2024-06-26 08:47:13 +02:00
[
{
"id" : 639674200 ,
"name" : "CVE-2022-4616-POC" ,
"full_name" : "ahanel13\/CVE-2022-4616-POC" ,
"owner" : {
"login" : "ahanel13" ,
"id" : 47185077 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47185077?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/ahanel13" ,
"user_view_type" : "public"
2024-06-26 08:47:13 +02:00
} ,
"html_url" : "https:\/\/github.com\/ahanel13\/CVE-2022-4616-POC" ,
"description" : "This Python script aids in exploiting CVE-2022-46169 by automating payload delivery and response handling. It starts an HTTP server, listens for requests, and enables command input for real-time interaction with a vulnerable target." ,
"fork" : false ,
"created_at" : "2023-05-12T01:20:15Z" ,
"updated_at" : "2023-05-24T22:36:05Z" ,
"pushed_at" : "2023-05-24T22:36:57Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]