PoC-in-GitHub/2015/CVE-2015-6967.json
2024-01-24 09:28:54 +09:00

122 lines
No EOL
4.2 KiB
JSON

[
{
"id": 342389978,
"name": "CVE-2015-6967",
"full_name": "dix0nym\/CVE-2015-6967",
"owner": {
"login": "dix0nym",
"id": 6306810,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6306810?v=4",
"html_url": "https:\/\/github.com\/dix0nym"
},
"html_url": "https:\/\/github.com\/dix0nym\/CVE-2015-6967",
"description": "Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)",
"fork": false,
"created_at": "2021-02-25T21:57:24Z",
"updated_at": "2024-01-23T19:39:41Z",
"pushed_at": "2021-02-25T22:04:14Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 481433279,
"name": "CVE-2015-6967",
"full_name": "0xConstant\/CVE-2015-6967",
"owner": {
"login": "0xConstant",
"id": 51972282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972282?v=4",
"html_url": "https:\/\/github.com\/0xConstant"
},
"html_url": "https:\/\/github.com\/0xConstant\/CVE-2015-6967",
"description": null,
"fork": false,
"created_at": "2022-04-14T01:57:39Z",
"updated_at": "2023-05-11T23:51:25Z",
"pushed_at": "2022-04-14T02:59:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 658921245,
"name": "CVE-2015-6967",
"full_name": "FredBrave\/CVE-2015-6967",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
"html_url": "https:\/\/github.com\/FredBrave"
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2015-6967",
"description": "An exploit for the Nibbles manager version 4.0.3. This exploit allows RCE to be performed.",
"fork": false,
"created_at": "2023-06-26T19:15:37Z",
"updated_at": "2023-06-26T19:16:19Z",
"pushed_at": "2023-06-26T19:17:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 714819480,
"name": "HTB_Nibbles",
"full_name": "3mpir3Albert\/HTB_Nibbles",
"owner": {
"login": "3mpir3Albert",
"id": 120676190,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120676190?v=4",
"html_url": "https:\/\/github.com\/3mpir3Albert"
},
"html_url": "https:\/\/github.com\/3mpir3Albert\/HTB_Nibbles",
"description": "In this repository you will find the technical report of Nibbles, the exploit to abuse the CVE-2015-6967 and an autopwn tool in case you want to resolve the machine in HackTheBox",
"fork": false,
"created_at": "2023-11-05T22:26:48Z",
"updated_at": "2023-11-05T22:54:44Z",
"pushed_at": "2023-11-05T22:51:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]