PoC-in-GitHub/2019/CVE-2019-0604.json
2023-09-07 03:53:00 +09:00

220 lines
No EOL
7.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 177246255,
"name": "CVE-2019-0604",
"full_name": "linhlhq\/CVE-2019-0604",
"owner": {
"login": "linhlhq",
"id": 28854132,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28854132?v=4",
"html_url": "https:\/\/github.com\/linhlhq"
},
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
"description": "CVE-2019-0604",
"fork": false,
"created_at": "2019-03-23T05:01:54Z",
"updated_at": "2023-07-25T15:23:28Z",
"pushed_at": "2019-03-22T05:45:44Z",
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 133,
"score": 0,
"subscribers_count": 4
},
{
"id": 179413290,
"name": "CVE-2019-0604_sharepoint_CVE",
"full_name": "likescam\/CVE-2019-0604_sharepoint_CVE",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-0604_sharepoint_CVE",
"description": null,
"fork": false,
"created_at": "2019-04-04T03:17:30Z",
"updated_at": "2021-12-05T21:34:43Z",
"pushed_at": "2019-04-04T03:17:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 193926769,
"name": "CVE-2019-0604",
"full_name": "k8gege\/CVE-2019-0604",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/CVE-2019-0604",
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2023-07-25T14:27:01Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2019-0604",
"exp",
"exploit",
"hacking",
"k8cscan",
"pentest",
"sharepoint"
],
"visibility": "public",
"forks": 66,
"watchers": 104,
"score": 0,
"subscribers_count": 4
},
{
"id": 208650796,
"name": "CVE-2019-0604",
"full_name": "m5050\/CVE-2019-0604",
"owner": {
"login": "m5050",
"id": 18764171,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18764171?v=4",
"html_url": "https:\/\/github.com\/m5050"
},
"html_url": "https:\/\/github.com\/m5050\/CVE-2019-0604",
"description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP",
"fork": false,
"created_at": "2019-09-15T20:06:54Z",
"updated_at": "2022-09-07T14:36:29Z",
"pushed_at": "2019-09-17T19:40:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 227013447,
"name": "CVE-2019-0604",
"full_name": "boxhg\/CVE-2019-0604",
"owner": {
"login": "boxhg",
"id": 40994449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40994449?v=4",
"html_url": "https:\/\/github.com\/boxhg"
},
"html_url": "https:\/\/github.com\/boxhg\/CVE-2019-0604",
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码动手制作自己的payload",
"fork": false,
"created_at": "2019-12-10T02:39:57Z",
"updated_at": "2023-07-04T10:34:40Z",
"pushed_at": "2021-04-02T09:12:32Z",
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 31,
"score": 0,
"subscribers_count": 3
},
{
"id": 360506351,
"name": "weaponized-0604",
"full_name": "Gh0st0ne\/weaponized-0604",
"owner": {
"login": "Gh0st0ne",
"id": 47971115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47971115?v=4",
"html_url": "https:\/\/github.com\/Gh0st0ne"
},
"html_url": "https:\/\/github.com\/Gh0st0ne\/weaponized-0604",
"description": "Automated tool to exploit sharepoint CVE-2019-0604",
"fork": false,
"created_at": "2021-04-22T12:11:22Z",
"updated_at": "2022-10-10T00:04:00Z",
"pushed_at": "2021-02-12T14:04:25Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 687505103,
"name": "cve-2019-0604-SP2010-netv3.5",
"full_name": "davidlebr1\/cve-2019-0604-SP2010-netv3.5",
"owner": {
"login": "davidlebr1",
"id": 838845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/838845?v=4",
"html_url": "https:\/\/github.com\/davidlebr1"
},
"html_url": "https:\/\/github.com\/davidlebr1\/cve-2019-0604-SP2010-netv3.5",
"description": "Generate Seralize Payload for CVE-2019-0604 for Sharepoint 2010 SP2 .net 3.5",
"fork": false,
"created_at": "2023-09-05T13:47:17Z",
"updated_at": "2023-09-05T13:51:36Z",
"pushed_at": "2023-09-05T13:51:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]