PoC-in-GitHub/2017/CVE-2017-7494.json
2021-11-17 15:13:19 +09:00

413 lines
No EOL
15 KiB
JSON

[
{
"id": 92405414,
"name": "cve-2017-7494",
"full_name": "betab0t\/cve-2017-7494",
"owner": {
"login": "betab0t",
"id": 40000473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40000473?v=4",
"html_url": "https:\/\/github.com\/betab0t"
},
"html_url": "https:\/\/github.com\/betab0t\/cve-2017-7494",
"description": "Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)",
"fork": false,
"created_at": "2017-05-25T13:20:56Z",
"updated_at": "2021-11-08T10:36:09Z",
"pushed_at": "2017-07-26T13:07:51Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 182,
"score": 0
},
{
"id": 92410132,
"name": "CVE-2017-7494",
"full_name": "homjxi0e\/CVE-2017-7494",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-7494",
"description": null,
"fork": false,
"created_at": "2017-05-25T14:13:10Z",
"updated_at": "2017-05-26T08:46:45Z",
"pushed_at": "2017-05-26T08:46:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 92457464,
"name": "exploit-CVE-2017-7494",
"full_name": "opsxcq\/exploit-CVE-2017-7494",
"owner": {
"login": "opsxcq",
"id": 16995025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
"html_url": "https:\/\/github.com\/opsxcq"
},
"html_url": "https:\/\/github.com\/opsxcq\/exploit-CVE-2017-7494",
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2021-11-16T17:52:09Z",
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"topics": [
"exploit",
"linux",
"rce",
"samba",
"sambacry"
],
"visibility": "public",
"forks": 98,
"watchers": 290,
"score": 0
},
{
"id": 92484269,
"name": "SambaCry",
"full_name": "Waffles-2\/SambaCry",
"owner": {
"login": "Waffles-2",
"id": 21175535,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21175535?v=4",
"html_url": "https:\/\/github.com\/Waffles-2"
},
"html_url": "https:\/\/github.com\/Waffles-2\/SambaCry",
"description": "CVE-2017-7494 - Detection Scripts",
"fork": false,
"created_at": "2017-05-26T07:28:26Z",
"updated_at": "2021-09-06T16:37:43Z",
"pushed_at": "2017-05-26T07:43:02Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 62,
"score": 0
},
{
"id": 92845566,
"name": "SambaHunter",
"full_name": "brianwrf\/SambaHunter",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/SambaHunter",
"description": "It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).",
"fork": false,
"created_at": "2017-05-30T15:08:32Z",
"updated_at": "2021-10-31T07:06:28Z",
"pushed_at": "2021-10-31T07:06:25Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 39,
"score": 0
},
{
"id": 93424064,
"name": "CVE-2017-7494",
"full_name": "joxeankoret\/CVE-2017-7494",
"owner": {
"login": "joxeankoret",
"id": 2945834,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2945834?v=4",
"html_url": "https:\/\/github.com\/joxeankoret"
},
"html_url": "https:\/\/github.com\/joxeankoret\/CVE-2017-7494",
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2021-11-17T01:59:46Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 241,
"watchers_count": 241,
"forks_count": 80,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 241,
"score": 0
},
{
"id": 98615757,
"name": "Samba-CVE-2017-7494",
"full_name": "Zer0d0y\/Samba-CVE-2017-7494",
"owner": {
"login": "Zer0d0y",
"id": 7157524,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7157524?v=4",
"html_url": "https:\/\/github.com\/Zer0d0y"
},
"html_url": "https:\/\/github.com\/Zer0d0y\/Samba-CVE-2017-7494",
"description": "搭建漏洞利用测试环境",
"fork": false,
"created_at": "2017-07-28T06:21:29Z",
"updated_at": "2018-07-16T17:13:02Z",
"pushed_at": "2018-03-28T14:30:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 132869660,
"name": "CVE-2017-7494",
"full_name": "incredible1yu\/CVE-2017-7494",
"owner": {
"login": "incredible1yu",
"id": 39152132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39152132?v=4",
"html_url": "https:\/\/github.com\/incredible1yu"
},
"html_url": "https:\/\/github.com\/incredible1yu\/CVE-2017-7494",
"description": "CVE-2017-7494 C poc",
"fork": false,
"created_at": "2018-05-10T08:12:31Z",
"updated_at": "2018-05-10T08:29:03Z",
"pushed_at": "2018-05-10T08:29:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 164356178,
"name": "cve-2017-7494",
"full_name": "cved-sources\/cve-2017-7494",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-7494",
"description": "cve-2017-7494",
"fork": false,
"created_at": "2019-01-06T23:58:26Z",
"updated_at": "2021-04-15T21:26:56Z",
"pushed_at": "2021-04-15T21:26:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 230847942,
"name": "cve-2017-7494",
"full_name": "john-80\/cve-2017-7494",
"owner": {
"login": "john-80",
"id": 56648294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56648294?v=4",
"html_url": "https:\/\/github.com\/john-80"
},
"html_url": "https:\/\/github.com\/john-80\/cve-2017-7494",
"description": "samba 4.5.9 ",
"fork": false,
"created_at": "2019-12-30T04:33:39Z",
"updated_at": "2019-12-30T04:40:27Z",
"pushed_at": "2019-12-30T04:40:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 262877224,
"name": "CVE-2017-7494_IT19115344",
"full_name": "Hansindu-M\/CVE-2017-7494_IT19115344",
"owner": {
"login": "Hansindu-M",
"id": 61462694,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61462694?v=4",
"html_url": "https:\/\/github.com\/Hansindu-M"
},
"html_url": "https:\/\/github.com\/Hansindu-M\/CVE-2017-7494_IT19115344",
"description": "A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root.",
"fork": false,
"created_at": "2020-05-10T21:17:55Z",
"updated_at": "2020-05-11T11:32:16Z",
"pushed_at": "2020-05-11T11:32:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 365651593,
"name": "noSAMBAnoCRY-CVE-2017-7494",
"full_name": "m4udSec\/noSAMBAnoCRY-CVE-2017-7494",
"owner": {
"login": "m4udSec",
"id": 56730389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
"html_url": "https:\/\/github.com\/m4udSec"
},
"html_url": "https:\/\/github.com\/m4udSec\/noSAMBAnoCRY-CVE-2017-7494",
"description": "CVE-2017-7494 python exploit",
"fork": false,
"created_at": "2021-05-09T02:32:54Z",
"updated_at": "2021-08-27T10:16:49Z",
"pushed_at": "2021-08-27T10:16:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 367561413,
"name": "BIT-EternalBlue-for-macOS_Linux",
"full_name": "I-Rinka\/BIT-EternalBlue-for-macOS_Linux",
"owner": {
"login": "I-Rinka",
"id": 50841088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50841088?v=4",
"html_url": "https:\/\/github.com\/I-Rinka"
},
"html_url": "https:\/\/github.com\/I-Rinka\/BIT-EternalBlue-for-macOS_Linux",
"description": "Exploit CVE-2017-7494 for Net Security course final Assignment. This would reveal the vulnerability of services that run in administrative priority on Linux.",
"fork": false,
"created_at": "2021-05-15T06:52:23Z",
"updated_at": "2021-08-01T02:59:19Z",
"pushed_at": "2021-05-18T06:35:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 380894501,
"name": "CVE-2017-7494-payload",
"full_name": "yinyinmeimei\/CVE-2017-7494-payload",
"owner": {
"login": "yinyinmeimei",
"id": 74485428,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74485428?v=4",
"html_url": "https:\/\/github.com\/yinyinmeimei"
},
"html_url": "https:\/\/github.com\/yinyinmeimei\/CVE-2017-7494-payload",
"description": null,
"fork": false,
"created_at": "2021-06-28T03:29:02Z",
"updated_at": "2021-06-28T11:19:28Z",
"pushed_at": "2021-06-28T11:19:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 411821114,
"name": "-CVE-2017-7494-Samba-Exploit-POC",
"full_name": "adjaliya\/-CVE-2017-7494-Samba-Exploit-POC",
"owner": {
"login": "adjaliya",
"id": 74622486,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74622486?v=4",
"html_url": "https:\/\/github.com\/adjaliya"
},
"html_url": "https:\/\/github.com\/adjaliya\/-CVE-2017-7494-Samba-Exploit-POC",
"description": "According to researchers with Rapid7, over 110,000 devices appear on internet, which run stable Samba versions, while 92,500 seem to run unstable Samba versions, for which there is no fix. The newest Samba models, including the models 4.6.x before 4.6.4, 4.5.x before 4.5.10 and 3.5.0 before 4.4.13, was impacted by this error. May 24, 2017, Samba released version 4.6.4, which fixes a serious remote code execution vulnerability, vulnerability number CVE-2017-7494, which affected Samba 3.5.0 onwards. Vulnerability number: CVE-2017-7494 Severity Rating: High Affected software: • Samba Version < 4.6.4 • Samba Version < 4.5.10 • Samba Version < 4.4.14 Unaffected software: • Samba Version = 4.6.4 • Samba Version = 4.5.10 • Samba Version = 4.4.14",
"fork": false,
"created_at": "2021-09-29T20:31:20Z",
"updated_at": "2021-09-29T20:35:30Z",
"pushed_at": "2021-09-29T20:35:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]