mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
255 lines
No EOL
8.8 KiB
JSON
255 lines
No EOL
8.8 KiB
JSON
[
|
|
{
|
|
"id": 77386317,
|
|
"name": "exploit-CVE-2016-10033",
|
|
"full_name": "opsxcq\/exploit-CVE-2016-10033",
|
|
"owner": {
|
|
"login": "opsxcq",
|
|
"id": 16995025,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16995025?v=4",
|
|
"html_url": "https:\/\/github.com\/opsxcq"
|
|
},
|
|
"html_url": "https:\/\/github.com\/opsxcq\/exploit-CVE-2016-10033",
|
|
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
|
"fork": false,
|
|
"created_at": "2016-12-26T13:39:03Z",
|
|
"updated_at": "2020-12-29T20:01:05Z",
|
|
"pushed_at": "2019-10-13T12:23:02Z",
|
|
"stargazers_count": 355,
|
|
"watchers_count": 355,
|
|
"forks_count": 140,
|
|
"forks": 140,
|
|
"watchers": 355,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 77596573,
|
|
"name": "safeshell",
|
|
"full_name": "Zenexer\/safeshell",
|
|
"owner": {
|
|
"login": "Zenexer",
|
|
"id": 504130,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/504130?v=4",
|
|
"html_url": "https:\/\/github.com\/Zenexer"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Zenexer\/safeshell",
|
|
"description": "Prevent PHP vulnerabilities similar to CVE-2016-10033 and CVE-2016-10045.",
|
|
"fork": false,
|
|
"created_at": "2016-12-29T08:29:20Z",
|
|
"updated_at": "2020-03-26T18:08:07Z",
|
|
"pushed_at": "2016-12-29T08:29:21Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 8,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 90816233,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "GeneralTesler\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "GeneralTesler",
|
|
"id": 11621390,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11621390?v=4",
|
|
"html_url": "https:\/\/github.com\/GeneralTesler"
|
|
},
|
|
"html_url": "https:\/\/github.com\/GeneralTesler\/CVE-2016-10033",
|
|
"description": "RCE against WordPress 4.6; Python port of https:\/\/exploitbox.io\/vuln\/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html",
|
|
"fork": false,
|
|
"created_at": "2017-05-10T03:18:46Z",
|
|
"updated_at": "2020-05-15T04:20:49Z",
|
|
"pushed_at": "2017-05-10T03:32:56Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 90859397,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "chipironcin\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "chipironcin",
|
|
"id": 3980637,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3980637?v=4",
|
|
"html_url": "https:\/\/github.com\/chipironcin"
|
|
},
|
|
"html_url": "https:\/\/github.com\/chipironcin\/CVE-2016-10033",
|
|
"description": "Code and vulnerable WordPress container for exploiting CVE-2016-10033",
|
|
"fork": false,
|
|
"created_at": "2017-05-10T12:01:07Z",
|
|
"updated_at": "2020-12-29T03:25:31Z",
|
|
"pushed_at": "2017-06-12T08:31:52Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 6,
|
|
"forks": 6,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 91805498,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "Bajunan\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "Bajunan",
|
|
"id": 21322263,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/21322263?v=4",
|
|
"html_url": "https:\/\/github.com\/Bajunan"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Bajunan\/CVE-2016-10033",
|
|
"description": "WordPress 4.6 - Remote Code Execution (RCE) PoC Exploit",
|
|
"fork": false,
|
|
"created_at": "2017-05-19T12:52:21Z",
|
|
"updated_at": "2017-05-19T12:56:58Z",
|
|
"pushed_at": "2017-05-19T12:57:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 95639951,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "qwertyuiop12138\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "qwertyuiop12138",
|
|
"id": 29748162,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/29748162?v=4",
|
|
"html_url": "https:\/\/github.com\/qwertyuiop12138"
|
|
},
|
|
"html_url": "https:\/\/github.com\/qwertyuiop12138\/CVE-2016-10033",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-06-28T07:09:54Z",
|
|
"updated_at": "2017-06-28T07:09:54Z",
|
|
"pushed_at": "2017-06-28T07:09:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 98003871,
|
|
"name": "WP-CVE-2016-10033",
|
|
"full_name": "liusec\/WP-CVE-2016-10033",
|
|
"owner": {
|
|
"login": "liusec",
|
|
"id": 13982415,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13982415?v=4",
|
|
"html_url": "https:\/\/github.com\/liusec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/liusec\/WP-CVE-2016-10033",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-07-22T03:20:41Z",
|
|
"updated_at": "2017-07-22T03:22:49Z",
|
|
"pushed_at": "2017-07-22T03:22:48Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 111325445,
|
|
"name": "cve-2016-10033-45",
|
|
"full_name": "pedro823\/cve-2016-10033-45",
|
|
"owner": {
|
|
"login": "pedro823",
|
|
"id": 7110169,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7110169?v=4",
|
|
"html_url": "https:\/\/github.com\/pedro823"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pedro823\/cve-2016-10033-45",
|
|
"description": "Exploits CVE-2016-10033 and CVE-2016-10045",
|
|
"fork": false,
|
|
"created_at": "2017-11-19T19:31:45Z",
|
|
"updated_at": "2018-09-29T06:11:33Z",
|
|
"pushed_at": "2017-11-19T19:32:13Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 120427992,
|
|
"name": "opsxcq-cve-2016-10033",
|
|
"full_name": "awidardi\/opsxcq-cve-2016-10033",
|
|
"owner": {
|
|
"login": "awidardi",
|
|
"id": 13718319,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13718319?v=4",
|
|
"html_url": "https:\/\/github.com\/awidardi"
|
|
},
|
|
"html_url": "https:\/\/github.com\/awidardi\/opsxcq-cve-2016-10033",
|
|
"description": "To solve CTFS.me problem",
|
|
"fork": false,
|
|
"created_at": "2018-02-06T08:59:14Z",
|
|
"updated_at": "2018-12-06T10:45:57Z",
|
|
"pushed_at": "2018-02-06T09:15:38Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 120918253,
|
|
"name": "CVE-2016-10033",
|
|
"full_name": "0x00-0x00\/CVE-2016-10033",
|
|
"owner": {
|
|
"login": "0x00-0x00",
|
|
"id": 23364530,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
|
"html_url": "https:\/\/github.com\/0x00-0x00"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2016-10033",
|
|
"description": "PHPMailer < 5.2.18 Remote Code Execution Exploit ",
|
|
"fork": false,
|
|
"created_at": "2018-02-09T14:53:51Z",
|
|
"updated_at": "2020-12-29T03:25:52Z",
|
|
"pushed_at": "2018-02-09T14:59:02Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 7,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 166266258,
|
|
"name": "cve-2016-10033",
|
|
"full_name": "cved-sources\/cve-2016-10033",
|
|
"owner": {
|
|
"login": "cved-sources",
|
|
"id": 46423677,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
|
"html_url": "https:\/\/github.com\/cved-sources"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cved-sources\/cve-2016-10033",
|
|
"description": "cve-2016-10033",
|
|
"fork": false,
|
|
"created_at": "2019-01-17T17:20:24Z",
|
|
"updated_at": "2019-02-01T21:20:18Z",
|
|
"pushed_at": "2019-02-01T21:20:16Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |