mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 19:09:59 +01:00
186 lines
No EOL
6.4 KiB
JSON
186 lines
No EOL
6.4 KiB
JSON
[
|
||
{
|
||
"id": 102583828,
|
||
"name": "struts-rce-cve-2017-9805",
|
||
"full_name": "luc10\/struts-rce-cve-2017-9805",
|
||
"owner": {
|
||
"login": "luc10",
|
||
"id": 7849730,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7849730?v=4",
|
||
"html_url": "https:\/\/github.com\/luc10"
|
||
},
|
||
"html_url": "https:\/\/github.com\/luc10\/struts-rce-cve-2017-9805",
|
||
"description": "CVE 2017-9805",
|
||
"fork": false,
|
||
"created_at": "2017-09-06T08:32:01Z",
|
||
"updated_at": "2021-03-09T15:51:45Z",
|
||
"pushed_at": "2020-08-31T04:34:29Z",
|
||
"stargazers_count": 55,
|
||
"watchers_count": 55,
|
||
"forks_count": 28,
|
||
"forks": 28,
|
||
"watchers": 55,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 111928630,
|
||
"name": "-CVE-2017-9805",
|
||
"full_name": "0x00-0x00\/-CVE-2017-9805",
|
||
"owner": {
|
||
"login": "0x00-0x00",
|
||
"id": 23364530,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4",
|
||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0x00-0x00\/-CVE-2017-9805",
|
||
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)",
|
||
"fork": false,
|
||
"created_at": "2017-11-24T14:46:35Z",
|
||
"updated_at": "2021-04-08T02:25:46Z",
|
||
"pushed_at": "2020-11-26T18:35:29Z",
|
||
"stargazers_count": 13,
|
||
"watchers_count": 13,
|
||
"forks_count": 10,
|
||
"forks": 10,
|
||
"watchers": 13,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 263410855,
|
||
"name": "CVE-2017-9805---Documentation---IT19143378",
|
||
"full_name": "AvishkaSenadheera\/CVE-2017-9805---Documentation---IT19143378",
|
||
"owner": {
|
||
"login": "AvishkaSenadheera",
|
||
"id": 48066295,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48066295?v=4",
|
||
"html_url": "https:\/\/github.com\/AvishkaSenadheera"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AvishkaSenadheera\/CVE-2017-9805---Documentation---IT19143378",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-12T17:53:57Z",
|
||
"updated_at": "2020-05-12T18:15:38Z",
|
||
"pushed_at": "2020-05-12T18:15:37Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 271482237,
|
||
"name": "CVE-2017-9805-Exploit",
|
||
"full_name": "wifido\/CVE-2017-9805-Exploit",
|
||
"owner": {
|
||
"login": "wifido",
|
||
"id": 16313853,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16313853?v=4",
|
||
"html_url": "https:\/\/github.com\/wifido"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wifido\/CVE-2017-9805-Exploit",
|
||
"description": "Struts 2.5 - 2.5.12 REST Plugin XStream RCE",
|
||
"fork": false,
|
||
"created_at": "2020-06-11T07:36:56Z",
|
||
"updated_at": "2021-04-04T04:33:56Z",
|
||
"pushed_at": "2020-05-17T13:37:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 312564506,
|
||
"name": "apache-struts-cve-2017-9805",
|
||
"full_name": "rvermeulen\/apache-struts-cve-2017-9805",
|
||
"owner": {
|
||
"login": "rvermeulen",
|
||
"id": 636626,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/636626?v=4",
|
||
"html_url": "https:\/\/github.com\/rvermeulen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rvermeulen\/apache-struts-cve-2017-9805",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-11-13T12:04:32Z",
|
||
"updated_at": "2020-11-13T12:12:37Z",
|
||
"pushed_at": "2020-11-13T12:07:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 316623697,
|
||
"name": "-CVE-2017-9805-",
|
||
"full_name": "jongmartinez\/-CVE-2017-9805-",
|
||
"owner": {
|
||
"login": "jongmartinez",
|
||
"id": 11743460,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11743460?v=4",
|
||
"html_url": "https:\/\/github.com\/jongmartinez"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jongmartinez\/-CVE-2017-9805-",
|
||
"description": "Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805) ",
|
||
"fork": false,
|
||
"created_at": "2020-11-28T00:00:37Z",
|
||
"updated_at": "2020-11-28T00:34:46Z",
|
||
"pushed_at": "2020-11-28T00:34:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 344944105,
|
||
"name": "CVE-2017-9805",
|
||
"full_name": "z3bd\/CVE-2017-9805",
|
||
"owner": {
|
||
"login": "z3bd",
|
||
"id": 79710562,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79710562?v=4",
|
||
"html_url": "https:\/\/github.com\/z3bd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/z3bd\/CVE-2017-9805",
|
||
"description": "struts2-rest-showcase 2.5.10",
|
||
"fork": false,
|
||
"created_at": "2021-03-05T21:57:11Z",
|
||
"updated_at": "2021-03-05T23:26:32Z",
|
||
"pushed_at": "2021-03-05T23:26:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 354456108,
|
||
"name": "CVE-2017-9805-Exploit",
|
||
"full_name": "0xd3vil\/CVE-2017-9805-Exploit",
|
||
"owner": {
|
||
"login": "0xd3vil",
|
||
"id": 32324065,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32324065?v=4",
|
||
"html_url": "https:\/\/github.com\/0xd3vil"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xd3vil\/CVE-2017-9805-Exploit",
|
||
"description": "CVE-2017-9805-Exploit",
|
||
"fork": false,
|
||
"created_at": "2021-04-04T04:35:19Z",
|
||
"updated_at": "2021-04-04T04:35:48Z",
|
||
"pushed_at": "2021-04-04T04:35:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |