PoC-in-GitHub/2022/CVE-2022-43293.json
2025-01-08 09:32:44 +09:00

54 lines
No EOL
1.6 KiB
JSON

[
{
"id": 624878736,
"name": "CVE-2022-43293",
"full_name": "LucaBarile\/CVE-2022-43293",
"owner": {
"login": "LucaBarile",
"id": 74877659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74877659?v=4",
"html_url": "https:\/\/github.com\/LucaBarile",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LucaBarile\/CVE-2022-43293",
"description": "Exploit and report for CVE-2022-43293",
"fork": false,
"created_at": "2023-04-07T13:38:27Z",
"updated_at": "2023-04-07T16:47:13Z",
"pushed_at": "2023-04-07T15:12:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0-day",
"arbitrary-file-overwrite",
"arbitrary-file-write",
"cng-sys",
"denial-of-service",
"disclosure",
"exploit",
"impersonation",
"link-following",
"link-following-attack",
"mount-point",
"poc",
"proof-of-concept",
"symbolic-link",
"vulnerability",
"wacom",
"wacom-vulnerability",
"windows-denial-of-service",
"write-up",
"zero-day"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]