mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
209 lines
No EOL
7.4 KiB
JSON
209 lines
No EOL
7.4 KiB
JSON
[
|
|
{
|
|
"id": 110002512,
|
|
"name": "spring-data-rest-CVE-2017-8046",
|
|
"full_name": "sj\/spring-data-rest-CVE-2017-8046",
|
|
"owner": {
|
|
"login": "sj",
|
|
"id": 5082246,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5082246?v=4",
|
|
"html_url": "https:\/\/github.com\/sj"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sj\/spring-data-rest-CVE-2017-8046",
|
|
"description": "Fork of github.com\/spring-projects\/spring-data-rest (vulnerable to CVE-2017-8046)",
|
|
"fork": false,
|
|
"created_at": "2017-11-08T16:39:11Z",
|
|
"updated_at": "2018-03-08T02:37:48Z",
|
|
"pushed_at": "2020-06-15T20:06:50Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 124410900,
|
|
"name": "SpringBreakVulnerableApp",
|
|
"full_name": "m3ssap0\/SpringBreakVulnerableApp",
|
|
"owner": {
|
|
"login": "m3ssap0",
|
|
"id": 705120,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/705120?v=4",
|
|
"html_url": "https:\/\/github.com\/m3ssap0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/m3ssap0\/SpringBreakVulnerableApp",
|
|
"description": "WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk!",
|
|
"fork": false,
|
|
"created_at": "2018-03-08T15:29:44Z",
|
|
"updated_at": "2020-06-11T16:21:04Z",
|
|
"pushed_at": "2018-10-08T23:18:25Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"forks_count": 8,
|
|
"forks": 8,
|
|
"watchers": 10,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 124591869,
|
|
"name": "spring-break_cve-2017-8046",
|
|
"full_name": "m3ssap0\/spring-break_cve-2017-8046",
|
|
"owner": {
|
|
"login": "m3ssap0",
|
|
"id": 705120,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/705120?v=4",
|
|
"html_url": "https:\/\/github.com\/m3ssap0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/m3ssap0\/spring-break_cve-2017-8046",
|
|
"description": "This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).",
|
|
"fork": false,
|
|
"created_at": "2018-03-09T20:51:19Z",
|
|
"updated_at": "2020-09-22T10:03:27Z",
|
|
"pushed_at": "2019-10-28T14:19:02Z",
|
|
"stargazers_count": 14,
|
|
"watchers_count": 14,
|
|
"forks_count": 8,
|
|
"forks": 8,
|
|
"watchers": 14,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 124935868,
|
|
"name": "SpringBreakPoC",
|
|
"full_name": "FixYourFace\/SpringBreakPoC",
|
|
"owner": {
|
|
"login": "FixYourFace",
|
|
"id": 16994146,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/16994146?v=4",
|
|
"html_url": "https:\/\/github.com\/FixYourFace"
|
|
},
|
|
"html_url": "https:\/\/github.com\/FixYourFace\/SpringBreakPoC",
|
|
"description": "PoC for SpringBreak (CVE-2017-8046)",
|
|
"fork": false,
|
|
"created_at": "2018-03-12T18:49:45Z",
|
|
"updated_at": "2019-03-03T15:35:08Z",
|
|
"pushed_at": "2018-03-12T19:08:03Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 129776823,
|
|
"name": "spring-break-cve-2017-8046",
|
|
"full_name": "jkutner\/spring-break-cve-2017-8046",
|
|
"owner": {
|
|
"login": "jkutner",
|
|
"id": 1589,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1589?v=4",
|
|
"html_url": "https:\/\/github.com\/jkutner"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jkutner\/spring-break-cve-2017-8046",
|
|
"description": "This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).",
|
|
"fork": false,
|
|
"created_at": "2018-04-16T16:54:05Z",
|
|
"updated_at": "2018-08-09T02:14:12Z",
|
|
"pushed_at": "2018-04-16T17:00:37Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 150413982,
|
|
"name": "CVE-2017-8046",
|
|
"full_name": "bkhablenko\/CVE-2017-8046",
|
|
"owner": {
|
|
"login": "bkhablenko",
|
|
"id": 8275828,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8275828?v=4",
|
|
"html_url": "https:\/\/github.com\/bkhablenko"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bkhablenko\/CVE-2017-8046",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-09-26T11:11:40Z",
|
|
"updated_at": "2018-09-26T11:18:18Z",
|
|
"pushed_at": "2018-09-26T11:18:16Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 166270192,
|
|
"name": "cve-2017-8046",
|
|
"full_name": "cved-sources\/cve-2017-8046",
|
|
"owner": {
|
|
"login": "cved-sources",
|
|
"id": 46423677,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
|
"html_url": "https:\/\/github.com\/cved-sources"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-8046",
|
|
"description": "cve-2017-8046",
|
|
"fork": false,
|
|
"created_at": "2019-01-17T17:49:12Z",
|
|
"updated_at": "2020-03-06T03:07:08Z",
|
|
"pushed_at": "2019-02-01T21:28:38Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 183741969,
|
|
"name": "VulnerableSpringDataRest",
|
|
"full_name": "jsotiro\/VulnerableSpringDataRest",
|
|
"owner": {
|
|
"login": "jsotiro",
|
|
"id": 2410281,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/2410281?v=4",
|
|
"html_url": "https:\/\/github.com\/jsotiro"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jsotiro\/VulnerableSpringDataRest",
|
|
"description": "An intentionally vulnerable (CVE-2017-8046) SrpingData REST appl with Swagger Support for pentesting purposes",
|
|
"fork": false,
|
|
"created_at": "2019-04-27T07:23:53Z",
|
|
"updated_at": "2019-05-08T20:01:55Z",
|
|
"pushed_at": "2019-05-08T20:01:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 284192206,
|
|
"name": "CVE-2017-8046",
|
|
"full_name": "guanjivip\/CVE-2017-8046",
|
|
"owner": {
|
|
"login": "guanjivip",
|
|
"id": 13394144,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/13394144?v=4",
|
|
"html_url": "https:\/\/github.com\/guanjivip"
|
|
},
|
|
"html_url": "https:\/\/github.com\/guanjivip\/CVE-2017-8046",
|
|
"description": "修改IP地址即可实现命令执行",
|
|
"fork": false,
|
|
"created_at": "2020-08-01T05:15:42Z",
|
|
"updated_at": "2020-08-01T05:15:54Z",
|
|
"pushed_at": "2020-08-01T05:15:51Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |