PoC-in-GitHub/2017/CVE-2017-9805.json
2020-10-30 18:09:11 +09:00

255 lines
No EOL
9 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 102583828,
"name": "struts-rce-cve-2017-9805",
"full_name": "luc10\/struts-rce-cve-2017-9805",
"owner": {
"login": "luc10",
"id": 7849730,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849730?v=4",
"html_url": "https:\/\/github.com\/luc10"
},
"html_url": "https:\/\/github.com\/luc10\/struts-rce-cve-2017-9805",
"description": "CVE 2017-9805",
"fork": false,
"created_at": "2017-09-06T08:32:01Z",
"updated_at": "2020-10-30T07:21:49Z",
"pushed_at": "2020-08-31T04:34:29Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 27,
"forks": 27,
"watchers": 53,
"score": 0
},
{
"id": 102714061,
"name": "struts2-rce-cve-2017-9805-ruby",
"full_name": "hahwul\/struts2-rce-cve-2017-9805-ruby",
"owner": {
"login": "hahwul",
"id": 13212227,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13212227?v=4",
"html_url": "https:\/\/github.com\/hahwul"
},
"html_url": "https:\/\/github.com\/hahwul\/struts2-rce-cve-2017-9805-ruby",
"description": "cve -2017-9805",
"fork": false,
"created_at": "2017-09-07T08:49:14Z",
"updated_at": "2017-09-07T08:56:34Z",
"pushed_at": "2017-09-07T08:55:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"forks": 4,
"watchers": 0,
"score": 0
},
{
"id": 102917821,
"name": "struts-pwn_CVE-2017-9805",
"full_name": "mazen160\/struts-pwn_CVE-2017-9805",
"owner": {
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160"
},
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2020-09-30T09:10:48Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 236,
"watchers_count": 236,
"forks_count": 76,
"forks": 76,
"watchers": 236,
"score": 0
},
{
"id": 103005989,
"name": "apache-struts-pwn_CVE-2017-9805",
"full_name": "Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"owner": {
"login": "Lone-Ranger",
"id": 15882470,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15882470?v=4",
"html_url": "https:\/\/github.com\/Lone-Ranger"
},
"html_url": "https:\/\/github.com\/Lone-Ranger\/apache-struts-pwn_CVE-2017-9805",
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-10T05:26:03Z",
"updated_at": "2019-11-29T07:51:20Z",
"pushed_at": "2017-09-10T05:28:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 7,
"forks": 7,
"watchers": 2,
"score": 0
},
{
"id": 111928630,
"name": "-CVE-2017-9805",
"full_name": "0x00-0x00\/-CVE-2017-9805",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/-CVE-2017-9805",
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)",
"fork": false,
"created_at": "2017-11-24T14:46:35Z",
"updated_at": "2020-08-23T14:42:02Z",
"pushed_at": "2018-02-09T00:22:16Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks": 5,
"watchers": 10,
"score": 0
},
{
"id": 112276528,
"name": "S2-052",
"full_name": "BeyondCy\/S2-052",
"owner": {
"login": "BeyondCy",
"id": 4694785,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4694785?v=4",
"html_url": "https:\/\/github.com\/BeyondCy"
},
"html_url": "https:\/\/github.com\/BeyondCy\/S2-052",
"description": "CVE-2017-9805 - Exploit",
"fork": false,
"created_at": "2017-11-28T02:46:07Z",
"updated_at": "2020-09-24T10:36:34Z",
"pushed_at": "2017-10-20T21:04:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 113078841,
"name": "cve-2017-9805.py",
"full_name": "chrisjd20\/cve-2017-9805.py",
"owner": {
"login": "chrisjd20",
"id": 11812223,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/11812223?v=4",
"html_url": "https:\/\/github.com\/chrisjd20"
},
"html_url": "https:\/\/github.com\/chrisjd20\/cve-2017-9805.py",
"description": "Better Exploit Code For CVE 2017 9805 apache struts",
"fork": false,
"created_at": "2017-12-04T18:23:53Z",
"updated_at": "2019-09-28T07:29:05Z",
"pushed_at": "2017-12-23T14:07:59Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 7,
"forks": 7,
"watchers": 20,
"score": 0
},
{
"id": 205600969,
"name": "struts_rest_rce_fuzz-CVE-2017-9805-",
"full_name": "UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-",
"owner": {
"login": "UbuntuStrike",
"id": 30779753,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30779753?v=4",
"html_url": "https:\/\/github.com\/UbuntuStrike"
},
"html_url": "https:\/\/github.com\/UbuntuStrike\/struts_rest_rce_fuzz-CVE-2017-9805-",
"description": "Simple python script to fuzz site for CVE-2017-9805",
"fork": false,
"created_at": "2019-08-31T22:06:31Z",
"updated_at": "2019-08-31T23:36:02Z",
"pushed_at": "2019-08-31T23:36:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 205945238,
"name": "CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"full_name": "UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"owner": {
"login": "UbuntuStrike",
"id": 30779753,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30779753?v=4",
"html_url": "https:\/\/github.com\/UbuntuStrike"
},
"html_url": "https:\/\/github.com\/UbuntuStrike\/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit",
"description": "A script to Fuzz and and exploit Apache struts CVE-2017-9805",
"fork": false,
"created_at": "2019-09-02T22:24:07Z",
"updated_at": "2020-06-18T02:43:56Z",
"pushed_at": "2019-09-02T22:36:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 253274048,
"name": "CVE-2017-9805-Exploit",
"full_name": "0xd3vil\/CVE-2017-9805-Exploit",
"owner": {
"login": "0xd3vil",
"id": 32324065,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/32324065?v=4",
"html_url": "https:\/\/github.com\/0xd3vil"
},
"html_url": "https:\/\/github.com\/0xd3vil\/CVE-2017-9805-Exploit",
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
"fork": false,
"created_at": "2020-04-05T16:00:48Z",
"updated_at": "2020-05-17T13:37:07Z",
"pushed_at": "2020-05-17T13:37:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 263410855,
"name": "CVE-2017-9805---Documentation---IT19143378",
"full_name": "AvishkaSenadheera20\/CVE-2017-9805---Documentation---IT19143378",
"owner": {
"login": "AvishkaSenadheera20",
"id": 48066295,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48066295?v=4",
"html_url": "https:\/\/github.com\/AvishkaSenadheera20"
},
"html_url": "https:\/\/github.com\/AvishkaSenadheera20\/CVE-2017-9805---Documentation---IT19143378",
"description": null,
"fork": false,
"created_at": "2020-05-12T17:53:57Z",
"updated_at": "2020-05-12T18:15:38Z",
"pushed_at": "2020-05-12T18:15:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]