mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
117 lines
No EOL
4 KiB
JSON
117 lines
No EOL
4 KiB
JSON
[
|
|
{
|
|
"id": 285161762,
|
|
"name": "CVE-2012-2982-Python-PoC",
|
|
"full_name": "cd6629\/CVE-2012-2982-Python-PoC",
|
|
"owner": {
|
|
"login": "cd6629",
|
|
"id": 63489620,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489620?v=4",
|
|
"html_url": "https:\/\/github.com\/cd6629"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cd6629\/CVE-2012-2982-Python-PoC",
|
|
"description": "This was converted from a metasploit module as an exercise for OSCP studying",
|
|
"fork": false,
|
|
"created_at": "2020-08-05T02:54:10Z",
|
|
"updated_at": "2021-04-14T18:01:04Z",
|
|
"pushed_at": "2020-10-30T19:56:54Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 307214937,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "OstojaOfficial\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "OstojaOfficial",
|
|
"id": 21225822,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21225822?v=4",
|
|
"html_url": "https:\/\/github.com\/OstojaOfficial"
|
|
},
|
|
"html_url": "https:\/\/github.com\/OstojaOfficial\/CVE-2012-2982",
|
|
"description": "Python exploit for CVE-2012-2982",
|
|
"fork": false,
|
|
"created_at": "2020-10-25T23:37:32Z",
|
|
"updated_at": "2020-10-25T23:54:04Z",
|
|
"pushed_at": "2020-10-25T23:53:20Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 349149619,
|
|
"name": "CVE-2012-2982_Python",
|
|
"full_name": "AlexJS6\/CVE-2012-2982_Python",
|
|
"owner": {
|
|
"login": "AlexJS6",
|
|
"id": 63366907,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63366907?v=4",
|
|
"html_url": "https:\/\/github.com\/AlexJS6"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AlexJS6\/CVE-2012-2982_Python",
|
|
"description": "PoC Python script as an exercice from tryhackme.",
|
|
"fork": false,
|
|
"created_at": "2021-03-18T16:47:43Z",
|
|
"updated_at": "2021-04-30T16:06:28Z",
|
|
"pushed_at": "2021-03-19T22:56:16Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 355021311,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "Ari-Weinberg\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "Ari-Weinberg",
|
|
"id": 67128976,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67128976?v=4",
|
|
"html_url": "https:\/\/github.com\/Ari-Weinberg"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ari-Weinberg\/CVE-2012-2982",
|
|
"description": "Exploit for CVE-2012-2982",
|
|
"fork": false,
|
|
"created_at": "2021-04-06T01:31:58Z",
|
|
"updated_at": "2021-04-06T01:35:54Z",
|
|
"pushed_at": "2021-04-06T01:35:52Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 402959369,
|
|
"name": "CVE-2012-2982",
|
|
"full_name": "JohnHammond\/CVE-2012-2982",
|
|
"owner": {
|
|
"login": "JohnHammond",
|
|
"id": 6288722,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
|
|
"html_url": "https:\/\/github.com\/JohnHammond"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2012-2982",
|
|
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
|
|
"fork": false,
|
|
"created_at": "2021-09-04T04:01:56Z",
|
|
"updated_at": "2021-09-04T13:45:49Z",
|
|
"pushed_at": "2021-09-04T07:25:55Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |