mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
100 lines
No EOL
3.5 KiB
JSON
100 lines
No EOL
3.5 KiB
JSON
[
|
|
{
|
|
"id": 601030910,
|
|
"name": "CVE-2022-28368",
|
|
"full_name": "rvizx\/CVE-2022-28368",
|
|
"owner": {
|
|
"login": "rvizx",
|
|
"id": 84989569,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
|
|
"html_url": "https:\/\/github.com\/rvizx",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/rvizx\/CVE-2022-28368",
|
|
"description": "Dompdf RCE PoC Exploit - CVE-2022-28368",
|
|
"fork": false,
|
|
"created_at": "2023-02-13T08:10:00Z",
|
|
"updated_at": "2024-08-01T15:21:21Z",
|
|
"pushed_at": "2024-01-19T04:35:32Z",
|
|
"stargazers_count": 17,
|
|
"watchers_count": 17,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2022-28368",
|
|
"cybersecurity",
|
|
"dompdf",
|
|
"exploit"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 17,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 633796587,
|
|
"name": "CVE-2022-28368-handler",
|
|
"full_name": "That-Guy-Steve\/CVE-2022-28368-handler",
|
|
"owner": {
|
|
"login": "That-Guy-Steve",
|
|
"id": 130059785,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130059785?v=4",
|
|
"html_url": "https:\/\/github.com\/That-Guy-Steve",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/That-Guy-Steve\/CVE-2022-28368-handler",
|
|
"description": "This repository contains a python script that will handle the majority of the dompdf cached font exploit (CVE-2022-28368), all you need to do is create the request",
|
|
"fork": false,
|
|
"created_at": "2023-04-28T09:49:05Z",
|
|
"updated_at": "2023-04-28T12:42:28Z",
|
|
"pushed_at": "2023-04-28T12:57:15Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 637435384,
|
|
"name": "Dompdf-Exploit-RCE",
|
|
"full_name": "Henryisnotavailable\/Dompdf-Exploit-RCE",
|
|
"owner": {
|
|
"login": "Henryisnotavailable",
|
|
"id": 112469853,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112469853?v=4",
|
|
"html_url": "https:\/\/github.com\/Henryisnotavailable",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Henryisnotavailable\/Dompdf-Exploit-RCE",
|
|
"description": "An exploit script for CVE-2022-28368 designed to make exploitation less annoying, made for a HTB machine",
|
|
"fork": false,
|
|
"created_at": "2023-05-07T14:49:38Z",
|
|
"updated_at": "2023-05-07T14:51:35Z",
|
|
"pushed_at": "2023-05-07T15:39:10Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |