mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 13:22:21 +01:00
230 lines
No EOL
7.8 KiB
JSON
230 lines
No EOL
7.8 KiB
JSON
[
|
||
{
|
||
"id": 490649255,
|
||
"name": "victorian_machinery",
|
||
"full_name": "jbaines-r7\/victorian_machinery",
|
||
"owner": {
|
||
"login": "jbaines-r7",
|
||
"id": 91965877,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91965877?v=4",
|
||
"html_url": "https:\/\/github.com\/jbaines-r7"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jbaines-r7\/victorian_machinery",
|
||
"description": "Proof of concept exploit for CVE-2022-30525 (Zxyel firewall command injection)",
|
||
"fork": false,
|
||
"created_at": "2022-05-10T10:31:19Z",
|
||
"updated_at": "2022-05-17T08:20:01Z",
|
||
"pushed_at": "2022-05-12T10:37:44Z",
|
||
"stargazers_count": 25,
|
||
"watchers_count": 25,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2022-30525",
|
||
"exploit",
|
||
"poc",
|
||
"zyxel"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 25,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491880937,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "Henry4E36\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "Henry4E36",
|
||
"id": 41940481,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
|
||
"html_url": "https:\/\/github.com\/Henry4E36"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Henry4E36\/CVE-2022-30525",
|
||
"description": "Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)",
|
||
"fork": false,
|
||
"created_at": "2022-05-13T12:03:28Z",
|
||
"updated_at": "2022-05-16T12:30:22Z",
|
||
"pushed_at": "2022-05-13T12:29:47Z",
|
||
"stargazers_count": 14,
|
||
"watchers_count": 14,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 14,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491898473,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "shuai06\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "shuai06",
|
||
"id": 39673856,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673856?v=4",
|
||
"html_url": "https:\/\/github.com\/shuai06"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shuai06\/CVE-2022-30525",
|
||
"description": "Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)批量检测脚本",
|
||
"fork": false,
|
||
"created_at": "2022-05-13T12:58:43Z",
|
||
"updated_at": "2022-05-17T17:26:17Z",
|
||
"pushed_at": "2022-05-13T14:46:04Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 491998597,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "savior-only\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "savior-only",
|
||
"id": 69495405,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69495405?v=4",
|
||
"html_url": "https:\/\/github.com\/savior-only"
|
||
},
|
||
"html_url": "https:\/\/github.com\/savior-only\/CVE-2022-30525",
|
||
"description": "Zyxel 防火墙未经身份验证的远程命令注入",
|
||
"fork": false,
|
||
"created_at": "2022-05-13T18:16:31Z",
|
||
"updated_at": "2022-05-16T02:50:15Z",
|
||
"pushed_at": "2022-05-14T04:45:38Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 492404562,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "M4fiaB0y\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "M4fiaB0y",
|
||
"id": 95071636,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95071636?v=4",
|
||
"html_url": "https:\/\/github.com\/M4fiaB0y"
|
||
},
|
||
"html_url": "https:\/\/github.com\/M4fiaB0y\/CVE-2022-30525",
|
||
"description": "Zyxel Firewall Remote Command Injection Vulnerability (CVE-2022-30525) Batch Detection Script",
|
||
"fork": false,
|
||
"created_at": "2022-05-15T06:20:06Z",
|
||
"updated_at": "2022-05-15T06:24:15Z",
|
||
"pushed_at": "2022-05-15T07:31:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 492686283,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "YGoldking\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "YGoldking",
|
||
"id": 13890845,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13890845?v=4",
|
||
"html_url": "https:\/\/github.com\/YGoldking"
|
||
},
|
||
"html_url": "https:\/\/github.com\/YGoldking\/CVE-2022-30525",
|
||
"description": "CVE-2022-30525(Zxyel 防火墙命令注入)的概念证明漏洞利用",
|
||
"fork": false,
|
||
"created_at": "2022-05-16T04:45:43Z",
|
||
"updated_at": "2022-05-16T06:07:44Z",
|
||
"pushed_at": "2022-05-16T04:57:20Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 492763116,
|
||
"name": "CVE-2022-30525",
|
||
"full_name": "superzerosec\/CVE-2022-30525",
|
||
"owner": {
|
||
"login": "superzerosec",
|
||
"id": 57648217,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||
"html_url": "https:\/\/github.com\/superzerosec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-30525",
|
||
"description": "CVE-2022-30525 POC exploit",
|
||
"fork": false,
|
||
"created_at": "2022-05-16T09:15:43Z",
|
||
"updated_at": "2022-05-16T09:15:43Z",
|
||
"pushed_at": "2022-05-16T09:15:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 493320775,
|
||
"name": "CVE-2022-30525-Zyxel-Mass-Exploiter",
|
||
"full_name": "ExploitPwner\/CVE-2022-30525-Zyxel-Mass-Exploiter",
|
||
"owner": {
|
||
"login": "ExploitPwner",
|
||
"id": 103929208,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
|
||
"html_url": "https:\/\/github.com\/ExploitPwner"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-30525-Zyxel-Mass-Exploiter",
|
||
"description": "Zyxel multithreaded Mass Exploitation tool compatible with URL\/IP lists. ",
|
||
"fork": false,
|
||
"created_at": "2022-05-17T15:58:19Z",
|
||
"updated_at": "2022-05-17T16:16:28Z",
|
||
"pushed_at": "2022-05-17T16:14:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"0day",
|
||
"cve-2022-30525",
|
||
"exploit",
|
||
"mass-exploiter",
|
||
"zero-day",
|
||
"zyxel"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |