209 lines
No EOL
7.6 KiB
JSON
209 lines
No EOL
7.6 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
|
"full_name": "duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
|
"html_url": "https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC",
|
|
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator",
|
|
"stargazers_count": 271,
|
|
"forks_count": 40,
|
|
"created_at": "2023-02-02T15:34:28Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268",
|
|
"full_name": "voidz0r/CVE-2022-44268",
|
|
"html_url": "https://github.com/voidz0r/CVE-2022-44268",
|
|
"description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read",
|
|
"stargazers_count": 216,
|
|
"forks_count": 25,
|
|
"created_at": "2023-02-05T18:42:27Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268",
|
|
"full_name": "kljunowsky/CVE-2022-44268",
|
|
"html_url": "https://github.com/kljunowsky/CVE-2022-44268",
|
|
"description": "CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit",
|
|
"stargazers_count": 23,
|
|
"forks_count": 7,
|
|
"created_at": "2023-02-13T02:00:51Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
|
|
"full_name": "y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
|
|
"html_url": "https://github.com/y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment",
|
|
"description": "The vulnerable recurrence docker environment for CVE-2022-44268",
|
|
"stargazers_count": 8,
|
|
"forks_count": 2,
|
|
"created_at": "2023-02-03T08:02:28Z"
|
|
},
|
|
{
|
|
"name": "imagemagick-CVE-2022-44268",
|
|
"full_name": "Vulnmachines/imagemagick-CVE-2022-44268",
|
|
"html_url": "https://github.com/Vulnmachines/imagemagick-CVE-2022-44268",
|
|
"description": "Imagemagick CVE-2022-44268",
|
|
"stargazers_count": 8,
|
|
"forks_count": 1,
|
|
"created_at": "2023-02-06T10:45:42Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268",
|
|
"full_name": "entr0pie/CVE-2022-44268",
|
|
"html_url": "https://github.com/entr0pie/CVE-2022-44268",
|
|
"description": "PoC of Imagemagick's Arbitrary File Read",
|
|
"stargazers_count": 6,
|
|
"forks_count": 1,
|
|
"created_at": "2023-07-03T18:13:44Z"
|
|
},
|
|
{
|
|
"name": "cve-2022-44268-detector",
|
|
"full_name": "jnschaeffer/cve-2022-44268-detector",
|
|
"html_url": "https://github.com/jnschaeffer/cve-2022-44268-detector",
|
|
"description": "Detect images that likely exploit CVE-2022-44268",
|
|
"stargazers_count": 5,
|
|
"forks_count": 1,
|
|
"created_at": "2023-02-04T01:35:08Z"
|
|
},
|
|
{
|
|
"name": "cve-2022-44268",
|
|
"full_name": "agathanon/cve-2022-44268",
|
|
"html_url": "https://github.com/agathanon/cve-2022-44268",
|
|
"description": "Payload generator and extractor for CVE-2022-44268 written in Python.",
|
|
"stargazers_count": 4,
|
|
"forks_count": 1,
|
|
"created_at": "2023-02-03T19:02:27Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268-automated",
|
|
"full_name": "PanAdamski/CVE-2022-44268-automated",
|
|
"html_url": "https://github.com/PanAdamski/CVE-2022-44268-automated",
|
|
"description": null,
|
|
"stargazers_count": 3,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-28T11:28:34Z"
|
|
},
|
|
{
|
|
"name": "auto-cve-2022-44268.sh",
|
|
"full_name": "narekkay/auto-cve-2022-44268.sh",
|
|
"html_url": "https://github.com/narekkay/auto-cve-2022-44268.sh",
|
|
"description": "Automating Exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read",
|
|
"stargazers_count": 2,
|
|
"forks_count": 1,
|
|
"created_at": "2023-07-17T22:21:33Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268-PoC",
|
|
"full_name": "Baikuya/CVE-2022-44268-PoC",
|
|
"html_url": "https://github.com/Baikuya/CVE-2022-44268-PoC",
|
|
"description": "CVE-2022-44268 PoC",
|
|
"stargazers_count": 2,
|
|
"forks_count": 1,
|
|
"created_at": "2023-02-04T10:50:20Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268-MagiLeak",
|
|
"full_name": "adhikara13/CVE-2022-44268-MagiLeak",
|
|
"html_url": "https://github.com/adhikara13/CVE-2022-44268-MagiLeak",
|
|
"description": "Tools for working with ImageMagick to handle arbitrary file read vulnerabilities. Generate, read, and apply profile information to PNG files using a command-line interface.",
|
|
"stargazers_count": 2,
|
|
"forks_count": 1,
|
|
"created_at": "2023-06-25T20:52:57Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268_By_Kyokito",
|
|
"full_name": "chairat095/CVE-2022-44268_By_Kyokito",
|
|
"html_url": "https://github.com/chairat095/CVE-2022-44268_By_Kyokito",
|
|
"description": "CVE-2022-44268_By_Kyokito",
|
|
"stargazers_count": 2,
|
|
"forks_count": 0,
|
|
"created_at": "2023-08-13T04:43:12Z"
|
|
},
|
|
{
|
|
"name": "POC-CVE-2022-44268",
|
|
"full_name": "betillogalvanfbc/POC-CVE-2022-44268",
|
|
"html_url": "https://github.com/betillogalvanfbc/POC-CVE-2022-44268",
|
|
"description": null,
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2023-03-22T21:26:20Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268-Exploit",
|
|
"full_name": "bhavikmalhotra/CVE-2022-44268-Exploit",
|
|
"html_url": "https://github.com/bhavikmalhotra/CVE-2022-44268-Exploit",
|
|
"description": "Expoit for CVE-2022-44268",
|
|
"stargazers_count": 1,
|
|
"forks_count": 1,
|
|
"created_at": "2023-07-02T17:24:00Z"
|
|
},
|
|
{
|
|
"name": "Exploit-for-ImageMagick-CVE-2022-44268",
|
|
"full_name": "atici/Exploit-for-ImageMagick-CVE-2022-44268",
|
|
"html_url": "https://github.com/atici/Exploit-for-ImageMagick-CVE-2022-44268",
|
|
"description": "A bash script for easyly exploiting ImageMagick Arbitrary File Read Vulnerability CVE-2022-44268",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2023-09-05T17:16:06Z"
|
|
},
|
|
{
|
|
"name": "-CVE-2022-44268",
|
|
"full_name": "NataliSemi/-CVE-2022-44268",
|
|
"html_url": "https://github.com/NataliSemi/-CVE-2022-44268",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-11-14T21:54:17Z"
|
|
},
|
|
{
|
|
"name": "cve-2022-44268",
|
|
"full_name": "Pog-Frog/cve-2022-44268",
|
|
"html_url": "https://github.com/Pog-Frog/cve-2022-44268",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 1,
|
|
"created_at": "2023-07-14T17:46:15Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268",
|
|
"full_name": "FlojBoj/CVE-2022-44268",
|
|
"html_url": "https://github.com/FlojBoj/CVE-2022-44268",
|
|
"description": "ImageMagick 7.1.0-49 vulnerable to Information Disclosure",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-02T09:11:45Z"
|
|
},
|
|
{
|
|
"name": "heroku-CVE-2022-44268-reproduction",
|
|
"full_name": "nfm/heroku-CVE-2022-44268-reproduction",
|
|
"html_url": "https://github.com/nfm/heroku-CVE-2022-44268-reproduction",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-02-21T01:15:07Z"
|
|
},
|
|
{
|
|
"name": "IMAGE-MAGICK-CVE-2022-44268",
|
|
"full_name": "Vagebondcur/IMAGE-MAGICK-CVE-2022-44268",
|
|
"html_url": "https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-10-13T15:43:49Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268-automated-poc",
|
|
"full_name": "Ashifcoder/CVE-2022-44268-automated-poc",
|
|
"html_url": "https://github.com/Ashifcoder/CVE-2022-44268-automated-poc",
|
|
"description": "An information disclosure vulnerability that could be exploited to read arbitrary files from a server when parsing an image in Image Magic.",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-02-04T03:50:07Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-44268-fixed-PoC",
|
|
"full_name": "CygnusX-26/CVE-2022-44268-fixed-PoC",
|
|
"html_url": "https://github.com/CygnusX-26/CVE-2022-44268-fixed-PoC",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2023-12-04T08:48:28Z"
|
|
}
|
|
] |