mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
209 lines
No EOL
7.4 KiB
JSON
209 lines
No EOL
7.4 KiB
JSON
[
|
||
{
|
||
"id": 201745739,
|
||
"name": "CVE-2018-13379",
|
||
"full_name": "milo2012\/CVE-2018-13379",
|
||
"owner": {
|
||
"login": "milo2012",
|
||
"id": 905335,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
|
||
"html_url": "https:\/\/github.com\/milo2012"
|
||
},
|
||
"html_url": "https:\/\/github.com\/milo2012\/CVE-2018-13379",
|
||
"description": "CVE-2018-13379",
|
||
"fork": false,
|
||
"created_at": "2019-08-11T09:44:37Z",
|
||
"updated_at": "2021-04-28T23:24:03Z",
|
||
"pushed_at": "2019-08-14T08:40:25Z",
|
||
"stargazers_count": 225,
|
||
"watchers_count": 225,
|
||
"forks_count": 82,
|
||
"forks": 82,
|
||
"watchers": 225,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 203047235,
|
||
"name": "at-doom-fortigate",
|
||
"full_name": "jpiechowka\/at-doom-fortigate",
|
||
"owner": {
|
||
"login": "jpiechowka",
|
||
"id": 9040085,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9040085?v=4",
|
||
"html_url": "https:\/\/github.com\/jpiechowka"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jpiechowka\/at-doom-fortigate",
|
||
"description": "Fortigate CVE-2018-13379 - Tool to search for vulnerable Fortigate hosts in Rapid7 Project Sonar data anonymously through The Tor network.",
|
||
"fork": false,
|
||
"created_at": "2019-08-18T19:24:48Z",
|
||
"updated_at": "2020-10-31T07:17:36Z",
|
||
"pushed_at": "2020-06-11T00:46:06Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 210555795,
|
||
"name": "FortiOS-Credentials-Disclosure",
|
||
"full_name": "0xHunter\/FortiOS-Credentials-Disclosure",
|
||
"owner": {
|
||
"login": "0xHunter",
|
||
"id": 55736997,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55736997?v=4",
|
||
"html_url": "https:\/\/github.com\/0xHunter"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xHunter\/FortiOS-Credentials-Disclosure",
|
||
"description": "CVE-2018-13379 Exploit",
|
||
"fork": false,
|
||
"created_at": "2019-09-24T08:49:46Z",
|
||
"updated_at": "2021-04-15T14:33:02Z",
|
||
"pushed_at": "2019-09-24T08:51:28Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 5,
|
||
"forks": 5,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 214945628,
|
||
"name": "cve2018-13379-nmap-script",
|
||
"full_name": "Blazz3\/cve2018-13379-nmap-script",
|
||
"owner": {
|
||
"login": "Blazz3",
|
||
"id": 33965605,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33965605?v=4",
|
||
"html_url": "https:\/\/github.com\/Blazz3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Blazz3\/cve2018-13379-nmap-script",
|
||
"description": "CVE-2018-13379 Script for Nmap NSE.",
|
||
"fork": false,
|
||
"created_at": "2019-10-14T04:09:44Z",
|
||
"updated_at": "2021-01-20T12:22:19Z",
|
||
"pushed_at": "2020-09-09T05:06:05Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 264794936,
|
||
"name": "CVE-2018-13379",
|
||
"full_name": "yukar1z0e\/CVE-2018-13379",
|
||
"owner": {
|
||
"login": "yukar1z0e",
|
||
"id": 44317939,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
|
||
"html_url": "https:\/\/github.com\/yukar1z0e"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-13379",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-18T01:37:13Z",
|
||
"updated_at": "2020-05-21T03:59:32Z",
|
||
"pushed_at": "2020-05-21T03:59:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 296403562,
|
||
"name": "CVE-2018-13379-FortinetVPN",
|
||
"full_name": "pwn3z\/CVE-2018-13379-FortinetVPN",
|
||
"owner": {
|
||
"login": "pwn3z",
|
||
"id": 71440287,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
|
||
"html_url": "https:\/\/github.com\/pwn3z"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2018-13379-FortinetVPN",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-09-17T18:00:11Z",
|
||
"updated_at": "2020-11-05T21:41:35Z",
|
||
"pushed_at": "2020-11-05T21:41:32Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 314373083,
|
||
"name": "CVE-2018-13379-Fortinet",
|
||
"full_name": "k4nfr3\/CVE-2018-13379-Fortinet",
|
||
"owner": {
|
||
"login": "k4nfr3",
|
||
"id": 45294916,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45294916?v=4",
|
||
"html_url": "https:\/\/github.com\/k4nfr3"
|
||
},
|
||
"html_url": "https:\/\/github.com\/k4nfr3\/CVE-2018-13379-Fortinet",
|
||
"description": "FortiVuln",
|
||
"fork": false,
|
||
"created_at": "2020-11-19T21:22:25Z",
|
||
"updated_at": "2020-11-19T21:35:02Z",
|
||
"pushed_at": "2020-11-19T21:35:00Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 317160237,
|
||
"name": "fortios_vpnssl_traversal_leak",
|
||
"full_name": "Zeop-CyberSec\/fortios_vpnssl_traversal_leak",
|
||
"owner": {
|
||
"login": "Zeop-CyberSec",
|
||
"id": 68154603,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
|
||
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/fortios_vpnssl_traversal_leak",
|
||
"description": "This module massively scan and exploit a path traversal vulnerability in the FortiOS SSL VPN web portal may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests (CVE-2018-13379).",
|
||
"fork": false,
|
||
"created_at": "2020-11-30T08:39:05Z",
|
||
"updated_at": "2021-04-15T06:40:36Z",
|
||
"pushed_at": "2021-02-26T13:40:57Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 321338247,
|
||
"name": "CVE-2018-13379",
|
||
"full_name": "B1anda0\/CVE-2018-13379",
|
||
"owner": {
|
||
"login": "B1anda0",
|
||
"id": 74232513,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
|
||
"html_url": "https:\/\/github.com\/B1anda0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2018-13379",
|
||
"description": "Fortinet FortiOS路径遍历漏洞 (CVE-2018-13379)批量检测脚本",
|
||
"fork": false,
|
||
"created_at": "2020-12-14T12:17:03Z",
|
||
"updated_at": "2021-04-14T19:44:41Z",
|
||
"pushed_at": "2020-12-14T12:20:00Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 8,
|
||
"score": 0
|
||
}
|
||
] |