PoC-in-GitHub/2019/CVE-2019-7304.json
2021-05-18 06:11:34 +09:00

71 lines
No EOL
2.4 KiB
JSON

[
{
"id": 170261590,
"name": "dirty_sock",
"full_name": "initstring\/dirty_sock",
"owner": {
"login": "initstring",
"id": 26131150,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26131150?v=4",
"html_url": "https:\/\/github.com\/initstring"
},
"html_url": "https:\/\/github.com\/initstring\/dirty_sock",
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-05-16T11:32:58Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 568,
"watchers_count": 568,
"forks_count": 132,
"forks": 132,
"watchers": 568,
"score": 0
},
{
"id": 170741210,
"name": "CVE-2019-7304_DirtySock",
"full_name": "SecuritySi\/CVE-2019-7304_DirtySock",
"owner": {
"login": "SecuritySi",
"id": 7517443,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7517443?v=4",
"html_url": "https:\/\/github.com\/SecuritySi"
},
"html_url": "https:\/\/github.com\/SecuritySi\/CVE-2019-7304_DirtySock",
"description": "Payload Generator",
"fork": false,
"created_at": "2019-02-14T18:48:56Z",
"updated_at": "2019-03-05T06:03:09Z",
"pushed_at": "2019-02-14T18:49:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 352460406,
"name": "snap_priv_esc",
"full_name": "bendalisoftpro\/snap_priv_esc",
"owner": {
"login": "bendalisoftpro",
"id": 31170276,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31170276?v=4",
"html_url": "https:\/\/github.com\/bendalisoftpro"
},
"html_url": "https:\/\/github.com\/bendalisoftpro\/snap_priv_esc",
"description": "Another implementation for linux privilege escalation exploit via snap(d) (CVE-2019-7304)",
"fork": false,
"created_at": "2021-03-28T23:17:27Z",
"updated_at": "2021-03-28T23:31:24Z",
"pushed_at": "2021-03-28T23:31:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]