mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 05:12:21 +01:00
117 lines
No EOL
4.1 KiB
JSON
117 lines
No EOL
4.1 KiB
JSON
[
|
|
{
|
|
"id": 239930294,
|
|
"name": "CVE-2019-17564",
|
|
"full_name": "r00t4dm\/CVE-2019-17564",
|
|
"owner": {
|
|
"login": "r00t4dm",
|
|
"id": 36941976,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/36941976?v=4",
|
|
"html_url": "https:\/\/github.com\/r00t4dm"
|
|
},
|
|
"html_url": "https:\/\/github.com\/r00t4dm\/CVE-2019-17564",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-02-12T04:55:51Z",
|
|
"updated_at": "2020-02-12T07:41:08Z",
|
|
"pushed_at": "2020-02-12T07:41:06Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 240153600,
|
|
"name": "CVE-2019-17564",
|
|
"full_name": "Jaky5155\/CVE-2019-17564",
|
|
"owner": {
|
|
"login": "Jaky5155",
|
|
"id": 47801640,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47801640?v=4",
|
|
"html_url": "https:\/\/github.com\/Jaky5155"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Jaky5155\/CVE-2019-17564",
|
|
"description": "CVE-2019-17564 Apache Dubbo deserialization RCE",
|
|
"fork": false,
|
|
"created_at": "2020-02-13T01:40:50Z",
|
|
"updated_at": "2020-02-17T01:07:16Z",
|
|
"pushed_at": "2020-02-13T01:42:21Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 240413864,
|
|
"name": "CVE-2019-17564",
|
|
"full_name": "Hu3sky\/CVE-2019-17564",
|
|
"owner": {
|
|
"login": "Hu3sky",
|
|
"id": 37403964,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/37403964?v=4",
|
|
"html_url": "https:\/\/github.com\/Hu3sky"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Hu3sky\/CVE-2019-17564",
|
|
"description": "CVE-2019-17564 : Apache Dubbo Deserialization Remote Code Execution",
|
|
"fork": false,
|
|
"created_at": "2020-02-14T02:41:31Z",
|
|
"updated_at": "2020-02-14T03:38:04Z",
|
|
"pushed_at": "2020-02-14T02:45:11Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 241072507,
|
|
"name": "CVE-2019-17564",
|
|
"full_name": "Exploit-3389\/CVE-2019-17564",
|
|
"owner": {
|
|
"login": "Exploit-3389",
|
|
"id": 61142764,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/61142764?v=4",
|
|
"html_url": "https:\/\/github.com\/Exploit-3389"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Exploit-3389\/CVE-2019-17564",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-02-17T09:52:47Z",
|
|
"updated_at": "2020-02-17T10:02:49Z",
|
|
"pushed_at": "2020-02-17T10:02:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 241831156,
|
|
"name": "CVE-2019-17564-FastJson-Gadget",
|
|
"full_name": "Dor-Tumarkin\/CVE-2019-17564-FastJson-Gadget",
|
|
"owner": {
|
|
"login": "Dor-Tumarkin",
|
|
"id": 23374015,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23374015?v=4",
|
|
"html_url": "https:\/\/github.com\/Dor-Tumarkin"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Dor-Tumarkin\/CVE-2019-17564-FastJson-Gadget",
|
|
"description": "Basic code for creating the Alibaba FastJson + Spring gadget chain, as used to exploit Apache Dubbo in CVE-2019-17564 - more information available at https:\/\/www.checkmarx.com\/blog\/apache-dubbo-unauthenticated-remote-code-execution-vulnerability",
|
|
"fork": false,
|
|
"created_at": "2020-02-20T08:28:55Z",
|
|
"updated_at": "2020-02-20T12:58:40Z",
|
|
"pushed_at": "2020-02-20T11:49:35Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |