mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
252 lines
No EOL
8.4 KiB
JSON
252 lines
No EOL
8.4 KiB
JSON
[
|
|
{
|
|
"id": 356390440,
|
|
"name": "vsftpd2.3.4PyExploit",
|
|
"full_name": "HerculesRD\/vsftpd2.3.4PyExploit",
|
|
"owner": {
|
|
"login": "HerculesRD",
|
|
"id": 73125772,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4",
|
|
"html_url": "https:\/\/github.com\/HerculesRD"
|
|
},
|
|
"html_url": "https:\/\/github.com\/HerculesRD\/vsftpd2.3.4PyExploit",
|
|
"description": "An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python",
|
|
"fork": false,
|
|
"created_at": "2021-04-09T20:26:01Z",
|
|
"updated_at": "2021-04-12T17:16:08Z",
|
|
"pushed_at": "2021-04-12T17:16:06Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 363437748,
|
|
"name": "CVE-2011-2523",
|
|
"full_name": "nobodyatall648\/CVE-2011-2523",
|
|
"owner": {
|
|
"login": "nobodyatall648",
|
|
"id": 35725871,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
|
|
"html_url": "https:\/\/github.com\/nobodyatall648"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2011-2523",
|
|
"description": "vsftpd 2.3.4 Backdoor Exploit",
|
|
"fork": false,
|
|
"created_at": "2021-05-01T15:03:55Z",
|
|
"updated_at": "2021-10-29T18:25:03Z",
|
|
"pushed_at": "2021-06-25T19:05:49Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 401789640,
|
|
"name": "CVE-2011-2523",
|
|
"full_name": "Gr4ykt\/CVE-2011-2523",
|
|
"owner": {
|
|
"login": "Gr4ykt",
|
|
"id": 78503985,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78503985?v=4",
|
|
"html_url": "https:\/\/github.com\/Gr4ykt"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Gr4ykt\/CVE-2011-2523",
|
|
"description": "https:\/\/www.exploit-db.com\/exploits\/49757",
|
|
"fork": false,
|
|
"created_at": "2021-08-31T17:31:30Z",
|
|
"updated_at": "2021-08-31T17:34:41Z",
|
|
"pushed_at": "2021-08-31T17:34:38Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 425428807,
|
|
"name": "CVE-2011-2523",
|
|
"full_name": "padsalatushal\/CVE-2011-2523",
|
|
"owner": {
|
|
"login": "padsalatushal",
|
|
"id": 57517785,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4",
|
|
"html_url": "https:\/\/github.com\/padsalatushal"
|
|
},
|
|
"html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523",
|
|
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
|
|
"fork": false,
|
|
"created_at": "2021-11-07T06:20:27Z",
|
|
"updated_at": "2022-11-08T00:45:55Z",
|
|
"pushed_at": "2022-11-07T10:26:58Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2011-2523",
|
|
"exploit",
|
|
"python",
|
|
"security",
|
|
"vsftpd-exploit"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 5,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 440981441,
|
|
"name": "vsFTPd-2.3.4-exploit",
|
|
"full_name": "whoamins\/vsFTPd-2.3.4-exploit",
|
|
"owner": {
|
|
"login": "whoamins",
|
|
"id": 66217512,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66217512?v=4",
|
|
"html_url": "https:\/\/github.com\/whoamins"
|
|
},
|
|
"html_url": "https:\/\/github.com\/whoamins\/vsFTPd-2.3.4-exploit",
|
|
"description": "vsFTPd 2.3.4 Backdoor Exploit CVE-2011-2523",
|
|
"fork": false,
|
|
"created_at": "2021-12-22T20:51:35Z",
|
|
"updated_at": "2021-12-26T13:32:33Z",
|
|
"pushed_at": "2021-12-26T13:32:30Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"exploit",
|
|
"pwn",
|
|
"pwntools",
|
|
"python3"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 497133986,
|
|
"name": "OffensivePascal-CVE-2011-2523",
|
|
"full_name": "MFernstrom\/OffensivePascal-CVE-2011-2523",
|
|
"owner": {
|
|
"login": "MFernstrom",
|
|
"id": 9220603,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
|
|
"html_url": "https:\/\/github.com\/MFernstrom"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2011-2523",
|
|
"description": "FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523",
|
|
"fork": false,
|
|
"created_at": "2022-05-27T20:47:01Z",
|
|
"updated_at": "2022-05-29T18:03:07Z",
|
|
"pushed_at": "2022-05-28T00:24:53Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 499329867,
|
|
"name": "CVE-2011-2523",
|
|
"full_name": "NullBrunk\/CVE-2011-2523",
|
|
"owner": {
|
|
"login": "NullBrunk",
|
|
"id": 106782577,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106782577?v=4",
|
|
"html_url": "https:\/\/github.com\/NullBrunk"
|
|
},
|
|
"html_url": "https:\/\/github.com\/NullBrunk\/CVE-2011-2523",
|
|
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
|
|
"fork": false,
|
|
"created_at": "2022-06-03T00:17:18Z",
|
|
"updated_at": "2022-11-14T00:57:39Z",
|
|
"pushed_at": "2022-11-13T15:49:47Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2011-2523",
|
|
"exploit",
|
|
"ftp-server",
|
|
"python3",
|
|
"vsftpd"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 501728395,
|
|
"name": "-CVE-2011-2523",
|
|
"full_name": "0xSojalSec\/-CVE-2011-2523",
|
|
"owner": {
|
|
"login": "0xSojalSec",
|
|
"id": 92203029,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4",
|
|
"html_url": "https:\/\/github.com\/0xSojalSec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xSojalSec\/-CVE-2011-2523",
|
|
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
|
|
"fork": false,
|
|
"created_at": "2022-06-09T16:25:25Z",
|
|
"updated_at": "2022-08-03T16:24:45Z",
|
|
"pushed_at": "2022-06-09T16:31:05Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |