PoC-in-GitHub/2016/CVE-2016-10033.json
2020-03-10 18:07:38 +09:00

255 lines
No EOL
8.8 KiB
JSON

[
{
"id": 77386317,
"name": "exploit-CVE-2016-10033",
"full_name": "opsxcq\/exploit-CVE-2016-10033",
"owner": {
"login": "opsxcq",
"id": 16995025,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16995025?v=4",
"html_url": "https:\/\/github.com\/opsxcq"
},
"html_url": "https:\/\/github.com\/opsxcq\/exploit-CVE-2016-10033",
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2020-03-10T06:15:30Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 341,
"watchers_count": 341,
"forks_count": 129,
"forks": 129,
"watchers": 341,
"score": 0
},
{
"id": 77596573,
"name": "safeshell",
"full_name": "Zenexer\/safeshell",
"owner": {
"login": "Zenexer",
"id": 504130,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/504130?v=4",
"html_url": "https:\/\/github.com\/Zenexer"
},
"html_url": "https:\/\/github.com\/Zenexer\/safeshell",
"description": "Prevent PHP vulnerabilities similar to CVE-2016-10033 and CVE-2016-10045.",
"fork": false,
"created_at": "2016-12-29T08:29:20Z",
"updated_at": "2019-05-10T05:19:23Z",
"pushed_at": "2016-12-29T08:29:21Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"score": 0
},
{
"id": 90816233,
"name": "CVE-2016-10033",
"full_name": "GeneralTesler\/CVE-2016-10033",
"owner": {
"login": "GeneralTesler",
"id": 11621390,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11621390?v=4",
"html_url": "https:\/\/github.com\/GeneralTesler"
},
"html_url": "https:\/\/github.com\/GeneralTesler\/CVE-2016-10033",
"description": "RCE against WordPress 4.6; Python port of https:\/\/exploitbox.io\/vuln\/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html",
"fork": false,
"created_at": "2017-05-10T03:18:46Z",
"updated_at": "2020-02-15T11:28:03Z",
"pushed_at": "2017-05-10T03:32:56Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"score": 0
},
{
"id": 90859397,
"name": "CVE-2016-10033",
"full_name": "chipironcin\/CVE-2016-10033",
"owner": {
"login": "chipironcin",
"id": 3980637,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3980637?v=4",
"html_url": "https:\/\/github.com\/chipironcin"
},
"html_url": "https:\/\/github.com\/chipironcin\/CVE-2016-10033",
"description": "Code and vulnerable WordPress container for exploiting CVE-2016-10033",
"fork": false,
"created_at": "2017-05-10T12:01:07Z",
"updated_at": "2019-03-21T13:23:13Z",
"pushed_at": "2017-06-12T08:31:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 91805498,
"name": "CVE-2016-10033",
"full_name": "Bajunan\/CVE-2016-10033",
"owner": {
"login": "Bajunan",
"id": 21322263,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/21322263?v=4",
"html_url": "https:\/\/github.com\/Bajunan"
},
"html_url": "https:\/\/github.com\/Bajunan\/CVE-2016-10033",
"description": "WordPress 4.6 - Remote Code Execution (RCE) PoC Exploit",
"fork": false,
"created_at": "2017-05-19T12:52:21Z",
"updated_at": "2017-05-19T12:56:58Z",
"pushed_at": "2017-05-19T12:57:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 95639951,
"name": "CVE-2016-10033",
"full_name": "qwertyuiop12138\/CVE-2016-10033",
"owner": {
"login": "qwertyuiop12138",
"id": 29748162,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29748162?v=4",
"html_url": "https:\/\/github.com\/qwertyuiop12138"
},
"html_url": "https:\/\/github.com\/qwertyuiop12138\/CVE-2016-10033",
"description": null,
"fork": false,
"created_at": "2017-06-28T07:09:54Z",
"updated_at": "2017-06-28T07:09:54Z",
"pushed_at": "2017-06-28T07:09:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 98003871,
"name": "WP-CVE-2016-10033",
"full_name": "liusec\/WP-CVE-2016-10033",
"owner": {
"login": "liusec",
"id": 13982415,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13982415?v=4",
"html_url": "https:\/\/github.com\/liusec"
},
"html_url": "https:\/\/github.com\/liusec\/WP-CVE-2016-10033",
"description": null,
"fork": false,
"created_at": "2017-07-22T03:20:41Z",
"updated_at": "2017-07-22T03:22:49Z",
"pushed_at": "2017-07-22T03:22:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 111325445,
"name": "cve-2016-10033-45",
"full_name": "pedro823\/cve-2016-10033-45",
"owner": {
"login": "pedro823",
"id": 7110169,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7110169?v=4",
"html_url": "https:\/\/github.com\/pedro823"
},
"html_url": "https:\/\/github.com\/pedro823\/cve-2016-10033-45",
"description": "Exploits CVE-2016-10033 and CVE-2016-10045",
"fork": false,
"created_at": "2017-11-19T19:31:45Z",
"updated_at": "2018-09-29T06:11:33Z",
"pushed_at": "2017-11-19T19:32:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 120427992,
"name": "opsxcq-cve-2016-10033",
"full_name": "awidardi\/opsxcq-cve-2016-10033",
"owner": {
"login": "awidardi",
"id": 13718319,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13718319?v=4",
"html_url": "https:\/\/github.com\/awidardi"
},
"html_url": "https:\/\/github.com\/awidardi\/opsxcq-cve-2016-10033",
"description": "To solve CTFS.me problem",
"fork": false,
"created_at": "2018-02-06T08:59:14Z",
"updated_at": "2018-12-06T10:45:57Z",
"pushed_at": "2018-02-06T09:15:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 120918253,
"name": "CVE-2016-10033",
"full_name": "0x00-0x00\/CVE-2016-10033",
"owner": {
"login": "0x00-0x00",
"id": 23364530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
"html_url": "https:\/\/github.com\/0x00-0x00"
},
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2016-10033",
"description": "PHPMailer < 5.2.18 Remote Code Execution Exploit ",
"fork": false,
"created_at": "2018-02-09T14:53:51Z",
"updated_at": "2019-10-28T14:41:21Z",
"pushed_at": "2018-02-09T14:59:02Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 166266258,
"name": "cve-2016-10033",
"full_name": "cved-sources\/cve-2016-10033",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2016-10033",
"description": "cve-2016-10033",
"fork": false,
"created_at": "2019-01-17T17:20:24Z",
"updated_at": "2019-02-01T21:20:18Z",
"pushed_at": "2019-02-01T21:20:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]