2024-11-29 03:31:51 +09:00
[
{
"id" : 586048910 ,
"name" : "CVE-2022-44149" ,
"full_name" : "yerodin\/CVE-2022-44149" ,
"owner" : {
"login" : "yerodin" ,
"id" : 9205071 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9205071?v=4" ,
"html_url" : "https:\/\/github.com\/yerodin" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/yerodin\/CVE-2022-44149" ,
"description" : "POC Exploit for CVE-2022-44149" ,
"fork" : false ,
"created_at" : "2023-01-06T20:00:25Z" ,
"updated_at" : "2023-01-07T17:03:57Z" ,
"pushed_at" : "2023-01-25T03:08:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 840469662 ,
"name" : "CVE-2022-44149" ,
2024-12-31 21:31:57 +09:00
"full_name" : "geniuszly\/CVE-2022-44149" ,
2024-11-29 03:31:51 +09:00
"owner" : {
2024-12-31 21:31:57 +09:00
"login" : "geniuszly" ,
2024-11-29 03:31:51 +09:00
"id" : 137893386 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4" ,
2024-12-31 21:31:57 +09:00
"html_url" : "https:\/\/github.com\/geniuszly" ,
2024-11-29 03:31:51 +09:00
"user_view_type" : "public"
} ,
2024-12-31 21:31:57 +09:00
"html_url" : "https:\/\/github.com\/geniuszly\/CVE-2022-44149" ,
2024-11-29 03:31:51 +09:00
"description" : "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process." ,
"fork" : false ,
"created_at" : "2024-08-09T19:27:22Z" ,
"updated_at" : "2024-10-06T16:41:28Z" ,
"pushed_at" : "2024-08-09T19:28:51Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2022-44149" ,
"cybersecurity" ,
"ethical-hacking" ,
"exploit" ,
"exploit-development" ,
"linux" ,
"payload" ,
"penetration-testing" ,
"poc" ,
"privilege-escalation" ,
"security" ,
"vulnerability" ,
"vulnerability-research"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
}
]