PoC-in-GitHub/2022/CVE-2022-39299.json
2025-11-26 09:43:12 +09:00

64 lines
No EOL
2.3 KiB
JSON

[
{
"id": 559966352,
"name": "CVE-2022-39299_PoC_Generator",
"full_name": "doyensec\/CVE-2022-39299_PoC_Generator",
"owner": {
"login": "doyensec",
"id": 25747968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25747968?v=4",
"html_url": "https:\/\/github.com\/doyensec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/doyensec\/CVE-2022-39299_PoC_Generator",
"description": "A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-saml",
"fork": false,
"created_at": "2022-10-31T13:24:34Z",
"updated_at": "2025-11-11T03:49:46Z",
"pushed_at": "2023-02-08T17:24:05Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 19,
"score": 0,
"subscribers_count": 2
},
{
"id": 957313298,
"name": "CVE-2022-39299-Research",
"full_name": "KaztoRay\/CVE-2022-39299-Research",
"owner": {
"login": "KaztoRay",
"id": 170967564,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170967564?v=4",
"html_url": "https:\/\/github.com\/KaztoRay",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/KaztoRay\/CVE-2022-39299-Research",
"description": "CVE-2022-39299 취약점에 대한 Research 정리",
"fork": false,
"created_at": "2025-03-30T03:39:58Z",
"updated_at": "2025-11-25T22:16:53Z",
"pushed_at": "2025-03-30T03:40:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}
]