PoC-in-GitHub/2022/CVE-2022-4510.json
2025-01-08 09:32:44 +09:00

95 lines
No EOL
3.4 KiB
JSON

[
{
"id": 598309338,
"name": "CVE-2022-4510",
"full_name": "electr0sm0g\/CVE-2022-4510",
"owner": {
"login": "electr0sm0g",
"id": 8340491,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8340491?v=4",
"html_url": "https:\/\/github.com\/electr0sm0g",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/electr0sm0g\/CVE-2022-4510",
"description": "Binwalk Remote Command Execution",
"fork": false,
"created_at": "2023-02-06T20:53:49Z",
"updated_at": "2024-11-17T01:33:08Z",
"pushed_at": "2023-02-06T20:54:33Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 659028420,
"name": "CVE-2022-4510-WalkingPath",
"full_name": "adhikara13\/CVE-2022-4510-WalkingPath",
"owner": {
"login": "adhikara13",
"id": 44716348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4",
"html_url": "https:\/\/github.com\/adhikara13",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/adhikara13\/CVE-2022-4510-WalkingPath",
"description": "A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.",
"fork": false,
"created_at": "2023-06-27T02:20:13Z",
"updated_at": "2024-11-22T19:48:06Z",
"pushed_at": "2023-06-27T02:29:26Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},
{
"id": 665275498,
"name": "BadPfs-CVE-2022-4510",
"full_name": "Kalagious\/BadPfs-CVE-2022-4510",
"owner": {
"login": "Kalagious",
"id": 44515549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44515549?v=4",
"html_url": "https:\/\/github.com\/Kalagious",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Kalagious\/BadPfs-CVE-2022-4510",
"description": "Python script that generates pfs payloads to exploit CVE-2022-4510",
"fork": false,
"created_at": "2023-07-11T20:55:58Z",
"updated_at": "2024-06-08T19:59:42Z",
"pushed_at": "2023-07-11T20:59:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]