mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
83 lines
No EOL
2.9 KiB
JSON
83 lines
No EOL
2.9 KiB
JSON
[
|
|
{
|
|
"id": 602214790,
|
|
"name": "CVE-2022-45701",
|
|
"full_name": "yerodin\/CVE-2022-45701",
|
|
"owner": {
|
|
"login": "yerodin",
|
|
"id": 9205071,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9205071?v=4",
|
|
"html_url": "https:\/\/github.com\/yerodin",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yerodin\/CVE-2022-45701",
|
|
"description": "Arris Router Firmware 9.1.103 - Remote Code Execution (RCE) (Authenticated) POC Exploit (CVE-2022-45701)",
|
|
"fork": false,
|
|
"created_at": "2023-02-15T18:31:32Z",
|
|
"updated_at": "2024-07-24T05:54:30Z",
|
|
"pushed_at": "2023-02-16T18:15:55Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 840470520,
|
|
"name": "CVE-2022-45701",
|
|
"full_name": "geniuszly\/CVE-2022-45701",
|
|
"owner": {
|
|
"login": "geniuszly",
|
|
"id": 137893386,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
|
"html_url": "https:\/\/github.com\/geniuszly",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-45701",
|
|
"description": "it is script designed to exploit certain vulnerabilities in routers by sending payloads through SNMP (Simple Network Management Protocol). The script automates the process of authorization, payload generation, and execution, allowing for remote command execution on the target device.",
|
|
"fork": false,
|
|
"created_at": "2024-08-09T19:30:20Z",
|
|
"updated_at": "2024-10-06T16:41:27Z",
|
|
"pushed_at": "2024-08-09T19:31:12Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"arris",
|
|
"arris-modem",
|
|
"arris-router",
|
|
"buffer-overflow",
|
|
"cve",
|
|
"cve-2022-45701",
|
|
"cybersecurity",
|
|
"ethical-hacking",
|
|
"exploit",
|
|
"exploit-development",
|
|
"linux",
|
|
"penetration-testing",
|
|
"poc",
|
|
"python",
|
|
"security",
|
|
"snmp",
|
|
"vulnerability",
|
|
"vulnerability-research"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |