mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
347 lines
No EOL
12 KiB
JSON
347 lines
No EOL
12 KiB
JSON
[
|
|
{
|
|
"id": 171996551,
|
|
"name": "CVE-2018-20250",
|
|
"full_name": "WyAtu\/CVE-2018-20250",
|
|
"owner": {
|
|
"login": "WyAtu",
|
|
"id": 23521935,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/23521935?v=4",
|
|
"html_url": "https:\/\/github.com\/WyAtu"
|
|
},
|
|
"html_url": "https:\/\/github.com\/WyAtu\/CVE-2018-20250",
|
|
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
|
"fork": false,
|
|
"created_at": "2019-02-22T04:52:08Z",
|
|
"updated_at": "2020-01-08T08:13:46Z",
|
|
"pushed_at": "2019-08-05T10:45:34Z",
|
|
"stargazers_count": 379,
|
|
"watchers_count": 379,
|
|
"forks_count": 168,
|
|
"forks": 168,
|
|
"watchers": 379,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 172009558,
|
|
"name": "CVE-2018-20250",
|
|
"full_name": "QAX-A-Team\/CVE-2018-20250",
|
|
"owner": {
|
|
"login": "QAX-A-Team",
|
|
"id": 35417332,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/35417332?v=4",
|
|
"html_url": "https:\/\/github.com\/QAX-A-Team"
|
|
},
|
|
"html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250",
|
|
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
|
|
"fork": false,
|
|
"created_at": "2019-02-22T06:47:01Z",
|
|
"updated_at": "2019-10-22T04:28:28Z",
|
|
"pushed_at": "2019-02-22T07:47:26Z",
|
|
"stargazers_count": 23,
|
|
"watchers_count": 23,
|
|
"forks_count": 11,
|
|
"forks": 11,
|
|
"watchers": 23,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 172069488,
|
|
"name": "CVE-2018-20250-poc-winrar",
|
|
"full_name": "nmweizi\/CVE-2018-20250-poc-winrar",
|
|
"owner": {
|
|
"login": "nmweizi",
|
|
"id": 1232444,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1232444?v=4",
|
|
"html_url": "https:\/\/github.com\/nmweizi"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-02-22T13:18:14Z",
|
|
"updated_at": "2019-02-22T13:20:31Z",
|
|
"pushed_at": "2019-02-22T13:20:30Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 172078598,
|
|
"name": "UNACEV2.DLL-CVE-2018-20250",
|
|
"full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250",
|
|
"owner": {
|
|
"login": "blunden",
|
|
"id": 249915,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/249915?v=4",
|
|
"html_url": "https:\/\/github.com\/blunden"
|
|
},
|
|
"html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250",
|
|
"description": "A version of the binary patched to address CVE-2018-20250",
|
|
"fork": false,
|
|
"created_at": "2019-02-22T14:19:20Z",
|
|
"updated_at": "2019-02-22T14:29:30Z",
|
|
"pushed_at": "2019-02-22T14:29:29Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 172156568,
|
|
"name": "CVE-2018-20250-WinRAR-ACE",
|
|
"full_name": "easis\/CVE-2018-20250-WinRAR-ACE",
|
|
"owner": {
|
|
"login": "easis",
|
|
"id": 50383201,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/50383201?v=4",
|
|
"html_url": "https:\/\/github.com\/easis"
|
|
},
|
|
"html_url": "https:\/\/github.com\/easis\/CVE-2018-20250-WinRAR-ACE",
|
|
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
|
|
"fork": false,
|
|
"created_at": "2019-02-23T01:20:34Z",
|
|
"updated_at": "2019-12-20T10:41:29Z",
|
|
"pushed_at": "2019-03-01T13:35:59Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"forks_count": 15,
|
|
"forks": 15,
|
|
"watchers": 16,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 173153306,
|
|
"name": "CVE-2018-20250",
|
|
"full_name": "STP5940\/CVE-2018-20250",
|
|
"owner": {
|
|
"login": "STP5940",
|
|
"id": 21144303,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/21144303?v=4",
|
|
"html_url": "https:\/\/github.com\/STP5940"
|
|
},
|
|
"html_url": "https:\/\/github.com\/STP5940\/CVE-2018-20250",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-02-28T17:07:52Z",
|
|
"updated_at": "2019-10-30T09:58:35Z",
|
|
"pushed_at": "2019-02-28T17:10:39Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 173733018,
|
|
"name": "WinAce-POC",
|
|
"full_name": "n4r1b\/WinAce-POC",
|
|
"owner": {
|
|
"login": "n4r1b",
|
|
"id": 7025964,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7025964?v=4",
|
|
"html_url": "https:\/\/github.com\/n4r1b"
|
|
},
|
|
"html_url": "https:\/\/github.com\/n4r1b\/WinAce-POC",
|
|
"description": "Simple POC to leverage CVE-2018-20250 from inside an EXE",
|
|
"fork": false,
|
|
"created_at": "2019-03-04T11:34:17Z",
|
|
"updated_at": "2019-03-04T14:32:05Z",
|
|
"pushed_at": "2019-03-04T14:42:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 173733367,
|
|
"name": "hack-winrar",
|
|
"full_name": "technicaldada\/hack-winrar",
|
|
"owner": {
|
|
"login": "technicaldada",
|
|
"id": 32122182,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32122182?v=4",
|
|
"html_url": "https:\/\/github.com\/technicaldada"
|
|
},
|
|
"html_url": "https:\/\/github.com\/technicaldada\/hack-winrar",
|
|
"description": "WinRar is a very widely known software for windows. Previous version of WinRaR was a vulnerability which has been patched in Feb-2019. Most of the people didn't update winrar so they are vulnerable in this Absolute Path Traversal bug [CVE-2018-20250]",
|
|
"fork": false,
|
|
"created_at": "2019-03-04T11:36:43Z",
|
|
"updated_at": "2019-03-25T16:54:05Z",
|
|
"pushed_at": "2019-03-04T11:39:34Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 173947919,
|
|
"name": "ezwinrar",
|
|
"full_name": "Ektoplasma\/ezwinrar",
|
|
"owner": {
|
|
"login": "Ektoplasma",
|
|
"id": 15208659,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/15208659?v=4",
|
|
"html_url": "https:\/\/github.com\/Ektoplasma"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ektoplasma\/ezwinrar",
|
|
"description": "Python tool exploiting CVE-2018-20250 found by CheckPoint folks",
|
|
"fork": false,
|
|
"created_at": "2019-03-05T13:05:03Z",
|
|
"updated_at": "2019-10-19T08:36:59Z",
|
|
"pushed_at": "2019-03-05T15:51:12Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 174533873,
|
|
"name": "CVE-2018-20250-WINRAR-ACE-GUI",
|
|
"full_name": "arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
|
|
"owner": {
|
|
"login": "arkangel-dev",
|
|
"id": 31138457,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/31138457?v=4",
|
|
"html_url": "https:\/\/github.com\/arkangel-dev"
|
|
},
|
|
"html_url": "https:\/\/github.com\/arkangel-dev\/CVE-2018-20250-WINRAR-ACE-GUI",
|
|
"description": "CVE-2018-20250-WINRAR-ACE Exploit with a UI",
|
|
"fork": false,
|
|
"created_at": "2019-03-08T12:27:12Z",
|
|
"updated_at": "2019-10-30T09:59:05Z",
|
|
"pushed_at": "2019-05-10T05:37:10Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 174948316,
|
|
"name": "CVE-2018-20250",
|
|
"full_name": "AeolusTF\/CVE-2018-20250",
|
|
"owner": {
|
|
"login": "AeolusTF",
|
|
"id": 29159416,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29159416?v=4",
|
|
"html_url": "https:\/\/github.com\/AeolusTF"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AeolusTF\/CVE-2018-20250",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-03-11T07:33:45Z",
|
|
"updated_at": "2019-03-11T07:37:51Z",
|
|
"pushed_at": "2019-03-11T07:37:50Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 176534636,
|
|
"name": "Detect-CVE-2018-20250",
|
|
"full_name": "joydragon\/Detect-CVE-2018-20250",
|
|
"owner": {
|
|
"login": "joydragon",
|
|
"id": 4154219,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4154219?v=4",
|
|
"html_url": "https:\/\/github.com\/joydragon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/joydragon\/Detect-CVE-2018-20250",
|
|
"description": "Herramienta para revisar si es que un payload tiene componente malicioso de acuerdo a CVE-2018-20250",
|
|
"fork": false,
|
|
"created_at": "2019-03-19T14:51:52Z",
|
|
"updated_at": "2019-03-19T15:03:27Z",
|
|
"pushed_at": "2019-03-19T15:03:26Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 177513614,
|
|
"name": "WinRar_ACE_exploit_CVE-2018-20250",
|
|
"full_name": "DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
|
|
"owner": {
|
|
"login": "DANIELVISPOBLOG",
|
|
"id": 26053534,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26053534?v=4",
|
|
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG"
|
|
},
|
|
"html_url": "https:\/\/github.com\/DANIELVISPOBLOG\/WinRar_ACE_exploit_CVE-2018-20250",
|
|
"description": "This program is an script developed in Python which exploit the ACE vulnerability on WinRar - Vulnerability CVE-2018-20250",
|
|
"fork": false,
|
|
"created_at": "2019-03-25T04:22:14Z",
|
|
"updated_at": "2019-04-09T07:37:30Z",
|
|
"pushed_at": "2019-03-26T04:54:35Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 183341455,
|
|
"name": "CVE-2018-20250",
|
|
"full_name": "denmilu\/CVE-2018-20250",
|
|
"owner": {
|
|
"login": "denmilu",
|
|
"id": 2469038,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
|
"html_url": "https:\/\/github.com\/denmilu"
|
|
},
|
|
"html_url": "https:\/\/github.com\/denmilu\/CVE-2018-20250",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-04-25T02:30:50Z",
|
|
"updated_at": "2019-04-25T02:31:01Z",
|
|
"pushed_at": "2019-04-25T02:30:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 185440756,
|
|
"name": "CVE-2018-20250",
|
|
"full_name": "930201676\/CVE-2018-20250",
|
|
"owner": {
|
|
"login": "930201676",
|
|
"id": 20335327,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20335327?v=4",
|
|
"html_url": "https:\/\/github.com\/930201676"
|
|
},
|
|
"html_url": "https:\/\/github.com\/930201676\/CVE-2018-20250",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-05-07T16:34:10Z",
|
|
"updated_at": "2019-05-07T16:34:31Z",
|
|
"pushed_at": "2019-05-07T16:34:29Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |