mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
209 lines
No EOL
7.6 KiB
JSON
209 lines
No EOL
7.6 KiB
JSON
[
|
|
{
|
|
"id": 191233980,
|
|
"name": "exim-rce-quickfix",
|
|
"full_name": "bananaphones\/exim-rce-quickfix",
|
|
"owner": {
|
|
"login": "bananaphones",
|
|
"id": 4877449,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4877449?v=4",
|
|
"html_url": "https:\/\/github.com\/bananaphones"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bananaphones\/exim-rce-quickfix",
|
|
"description": "quick fix for CVE-2019-10149, works on Debian\\Ubuntu\\Centos",
|
|
"fork": false,
|
|
"created_at": "2019-06-10T19:37:05Z",
|
|
"updated_at": "2020-01-11T07:45:20Z",
|
|
"pushed_at": "2019-06-14T10:16:02Z",
|
|
"stargazers_count": 20,
|
|
"watchers_count": 20,
|
|
"forks_count": 18,
|
|
"forks": 18,
|
|
"watchers": 20,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 191493140,
|
|
"name": "eximrce-CVE-2019-10149",
|
|
"full_name": "cowbe0x004\/eximrce-CVE-2019-10149",
|
|
"owner": {
|
|
"login": "cowbe0x004",
|
|
"id": 3072913,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3072913?v=4",
|
|
"html_url": "https:\/\/github.com\/cowbe0x004"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cowbe0x004\/eximrce-CVE-2019-10149",
|
|
"description": "simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in \/tmp\/eximrce.",
|
|
"fork": false,
|
|
"created_at": "2019-06-12T03:47:16Z",
|
|
"updated_at": "2019-11-15T03:38:41Z",
|
|
"pushed_at": "2019-07-08T18:25:12Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 8,
|
|
"forks": 8,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 191845568,
|
|
"name": "PoC--CVE-2019-10149_Exim",
|
|
"full_name": "MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
|
|
"owner": {
|
|
"login": "MNEMO-CERT",
|
|
"id": 51804856,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51804856?v=4",
|
|
"html_url": "https:\/\/github.com\/MNEMO-CERT"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MNEMO-CERT\/PoC--CVE-2019-10149_Exim",
|
|
"description": "PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.",
|
|
"fork": false,
|
|
"created_at": "2019-06-13T23:21:53Z",
|
|
"updated_at": "2019-10-29T17:17:45Z",
|
|
"pushed_at": "2019-06-18T14:57:22Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 10,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 191952969,
|
|
"name": "CVE-2019-10149-quick",
|
|
"full_name": "aishee\/CVE-2019-10149-quick",
|
|
"owner": {
|
|
"login": "aishee",
|
|
"id": 8377283,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8377283?v=4",
|
|
"html_url": "https:\/\/github.com\/aishee"
|
|
},
|
|
"html_url": "https:\/\/github.com\/aishee\/CVE-2019-10149-quick",
|
|
"description": "Simple Bash shell quick fix CVE-2019-10149",
|
|
"fork": false,
|
|
"created_at": "2019-06-14T14:02:43Z",
|
|
"updated_at": "2019-06-14T14:03:33Z",
|
|
"pushed_at": "2019-06-14T14:03:31Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 194002154,
|
|
"name": "CVE-2019-10149-privilege-escalation",
|
|
"full_name": "AzizMea\/CVE-2019-10149-privilege-escalation",
|
|
"owner": {
|
|
"login": "AzizMea",
|
|
"id": 30970260,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30970260?v=4",
|
|
"html_url": "https:\/\/github.com\/AzizMea"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AzizMea\/CVE-2019-10149-privilege-escalation",
|
|
"description": "CVE-2019-10149 privilege escalation",
|
|
"fork": false,
|
|
"created_at": "2019-06-27T01:34:41Z",
|
|
"updated_at": "2020-01-07T08:25:21Z",
|
|
"pushed_at": "2019-06-27T17:46:25Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 8,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 198729185,
|
|
"name": "StickyExim",
|
|
"full_name": "Brets0150\/StickyExim",
|
|
"owner": {
|
|
"login": "Brets0150",
|
|
"id": 40045956,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/40045956?v=4",
|
|
"html_url": "https:\/\/github.com\/Brets0150"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Brets0150\/StickyExim",
|
|
"description": "Exim Honey Pot for CVE-2019-10149 exploit attempts.",
|
|
"fork": false,
|
|
"created_at": "2019-07-25T00:46:37Z",
|
|
"updated_at": "2019-08-06T20:21:47Z",
|
|
"pushed_at": "2019-08-06T20:21:46Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 206647936,
|
|
"name": "exim.exp",
|
|
"full_name": "ChrissHack\/exim.exp",
|
|
"owner": {
|
|
"login": "ChrissHack",
|
|
"id": 36897897,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36897897?v=4",
|
|
"html_url": "https:\/\/github.com\/ChrissHack"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ChrissHack\/exim.exp",
|
|
"description": "CVE-2019-10149",
|
|
"fork": false,
|
|
"created_at": "2019-09-05T20:04:14Z",
|
|
"updated_at": "2019-09-11T01:27:28Z",
|
|
"pushed_at": "2019-09-05T20:34:18Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 216513053,
|
|
"name": "CVE-2019-10149",
|
|
"full_name": "darsigovrustam\/CVE-2019-10149",
|
|
"owner": {
|
|
"login": "darsigovrustam",
|
|
"id": 36308333,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36308333?v=4",
|
|
"html_url": "https:\/\/github.com\/darsigovrustam"
|
|
},
|
|
"html_url": "https:\/\/github.com\/darsigovrustam\/CVE-2019-10149",
|
|
"description": "Instructions for installing a vulnerable version of Exim and its expluatation",
|
|
"fork": false,
|
|
"created_at": "2019-10-21T08:13:27Z",
|
|
"updated_at": "2019-10-24T07:19:30Z",
|
|
"pushed_at": "2019-10-24T07:19:28Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 217788444,
|
|
"name": "CVE-2019-10149",
|
|
"full_name": "Diefunction\/CVE-2019-10149",
|
|
"owner": {
|
|
"login": "Diefunction",
|
|
"id": 17242631,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17242631?v=4",
|
|
"html_url": "https:\/\/github.com\/Diefunction"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Diefunction\/CVE-2019-10149",
|
|
"description": "CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in \/src\/deliver.c may lead to remote command execution.",
|
|
"fork": false,
|
|
"created_at": "2019-10-27T01:03:11Z",
|
|
"updated_at": "2019-12-07T17:35:04Z",
|
|
"pushed_at": "2019-10-27T01:08:17Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 7,
|
|
"score": 0
|
|
}
|
|
] |