mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
84 lines
No EOL
2.8 KiB
JSON
84 lines
No EOL
2.8 KiB
JSON
[
|
|
{
|
|
"id": 662043677,
|
|
"name": "CVE-2022-46080",
|
|
"full_name": "yerodin\/CVE-2022-46080",
|
|
"owner": {
|
|
"login": "yerodin",
|
|
"id": 9205071,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9205071?v=4",
|
|
"html_url": "https:\/\/github.com\/yerodin",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yerodin\/CVE-2022-46080",
|
|
"description": "Nexxt Router 15.03.06.60 Authentication Bypass and Remote Command Execution",
|
|
"fork": false,
|
|
"created_at": "2023-07-04T08:31:04Z",
|
|
"updated_at": "2023-11-08T19:15:20Z",
|
|
"pushed_at": "2023-07-04T08:31:37Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 840471119,
|
|
"name": "CVE-2022-46080",
|
|
"full_name": "geniuszly\/CVE-2022-46080",
|
|
"owner": {
|
|
"login": "geniuszly",
|
|
"id": 137893386,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
|
|
"html_url": "https:\/\/github.com\/geniuszly",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/geniuszly\/CVE-2022-46080",
|
|
"description": "it is script that enables Telnet on routers by sending a specially crafted request. The script allows users to specify the router's URL, Telnet port, and password. It validates the inputs and logs the process, providing feedback on whether the exploit was successful.",
|
|
"fork": false,
|
|
"created_at": "2024-08-09T19:32:32Z",
|
|
"updated_at": "2024-11-20T16:31:00Z",
|
|
"pushed_at": "2024-08-11T07:29:30Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"buffer-overflow",
|
|
"cve",
|
|
"cve-2022-46080",
|
|
"cybersecurity",
|
|
"ethical-hacking",
|
|
"exploit",
|
|
"exploit-development",
|
|
"linux",
|
|
"nexxt",
|
|
"nexxt-router",
|
|
"penetration-testing",
|
|
"poc",
|
|
"rce",
|
|
"rce-exploit",
|
|
"router",
|
|
"security",
|
|
"telnet",
|
|
"vulnerability",
|
|
"vulnerability-research"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |