PoC-in-GitHub/2017/CVE-2017-5689.json
2022-11-08 15:19:29 +09:00

147 lines
No EOL
4.8 KiB
JSON

[
{
"id": 90210170,
"name": "CVE-2017-5689",
"full_name": "CerberusSecurity\/CVE-2017-5689",
"owner": {
"login": "CerberusSecurity",
"id": 21088337,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21088337?v=4",
"html_url": "https:\/\/github.com\/CerberusSecurity"
},
"html_url": "https:\/\/github.com\/CerberusSecurity\/CVE-2017-5689",
"description": null,
"fork": false,
"created_at": "2017-05-04T01:51:26Z",
"updated_at": "2022-10-03T11:06:48Z",
"pushed_at": "2017-05-04T03:06:32Z",
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 39,
"score": 0
},
{
"id": 90472957,
"name": "amthoneypot",
"full_name": "x1sec\/amthoneypot",
"owner": {
"login": "x1sec",
"id": 11153104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11153104?v=4",
"html_url": "https:\/\/github.com\/x1sec"
},
"html_url": "https:\/\/github.com\/x1sec\/amthoneypot",
"description": "Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689",
"fork": false,
"created_at": "2017-05-06T15:35:42Z",
"updated_at": "2022-07-28T13:40:45Z",
"pushed_at": "2020-01-03T21:50:36Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"score": 0
},
{
"id": 90724328,
"name": "intel_amt_bypass",
"full_name": "Bijaye\/intel_amt_bypass",
"owner": {
"login": "Bijaye",
"id": 4318412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4318412?v=4",
"html_url": "https:\/\/github.com\/Bijaye"
},
"html_url": "https:\/\/github.com\/Bijaye\/intel_amt_bypass",
"description": "simple python poc for CVE-2017-5689",
"fork": false,
"created_at": "2017-05-09T08:55:39Z",
"updated_at": "2022-03-07T16:29:42Z",
"pushed_at": "2017-05-09T00:42:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 3,
"score": 0
},
{
"id": 98579784,
"name": "amt_auth_bypass_poc",
"full_name": "embedi\/amt_auth_bypass_poc",
"owner": {
"login": "embedi",
"id": 24190344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24190344?v=4",
"html_url": "https:\/\/github.com\/embedi"
},
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
"description": "CVE-2017-5689 Proof-of-Concept exploit",
"fork": false,
"created_at": "2017-07-27T21:06:08Z",
"updated_at": "2022-03-06T01:51:18Z",
"pushed_at": "2017-07-27T21:08:49Z",
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 53,
"score": 0
},
{
"id": 385968702,
"name": "CVE-2017-5689-Checker",
"full_name": "TheWay-hue\/CVE-2017-5689-Checker",
"owner": {
"login": "TheWay-hue",
"id": 64380347,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64380347?v=4",
"html_url": "https:\/\/github.com\/TheWay-hue"
},
"html_url": "https:\/\/github.com\/TheWay-hue\/CVE-2017-5689-Checker",
"description": null,
"fork": false,
"created_at": "2021-07-14T14:26:29Z",
"updated_at": "2021-07-14T14:35:22Z",
"pushed_at": "2021-07-14T14:35:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]