mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 03:20:10 +01:00
163 lines
No EOL
6 KiB
JSON
163 lines
No EOL
6 KiB
JSON
[
|
||
{
|
||
"id": 171996551,
|
||
"name": "CVE-2018-20250",
|
||
"full_name": "WyAtu\/CVE-2018-20250",
|
||
"owner": {
|
||
"login": "WyAtu",
|
||
"id": 23521935,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23521935?v=4",
|
||
"html_url": "https:\/\/github.com\/WyAtu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-20250",
|
||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||
"fork": false,
|
||
"created_at": "2019-02-22T04:52:08Z",
|
||
"updated_at": "2021-02-01T03:25:43Z",
|
||
"pushed_at": "2019-08-05T10:45:34Z",
|
||
"stargazers_count": 426,
|
||
"watchers_count": 426,
|
||
"forks_count": 180,
|
||
"forks": 180,
|
||
"watchers": 426,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 174533873,
|
||
"name": "CVE-2018-20250-WINRAR-ACE-GUI",
|
||
"full_name": "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
|
||
"owner": {
|
||
"login": "arkangel-dev",
|
||
"id": 31138457,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31138457?v=4",
|
||
"html_url": "https:\/\/github.com\/arkangel-dev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
|
||
"description": "CVE-2018-20250-WINRAR-ACE Exploit with a UI",
|
||
"fork": false,
|
||
"created_at": "2019-03-08T12:27:12Z",
|
||
"updated_at": "2020-06-06T06:38:59Z",
|
||
"pushed_at": "2019-05-10T05:37:10Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 176534636,
|
||
"name": "Detect-CVE-2018-20250",
|
||
"full_name": "joydragon\/Detect-CVE-2018-20250",
|
||
"owner": {
|
||
"login": "joydragon",
|
||
"id": 4154219,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4154219?v=4",
|
||
"html_url": "https:\/\/github.com\/joydragon"
|
||
},
|
||
"html_url": "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250",
|
||
"description": "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250",
|
||
"fork": false,
|
||
"created_at": "2019-03-19T14:51:52Z",
|
||
"updated_at": "2019-03-19T15:03:27Z",
|
||
"pushed_at": "2019-03-19T15:03:26Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 177513614,
|
||
"name": "WinRar_ACE_exploit_CVE-2018-20250",
|
||
"full_name": "DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
|
||
"owner": {
|
||
"login": "DANIELVISPOBLOG",
|
||
"id": 26053534,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26053534?v=4",
|
||
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
|
||
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
|
||
"fork": false,
|
||
"created_at": "2019-03-25T04:22:14Z",
|
||
"updated_at": "2020-11-16T03:30:09Z",
|
||
"pushed_at": "2019-03-26T04:54:35Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 183341455,
|
||
"name": "CVE-2018-20250",
|
||
"full_name": "likescam\/CVE-2018-20250",
|
||
"owner": {
|
||
"login": "likescam",
|
||
"id": 2469038,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||
"html_url": "https:\/\/github.com\/likescam"
|
||
},
|
||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-20250",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-04-25T02:30:50Z",
|
||
"updated_at": "2019-04-25T02:31:01Z",
|
||
"pushed_at": "2019-04-25T02:30:59Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 241136874,
|
||
"name": "CVE-2018-20250-WinRAR",
|
||
"full_name": "eastmountyxz\/CVE-2018-20250-WinRAR",
|
||
"owner": {
|
||
"login": "eastmountyxz",
|
||
"id": 53172375,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53172375?v=4",
|
||
"html_url": "https:\/\/github.com\/eastmountyxz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR",
|
||
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者,自己确实很菜,但希望坚持下去,一起加油!",
|
||
"fork": false,
|
||
"created_at": "2020-02-17T15:08:22Z",
|
||
"updated_at": "2020-10-01T19:49:23Z",
|
||
"pushed_at": "2020-05-19T07:55:32Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 263515438,
|
||
"name": "cve-2018-20250",
|
||
"full_name": "lxg5763\/cve-2018-20250",
|
||
"owner": {
|
||
"login": "lxg5763",
|
||
"id": 36142720,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36142720?v=4",
|
||
"html_url": "https:\/\/github.com\/lxg5763"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lxg5763\/cve-2018-20250",
|
||
"description": "CVE-2018-20250漏洞利用",
|
||
"fork": false,
|
||
"created_at": "2020-05-13T03:28:04Z",
|
||
"updated_at": "2020-05-13T03:28:16Z",
|
||
"pushed_at": "2020-05-13T03:28:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |