mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
186 lines
No EOL
6.5 KiB
JSON
186 lines
No EOL
6.5 KiB
JSON
[
|
|
{
|
|
"id": 260659368,
|
|
"name": "CVE-2020-10977",
|
|
"full_name": "KooroshRZ\/CVE-2020-10977",
|
|
"owner": {
|
|
"login": "KooroshRZ",
|
|
"id": 24431926,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24431926?v=4",
|
|
"html_url": "https:\/\/github.com\/KooroshRZ"
|
|
},
|
|
"html_url": "https:\/\/github.com\/KooroshRZ\/CVE-2020-10977",
|
|
"description": "Exploit for \"GitLab Instance\" Arbitrary server file read vulnerability",
|
|
"fork": false,
|
|
"created_at": "2020-05-02T10:03:31Z",
|
|
"updated_at": "2021-03-30T01:51:50Z",
|
|
"pushed_at": "2020-05-15T08:30:48Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 314596440,
|
|
"name": "cve-2020-10977",
|
|
"full_name": "thewhiteh4t\/cve-2020-10977",
|
|
"owner": {
|
|
"login": "thewhiteh4t",
|
|
"id": 36354846,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
|
|
"html_url": "https:\/\/github.com\/thewhiteh4t"
|
|
},
|
|
"html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2020-10977",
|
|
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
|
"fork": false,
|
|
"created_at": "2020-11-20T15:40:03Z",
|
|
"updated_at": "2021-07-15T17:57:45Z",
|
|
"pushed_at": "2021-04-23T19:21:16Z",
|
|
"stargazers_count": 46,
|
|
"watchers_count": 46,
|
|
"forks_count": 21,
|
|
"forks": 21,
|
|
"watchers": 46,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 316070312,
|
|
"name": "CVE-2020-10977.py",
|
|
"full_name": "JustMichi\/CVE-2020-10977.py",
|
|
"owner": {
|
|
"login": "JustMichi",
|
|
"id": 10670516,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10670516?v=4",
|
|
"html_url": "https:\/\/github.com\/JustMichi"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JustMichi\/CVE-2020-10977.py",
|
|
"description": "authenticated arbitrary file read for Gitlab (CVE-2020-10977)",
|
|
"fork": false,
|
|
"created_at": "2020-11-25T22:48:26Z",
|
|
"updated_at": "2020-11-26T19:40:32Z",
|
|
"pushed_at": "2020-11-26T19:40:30Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 332278953,
|
|
"name": "cve-2020-10977",
|
|
"full_name": "JayHerlth\/cve-2020-10977",
|
|
"owner": {
|
|
"login": "JayHerlth",
|
|
"id": 5582132,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582132?v=4",
|
|
"html_url": "https:\/\/github.com\/JayHerlth"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JayHerlth\/cve-2020-10977",
|
|
"description": "GitLab 12.9 Arbitrary File Read",
|
|
"fork": false,
|
|
"created_at": "2021-01-23T18:21:27Z",
|
|
"updated_at": "2021-01-23T18:34:06Z",
|
|
"pushed_at": "2021-01-23T18:34:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 334197749,
|
|
"name": "gitlab-12.9.0-file-read",
|
|
"full_name": "erk3\/gitlab-12.9.0-file-read",
|
|
"owner": {
|
|
"login": "erk3",
|
|
"id": 3186136,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3186136?v=4",
|
|
"html_url": "https:\/\/github.com\/erk3"
|
|
},
|
|
"html_url": "https:\/\/github.com\/erk3\/gitlab-12.9.0-file-read",
|
|
"description": "A (wanted to be) better script than what can be found on exploit-db about the authenticated arbitrary read file on GitLab v12.9.0 (CVE-2020-10977)",
|
|
"fork": false,
|
|
"created_at": "2021-01-29T16:17:10Z",
|
|
"updated_at": "2021-01-29T17:54:42Z",
|
|
"pushed_at": "2021-01-29T17:54:27Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345284390,
|
|
"name": "CVE-2020-10977",
|
|
"full_name": "Liath\/CVE-2020-10977",
|
|
"owner": {
|
|
"login": "Liath",
|
|
"id": 1565435,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1565435?v=4",
|
|
"html_url": "https:\/\/github.com\/Liath"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Liath\/CVE-2020-10977",
|
|
"description": "Gitlab v12.4.0-8.1 RCE",
|
|
"fork": false,
|
|
"created_at": "2021-03-07T07:26:38Z",
|
|
"updated_at": "2021-03-25T07:02:30Z",
|
|
"pushed_at": "2021-03-07T07:28:59Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 356786384,
|
|
"name": "cve-2020-10977-read-and-execute",
|
|
"full_name": "lisp3r\/cve-2020-10977-read-and-execute",
|
|
"owner": {
|
|
"login": "lisp3r",
|
|
"id": 6272944,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6272944?v=4",
|
|
"html_url": "https:\/\/github.com\/lisp3r"
|
|
},
|
|
"html_url": "https:\/\/github.com\/lisp3r\/cve-2020-10977-read-and-execute",
|
|
"description": "cve-2020-10977 read and execute",
|
|
"fork": false,
|
|
"created_at": "2021-04-11T06:31:06Z",
|
|
"updated_at": "2021-04-23T20:13:51Z",
|
|
"pushed_at": "2021-04-23T20:13:49Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 363605353,
|
|
"name": "gitlab-cve-2020-10977",
|
|
"full_name": "nickvdyck\/gitlab-cve-2020-10977",
|
|
"owner": {
|
|
"login": "nickvdyck",
|
|
"id": 6469315,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6469315?v=4",
|
|
"html_url": "https:\/\/github.com\/nickvdyck"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nickvdyck\/gitlab-cve-2020-10977",
|
|
"description": "GitLab Arbitrary File Read Exploit",
|
|
"fork": false,
|
|
"created_at": "2021-05-02T08:45:03Z",
|
|
"updated_at": "2021-05-04T22:25:53Z",
|
|
"pushed_at": "2021-05-04T22:25:51Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |