mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
283 lines
No EOL
9.8 KiB
JSON
283 lines
No EOL
9.8 KiB
JSON
[
|
|
{
|
|
"id": 449096712,
|
|
"name": "CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
|
|
"full_name": "TAPESH-TEAM\/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
|
|
"owner": {
|
|
"login": "TAPESH-TEAM",
|
|
"id": 83407483,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83407483?v=4",
|
|
"html_url": "https:\/\/github.com\/TAPESH-TEAM"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TAPESH-TEAM\/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection",
|
|
"description": "WordPress Core 5.8.2 - 'WP_Query' SQL Injection",
|
|
"fork": false,
|
|
"created_at": "2022-01-18T01:05:04Z",
|
|
"updated_at": "2023-07-28T09:47:39Z",
|
|
"pushed_at": "2023-06-04T09:55:51Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 15,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 458502807,
|
|
"name": "wordpress-CVE-2022-21661",
|
|
"full_name": "purple-WL\/wordpress-CVE-2022-21661",
|
|
"owner": {
|
|
"login": "purple-WL",
|
|
"id": 63894044,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4",
|
|
"html_url": "https:\/\/github.com\/purple-WL"
|
|
},
|
|
"html_url": "https:\/\/github.com\/purple-WL\/wordpress-CVE-2022-21661",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-02-12T11:31:26Z",
|
|
"updated_at": "2023-04-09T00:06:15Z",
|
|
"pushed_at": "2022-02-17T03:59:18Z",
|
|
"stargazers_count": 17,
|
|
"watchers_count": 17,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 17,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 497289034,
|
|
"name": "Wordpress-cve-CVE-2022-21661",
|
|
"full_name": "0x4E0x650x6F\/Wordpress-cve-CVE-2022-21661",
|
|
"owner": {
|
|
"login": "0x4E0x650x6F",
|
|
"id": 1144303,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1144303?v=4",
|
|
"html_url": "https:\/\/github.com\/0x4E0x650x6F"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0x4E0x650x6F\/Wordpress-cve-CVE-2022-21661",
|
|
"description": "Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit",
|
|
"fork": false,
|
|
"created_at": "2022-05-28T10:46:48Z",
|
|
"updated_at": "2023-04-08T02:29:13Z",
|
|
"pushed_at": "2022-05-28T10:50:30Z",
|
|
"stargazers_count": 14,
|
|
"watchers_count": 14,
|
|
"has_discussions": false,
|
|
"forks_count": 9,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 9,
|
|
"watchers": 14,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 518852189,
|
|
"name": "CVE-2022-21661",
|
|
"full_name": "z92g\/CVE-2022-21661",
|
|
"owner": {
|
|
"login": "z92g",
|
|
"id": 108780847,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108780847?v=4",
|
|
"html_url": "https:\/\/github.com\/z92g"
|
|
},
|
|
"html_url": "https:\/\/github.com\/z92g\/CVE-2022-21661",
|
|
"description": "WordPress WP_Query SQL Injection POC",
|
|
"fork": false,
|
|
"created_at": "2022-07-28T13:12:51Z",
|
|
"updated_at": "2023-08-09T18:24:48Z",
|
|
"pushed_at": "2023-03-11T16:01:39Z",
|
|
"stargazers_count": 27,
|
|
"watchers_count": 27,
|
|
"has_discussions": false,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 27,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 519762222,
|
|
"name": "CVE-2022-21661",
|
|
"full_name": "QWERTYisme\/CVE-2022-21661",
|
|
"owner": {
|
|
"login": "QWERTYisme",
|
|
"id": 45824588,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45824588?v=4",
|
|
"html_url": "https:\/\/github.com\/QWERTYisme"
|
|
},
|
|
"html_url": "https:\/\/github.com\/QWERTYisme\/CVE-2022-21661",
|
|
"description": "CVE-2022-21661 exp for Elementor custom skin.",
|
|
"fork": false,
|
|
"created_at": "2022-07-31T11:53:06Z",
|
|
"updated_at": "2023-04-08T02:21:57Z",
|
|
"pushed_at": "2022-08-02T03:09:46Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 562600305,
|
|
"name": "CVE-2022-21661",
|
|
"full_name": "APTIRAN\/CVE-2022-21661",
|
|
"owner": {
|
|
"login": "APTIRAN",
|
|
"id": 80196564,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4",
|
|
"html_url": "https:\/\/github.com\/APTIRAN"
|
|
},
|
|
"html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-21661",
|
|
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
|
|
"fork": false,
|
|
"created_at": "2022-11-06T20:44:10Z",
|
|
"updated_at": "2023-08-17T01:37:43Z",
|
|
"pushed_at": "2022-11-23T21:09:11Z",
|
|
"stargazers_count": 97,
|
|
"watchers_count": 97,
|
|
"has_discussions": false,
|
|
"forks_count": 23,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2022-21661",
|
|
"exploit",
|
|
"poc",
|
|
"wordpress"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 23,
|
|
"watchers": 97,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 588582544,
|
|
"name": "SSI-CVE-2022-21661",
|
|
"full_name": "WellingtonEspindula\/SSI-CVE-2022-21661",
|
|
"owner": {
|
|
"login": "WellingtonEspindula",
|
|
"id": 16787873,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16787873?v=4",
|
|
"html_url": "https:\/\/github.com\/WellingtonEspindula"
|
|
},
|
|
"html_url": "https:\/\/github.com\/WellingtonEspindula\/SSI-CVE-2022-21661",
|
|
"description": "Study and exploit the vulnerability CVE-2022-21661 that allows SQL Injections through plugins POST requests to WordPress versions below 5.8.3.",
|
|
"fork": false,
|
|
"created_at": "2023-01-13T13:31:34Z",
|
|
"updated_at": "2023-05-05T22:45:42Z",
|
|
"pushed_at": "2023-04-07T15:01:55Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2022-21661",
|
|
"exploit",
|
|
"pof",
|
|
"security"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 598931701,
|
|
"name": "CVE-2022-21661-Demo",
|
|
"full_name": "daniel616\/CVE-2022-21661-Demo",
|
|
"owner": {
|
|
"login": "daniel616",
|
|
"id": 26915500,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26915500?v=4",
|
|
"html_url": "https:\/\/github.com\/daniel616"
|
|
},
|
|
"html_url": "https:\/\/github.com\/daniel616\/CVE-2022-21661-Demo",
|
|
"description": "Demonstration of the SQL injection vulnerability in wordpress 5.8.2",
|
|
"fork": false,
|
|
"created_at": "2023-02-08T04:58:57Z",
|
|
"updated_at": "2023-05-13T16:25:10Z",
|
|
"pushed_at": "2023-05-10T01:10:08Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 633180220,
|
|
"name": "CVE-2022-21661-PoC",
|
|
"full_name": "sealldeveloper\/CVE-2022-21661-PoC",
|
|
"owner": {
|
|
"login": "sealldeveloper",
|
|
"id": 120470330,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4",
|
|
"html_url": "https:\/\/github.com\/sealldeveloper"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2022-21661-PoC",
|
|
"description": "A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC",
|
|
"fork": false,
|
|
"created_at": "2023-04-27T00:36:16Z",
|
|
"updated_at": "2023-08-07T03:36:25Z",
|
|
"pushed_at": "2023-04-27T00:50:50Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |