 31669127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
"html_url": "https:\/\/github.com\/syrex1013"
},
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
"fork": false,
"created_at": "2018-10-13T19:17:42Z",
"updated_at": "2020-11-02T06:16:27Z",
"pushed_at": "2018-10-14T08:39:24Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 13,
"score": 0
},
{
"id": 161894724,
"name": "CVE-2018-14847",
"full_name": "jas502n\/CVE-2018-14847",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
"fork": false,
"created_at": "2018-12-15T10:38:26Z",
"updated_at": "2021-05-21T16:37:17Z",
"pushed_at": "2018-12-16T04:15:01Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"forks": 8,
"watchers": 18,
"score": 0
},
{
"id": 178807607,
"name": "winboxPOC",
"full_name": "th3f3n1x87\/winboxPOC",
"owner": {
"login": "th3f3n1x87",
"id": 15888700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15888700?v=4",
"html_url": "https:\/\/github.com\/th3f3n1x87"
},
"html_url": "https:\/\/github.com\/th3f3n1x87\/winboxPOC",
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
"fork": false,
"created_at": "2019-04-01T07:20:23Z",
"updated_at": "2020-03-24T14:07:22Z",
"pushed_at": "2019-02-18T09:51:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 188679903,
"name": "mikrotik-beast",
"full_name": "mahmoodsabir\/mikrotik-beast",
"owner": {
"login": "mahmoodsabir",
"id": 47719250,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4",
"html_url": "https:\/\/github.com\/mahmoodsabir"
},
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
"fork": false,
"created_at": "2019-05-26T12:26:55Z",
"updated_at": "2020-08-26T17:33:20Z",
"pushed_at": "2019-05-26T13:06:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 211658714,
"name": "Python-MikrotikLoginExploit",
"full_name": "sinichi449\/Python-MikrotikLoginExploit",
"owner": {
"login": "sinichi449",
"id": 44680392,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4",
"html_url": "https:\/\/github.com\/sinichi449"
},
"html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit",
"description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
"fork": false,
"created_at": "2019-09-29T12:21:16Z",
"updated_at": "2021-08-08T20:13:14Z",
"pushed_at": "2019-09-30T04:10:23Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"score": 0
},
{
"id": 259795725,
"name": "CVE-2018-14847",
"full_name": "yukar1z0e\/CVE-2018-14847",
"owner": {
"login": "yukar1z0e",
"id": 44317939,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
"html_url": "https:\/\/github.com\/yukar1z0e"
},
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847",
"description": null,
"fork": false,
"created_at": "2020-04-29T01:40:33Z",
"updated_at": "2020-05-18T07:48:01Z",
"pushed_at": "2020-05-18T07:47:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 360240266,
"name": "Mikrotik-router-hack",
"full_name": "hacker30468\/Mikrotik-router-hack",
"owner": {
"login": "hacker30468",
"id": 82890072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4",
"html_url": "https:\/\/github.com\/hacker30468"
},
"html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack",
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false,
"created_at": "2021-04-21T16:42:31Z",
"updated_at": "2021-04-21T16:46:39Z",
"pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]