mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
397 lines
No EOL
14 KiB
JSON
397 lines
No EOL
14 KiB
JSON
[
|
||
{
|
||
"id": 490649255,
|
||
"name": "victorian_machinery",
|
||
"full_name": "jbaines-r7\/victorian_machinery",
|
||
"owner": {
|
||
"login": "jbaines-r7",
|
||
"id": 91965877,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
|
||
"html_url": "https:\/\/github.com\/jbaines-r7"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jbaines-r7\/victorian_machinery",
|
||
"description": "Proof of concept exploit for CVE-2022-30525 (Zxyel firewall command injection)",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T10:31:19Z",
|
||
"updated_at": "2023-06-06T10:02:11Z",
|
||
"pushed_at": "2022-05-12T10:37:44Z",
|
||
"stargazers_count": 30,
|
||
"watchers_count": 30,
|
||
"has_discussions": false,
|
||
"forks_count": 15,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30525",
|
||
"exploit",
|
||
"poc",
|
||
"zyxel"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 15,
|
||
"watchers": 30,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 491880937,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "Henry4E36\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "Henry4E36",
|
||
"id": 41940481,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
|
||
"html_url": "https:\/\/github.com\/Henry4E36"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Henry4E36\/CVE-2022-30525",
|
||
"description": "Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)",
|
||
"fork": false,
|
||
"created_at": "2022-05-13T12:03:28Z",
|
||
"updated_at": "2022-09-27T06:08:52Z",
|
||
"pushed_at": "2022-05-13T12:29:47Z",
|
||
"stargazers_count": 24,
|
||
"watchers_count": 24,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 24,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 491898473,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "shuai06\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "shuai06",
|
||
"id": 39673856,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673856?v=4",
|
||
"html_url": "https:\/\/github.com\/shuai06"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shuai06\/CVE-2022-30525",
|
||
"description": "Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)批量检测脚本",
|
||
"fork": false,
|
||
"created_at": "2022-05-13T12:58:43Z",
|
||
"updated_at": "2023-07-04T13:10:34Z",
|
||
"pushed_at": "2022-05-13T14:46:04Z",
|
||
"stargazers_count": 34,
|
||
"watchers_count": 34,
|
||
"has_discussions": false,
|
||
"forks_count": 10,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 10,
|
||
"watchers": 34,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 491998597,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "savior-only\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "savior-only",
|
||
"id": 69495405,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69495405?v=4",
|
||
"html_url": "https:\/\/github.com\/savior-only"
|
||
},
|
||
"html_url": "https:\/\/github.com\/savior-only\/CVE-2022-30525",
|
||
"description": "Zyxel 防火墙未经身份验证的远程命令注入",
|
||
"fork": false,
|
||
"created_at": "2022-05-13T18:16:31Z",
|
||
"updated_at": "2023-06-14T05:55:50Z",
|
||
"pushed_at": "2022-05-14T04:45:38Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 492404562,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "M4fiaB0y\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "M4fiaB0y",
|
||
"id": 95071636,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95071636?v=4",
|
||
"html_url": "https:\/\/github.com\/M4fiaB0y"
|
||
},
|
||
"html_url": "https:\/\/github.com\/M4fiaB0y\/CVE-2022-30525",
|
||
"description": "Zyxel Firewall Remote Command Injection Vulnerability (CVE-2022-30525) Batch Detection Script",
|
||
"fork": false,
|
||
"created_at": "2022-05-15T06:20:06Z",
|
||
"updated_at": "2023-09-28T11:38:50Z",
|
||
"pushed_at": "2022-05-15T07:31:40Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 492686283,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "k0sf\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "k0sf",
|
||
"id": 13890845,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13890845?v=4",
|
||
"html_url": "https:\/\/github.com\/k0sf"
|
||
},
|
||
"html_url": "https:\/\/github.com\/k0sf\/CVE-2022-30525",
|
||
"description": "CVE-2022-30525(Zxyel 防火墙命令注入)的概念证明漏洞利用",
|
||
"fork": false,
|
||
"created_at": "2022-05-16T04:45:43Z",
|
||
"updated_at": "2022-05-19T10:30:01Z",
|
||
"pushed_at": "2022-05-16T04:57:20Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 492763116,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "superzerosec\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "superzerosec",
|
||
"id": 57648217,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||
"html_url": "https:\/\/github.com\/superzerosec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-30525",
|
||
"description": "CVE-2022-30525 POC exploit",
|
||
"fork": false,
|
||
"created_at": "2022-05-16T09:15:43Z",
|
||
"updated_at": "2022-05-24T05:41:44Z",
|
||
"pushed_at": "2022-05-17T23:42:09Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 494055901,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "160Team\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "160Team",
|
||
"id": 100503670,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100503670?v=4",
|
||
"html_url": "https:\/\/github.com\/160Team"
|
||
},
|
||
"html_url": "https:\/\/github.com\/160Team\/CVE-2022-30525",
|
||
"description": "CVE-2022-30525 Zyxel防火墙命令注入漏洞 POC&EXP",
|
||
"fork": false,
|
||
"created_at": "2022-05-19T12:09:42Z",
|
||
"updated_at": "2022-05-19T12:09:42Z",
|
||
"pushed_at": "2022-05-19T12:09:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 494150170,
|
||
"name": "CVE-2022-30525-Reverse-Shell",
|
||
"full_name": "zhefox\/CVE-2022-30525-Reverse-Shell",
|
||
"owner": {
|
||
"login": "zhefox",
|
||
"id": 77232781,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77232781?v=4",
|
||
"html_url": "https:\/\/github.com\/zhefox"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zhefox\/CVE-2022-30525-Reverse-Shell",
|
||
"description": "Simple python script to exploit CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection",
|
||
"fork": false,
|
||
"created_at": "2022-05-19T16:33:34Z",
|
||
"updated_at": "2022-05-19T10:29:45Z",
|
||
"pushed_at": "2022-05-19T11:29:16Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 495497134,
|
||
"name": "cve-2022-30525",
|
||
"full_name": "iveresk\/cve-2022-30525",
|
||
"owner": {
|
||
"login": "iveresk",
|
||
"id": 28754633,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
|
||
"html_url": "https:\/\/github.com\/iveresk"
|
||
},
|
||
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-30525",
|
||
"description": "Initial POC for the CVE-2022-30525",
|
||
"fork": false,
|
||
"created_at": "2022-05-23T16:51:42Z",
|
||
"updated_at": "2023-01-26T17:52:33Z",
|
||
"pushed_at": "2022-05-24T15:06:23Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 497244309,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "west9b\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "west9b",
|
||
"id": 103512651,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103512651?v=4",
|
||
"html_url": "https:\/\/github.com\/west9b"
|
||
},
|
||
"html_url": "https:\/\/github.com\/west9b\/CVE-2022-30525",
|
||
"description": "CVE-2022-30525 Zyxel 防火墙命令注入漏洞 POC&EXPC ",
|
||
"fork": false,
|
||
"created_at": "2022-05-28T07:19:31Z",
|
||
"updated_at": "2023-08-20T09:06:12Z",
|
||
"pushed_at": "2022-05-28T07:52:19Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 9,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 502704119,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "furkanzengin\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "furkanzengin",
|
||
"id": 58439534,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58439534?v=4",
|
||
"html_url": "https:\/\/github.com\/furkanzengin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/furkanzengin\/CVE-2022-30525",
|
||
"description": "A OS Command Injection Vulnerability in the CGI Program of Zyxel",
|
||
"fork": false,
|
||
"created_at": "2022-06-12T19:04:41Z",
|
||
"updated_at": "2022-11-30T20:16:19Z",
|
||
"pushed_at": "2022-06-12T19:27:56Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 503116476,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "ProngedFork\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "ProngedFork",
|
||
"id": 67598703,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67598703?v=4",
|
||
"html_url": "https:\/\/github.com\/ProngedFork"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ProngedFork\/CVE-2022-30525",
|
||
"description": "CVE-2022-30525 POC",
|
||
"fork": false,
|
||
"created_at": "2022-06-13T21:11:54Z",
|
||
"updated_at": "2023-01-15T22:04:26Z",
|
||
"pushed_at": "2022-06-13T21:22:41Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |