mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
117 lines
No EOL
3.9 KiB
JSON
117 lines
No EOL
3.9 KiB
JSON
[
|
||
{
|
||
"id": 177246255,
|
||
"name": "CVE-2019-0604",
|
||
"full_name": "linhlhq\/CVE-2019-0604",
|
||
"owner": {
|
||
"login": "linhlhq",
|
||
"id": 28854132,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/28854132?v=4",
|
||
"html_url": "https:\/\/github.com\/linhlhq"
|
||
},
|
||
"html_url": "https:\/\/github.com\/linhlhq\/CVE-2019-0604",
|
||
"description": "CVE-2019-0604",
|
||
"fork": false,
|
||
"created_at": "2019-03-23T05:01:54Z",
|
||
"updated_at": "2020-11-27T05:27:48Z",
|
||
"pushed_at": "2019-03-22T05:45:44Z",
|
||
"stargazers_count": 129,
|
||
"watchers_count": 129,
|
||
"forks_count": 78,
|
||
"forks": 78,
|
||
"watchers": 129,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 179413290,
|
||
"name": "CVE-2019-0604_sharepoint_CVE",
|
||
"full_name": "likescam\/CVE-2019-0604_sharepoint_CVE",
|
||
"owner": {
|
||
"login": "likescam",
|
||
"id": 2469038,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
|
||
"html_url": "https:\/\/github.com\/likescam"
|
||
},
|
||
"html_url": "https:\/\/github.com\/likescam\/CVE-2019-0604_sharepoint_CVE",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-04-04T03:17:30Z",
|
||
"updated_at": "2019-04-04T03:17:59Z",
|
||
"pushed_at": "2019-04-04T03:17:57Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 193926769,
|
||
"name": "CVE-2019-0604",
|
||
"full_name": "k8gege\/CVE-2019-0604",
|
||
"owner": {
|
||
"login": "k8gege",
|
||
"id": 42312878,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4",
|
||
"html_url": "https:\/\/github.com\/k8gege"
|
||
},
|
||
"html_url": "https:\/\/github.com\/k8gege\/CVE-2019-0604",
|
||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||
"fork": false,
|
||
"created_at": "2019-06-26T15:00:29Z",
|
||
"updated_at": "2020-10-22T22:17:06Z",
|
||
"pushed_at": "2019-10-18T14:49:10Z",
|
||
"stargazers_count": 88,
|
||
"watchers_count": 88,
|
||
"forks_count": 64,
|
||
"forks": 64,
|
||
"watchers": 88,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 208650796,
|
||
"name": "CVE-2019-0604",
|
||
"full_name": "m5050\/CVE-2019-0604",
|
||
"owner": {
|
||
"login": "m5050",
|
||
"id": 18764171,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18764171?v=4",
|
||
"html_url": "https:\/\/github.com\/m5050"
|
||
},
|
||
"html_url": "https:\/\/github.com\/m5050\/CVE-2019-0604",
|
||
"description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP",
|
||
"fork": false,
|
||
"created_at": "2019-09-15T20:06:54Z",
|
||
"updated_at": "2020-06-25T02:16:52Z",
|
||
"pushed_at": "2019-09-17T19:40:29Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 227013447,
|
||
"name": "CVE-2019-0604",
|
||
"full_name": "boxhg\/CVE-2019-0604",
|
||
"owner": {
|
||
"login": "boxhg",
|
||
"id": 40994449,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40994449?v=4",
|
||
"html_url": "https:\/\/github.com\/boxhg"
|
||
},
|
||
"html_url": "https:\/\/github.com\/boxhg\/CVE-2019-0604",
|
||
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload",
|
||
"fork": false,
|
||
"created_at": "2019-12-10T02:39:57Z",
|
||
"updated_at": "2020-10-30T02:41:59Z",
|
||
"pushed_at": "2019-12-11T09:33:31Z",
|
||
"stargazers_count": 22,
|
||
"watchers_count": 22,
|
||
"forks_count": 5,
|
||
"forks": 5,
|
||
"watchers": 22,
|
||
"score": 0
|
||
}
|
||
] |