PoC-in-GitHub/2022/CVE-2022-1329.json

128 lines
4.6 KiB
JSON
Raw Normal View History

2022-04-16 14:14:52 +02:00
[
{
"id": 482065912,
"name": "CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit",
"full_name": "AkuCyberSec\/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit",
"owner": {
"login": "AkuCyberSec",
"id": 103601332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103601332?v=4",
"html_url": "https:\/\/github.com\/AkuCyberSec"
},
"html_url": "https:\/\/github.com\/AkuCyberSec\/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit",
"description": null,
"fork": false,
"created_at": "2022-04-15T19:37:35Z",
2023-05-29 14:31:08 +02:00
"updated_at": "2023-05-29T08:04:13Z",
2022-04-22 20:17:58 +02:00
"pushed_at": "2022-04-22T17:55:37Z",
2023-05-29 14:31:08 +02:00
"stargazers_count": 18,
"watchers_count": 18,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2023-04-20 14:34:03 +02:00
"forks_count": 8,
2022-04-16 14:14:52 +02:00
"allow_forking": true,
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2022-04-16 14:14:52 +02:00
"topics": [],
"visibility": "public",
2023-04-20 14:34:03 +02:00
"forks": 8,
2023-05-29 14:31:08 +02:00
"watchers": 18,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2022-08-05 02:16:53 +02:00
},
{
"id": 482438268,
"name": "CVE-2022-1329",
"full_name": "mcdulltii\/CVE-2022-1329",
"owner": {
"login": "mcdulltii",
"id": 30497633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30497633?v=4",
"html_url": "https:\/\/github.com\/mcdulltii"
},
"html_url": "https:\/\/github.com\/mcdulltii\/CVE-2022-1329",
"description": "WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC",
"fork": false,
"created_at": "2022-04-17T05:44:45Z",
2023-08-17 08:34:20 +02:00
"updated_at": "2023-08-17T00:57:32Z",
2022-08-05 02:16:53 +02:00
"pushed_at": "2022-04-17T05:53:54Z",
2023-08-17 08:34:20 +02:00
"stargazers_count": 11,
"watchers_count": 11,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2023-08-08 16:19:46 +02:00
"forks_count": 8,
2022-08-05 02:16:53 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1329",
"elementor",
"poc",
"rce",
"wordpress"
],
"visibility": "public",
2023-08-08 16:19:46 +02:00
"forks": 8,
2023-08-17 08:34:20 +02:00
"watchers": 11,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 0
2022-08-05 02:16:53 +02:00
},
{
"id": 483460698,
"name": "CVE-2022-1329-WordPress-Elementor-RCE",
"full_name": "Grazee\/CVE-2022-1329-WordPress-Elementor-RCE",
"owner": {
"login": "Grazee",
"id": 12786402,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12786402?v=4",
"html_url": "https:\/\/github.com\/Grazee"
},
"html_url": "https:\/\/github.com\/Grazee\/CVE-2022-1329-WordPress-Elementor-RCE",
"description": null,
"fork": false,
"created_at": "2022-04-20T01:06:01Z",
2022-09-18 02:17:11 +02:00
"updated_at": "2022-09-17T19:36:36Z",
2022-08-05 02:16:53 +02:00
"pushed_at": "2022-04-20T03:38:43Z",
2022-09-18 02:17:11 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2022-12-01 19:21:00 +01:00
"forks_count": 1,
2022-08-05 02:16:53 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2022-12-01 19:21:00 +01:00
"forks": 1,
2022-09-18 02:17:11 +02:00
"watchers": 2,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-08-10 02:26:10 +02:00
},
{
"id": 594762176,
"name": "CVE-2022-1329",
"full_name": "dexit\/CVE-2022-1329",
"owner": {
"login": "dexit",
"id": 6205151,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6205151?v=4",
"html_url": "https:\/\/github.com\/dexit"
},
"html_url": "https:\/\/github.com\/dexit\/CVE-2022-1329",
"description": "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~\/core\/app\/modules\/onboarding\/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to o CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-29T15:13:34Z",
"updated_at": "2023-02-20T12:39:20Z",
"pushed_at": "2022-12-28T12:11:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
2022-04-16 14:14:52 +02:00
}
]