2023-07-29 15:32:37 +09:00
[
{
"id" : 672152096 ,
"name" : "CVE-2023-35078-Exploit-POC" ,
"full_name" : "vchan-in\/CVE-2023-35078-Exploit-POC" ,
"owner" : {
"login" : "vchan-in" ,
"id" : 17123227 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/17123227?v=4" ,
"html_url" : "https:\/\/github.com\/vchan-in"
} ,
"html_url" : "https:\/\/github.com\/vchan-in\/CVE-2023-35078-Exploit-POC" ,
"description" : "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC" ,
"fork" : false ,
"created_at" : "2023-07-29T05:06:27Z" ,
2023-08-06 15:25:39 +09:00
"updated_at" : "2023-08-06T05:48:45Z" ,
2023-07-30 03:23:42 +09:00
"pushed_at" : "2023-07-29T16:58:16Z" ,
2023-08-06 15:25:39 +09:00
"stargazers_count" : 87 ,
"watchers_count" : 87 ,
2023-07-29 15:32:37 +09:00
"has_discussions" : false ,
2023-08-04 15:32:51 +09:00
"forks_count" : 23 ,
2023-07-29 15:32:37 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-08-04 15:32:51 +09:00
"forks" : 23 ,
2023-08-06 15:25:39 +09:00
"watchers" : 87 ,
2023-07-30 09:26:08 +09:00
"score" : 0 ,
2023-08-04 15:32:51 +09:00
"subscribers_count" : 4
2023-07-30 09:26:08 +09:00
} ,
{
"id" : 672358707 ,
"name" : "CVE-2023-35078" ,
"full_name" : "lager1\/CVE-2023-35078" ,
"owner" : {
"login" : "lager1" ,
"id" : 13869941 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/13869941?v=4" ,
"html_url" : "https:\/\/github.com\/lager1"
} ,
"html_url" : "https:\/\/github.com\/lager1\/CVE-2023-35078" ,
"description" : "Proof of concept script to check if the site is vulnerable to CVE-2023-35078" ,
"fork" : false ,
"created_at" : "2023-07-29T19:58:33Z" ,
2023-07-31 15:30:17 +09:00
"updated_at" : "2023-07-31T03:41:57Z" ,
2023-07-30 09:26:08 +09:00
"pushed_at" : "2023-07-29T22:49:12Z" ,
2023-07-31 15:30:17 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-07-30 09:26:08 +09:00
"has_discussions" : false ,
2023-08-01 09:34:38 +09:00
"forks_count" : 2 ,
2023-07-30 09:26:08 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-08-01 09:34:38 +09:00
"forks" : 2 ,
2023-07-31 15:30:17 +09:00
"watchers" : 1 ,
2023-07-29 15:32:37 +09:00
"score" : 0 ,
2023-07-30 15:26:19 +09:00
"subscribers_count" : 1
2023-07-31 15:30:17 +09:00
} ,
{
"id" : 672719149 ,
2023-07-31 23:32:33 +09:00
"name" : "CVE-2023-35078" ,
"full_name" : "LazyySec\/CVE-2023-35078" ,
2023-07-31 15:30:17 +09:00
"owner" : {
"login" : "LazyySec" ,
"id" : 92903333 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4" ,
"html_url" : "https:\/\/github.com\/LazyySec"
} ,
2023-07-31 23:32:33 +09:00
"html_url" : "https:\/\/github.com\/LazyySec\/CVE-2023-35078" ,
2023-07-31 15:30:17 +09:00
"description" : "This tool is built in golang language to exploit CVE-2023-35078 vulnerability inspired by similar tool in python language https:\/\/github.com\/vchan-in\/CVE-2023-35078-Exploit-POC" ,
"fork" : false ,
"created_at" : "2023-07-31T02:24:24Z" ,
2023-08-04 03:41:22 +09:00
"updated_at" : "2023-08-03T15:45:06Z" ,
2023-07-31 15:30:17 +09:00
"pushed_at" : "2023-07-31T02:42:54Z" ,
2023-08-04 03:41:22 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-07-31 15:30:17 +09:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2023-08-04 03:41:22 +09:00
"watchers" : 3 ,
2023-07-31 15:30:17 +09:00
"score" : 0 ,
2023-08-01 15:41:24 +09:00
"subscribers_count" : 1
2023-08-01 03:28:52 +09:00
} ,
{
"id" : 673039770 ,
"name" : "CVE-2023-35078" ,
"full_name" : "synfinner\/CVE-2023-35078" ,
"owner" : {
"login" : "synfinner" ,
"id" : 71105125 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71105125?v=4" ,
"html_url" : "https:\/\/github.com\/synfinner"
} ,
"html_url" : "https:\/\/github.com\/synfinner\/CVE-2023-35078" ,
"description" : "Easy and non-intrusive script to check for CVE-2023-35078" ,
"fork" : false ,
"created_at" : "2023-07-31T18:21:40Z" ,
"updated_at" : "2023-07-31T18:22:26Z" ,
2023-08-01 09:34:38 +09:00
"pushed_at" : "2023-07-31T20:37:05Z" ,
2023-08-01 03:28:52 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-08-01 09:34:38 +09:00
"forks_count" : 1 ,
2023-08-01 03:28:52 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-08-01 09:34:38 +09:00
"forks" : 1 ,
2023-08-01 03:28:52 +09:00
"watchers" : 0 ,
"score" : 0 ,
2023-08-01 15:41:24 +09:00
"subscribers_count" : 1
2023-08-02 03:28:25 +09:00
} ,
{
"id" : 673426774 ,
"name" : "nmap-CVE-2023-35078-Exploit" ,
"full_name" : "emanueldosreis\/nmap-CVE-2023-35078-Exploit" ,
"owner" : {
"login" : "emanueldosreis" ,
"id" : 5330737 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5330737?v=4" ,
"html_url" : "https:\/\/github.com\/emanueldosreis"
} ,
"html_url" : "https:\/\/github.com\/emanueldosreis\/nmap-CVE-2023-35078-Exploit" ,
"description" : "Nmap script to exploit CVE-2023-35078 - Mobile Iron Core" ,
"fork" : false ,
"created_at" : "2023-08-01T15:41:12Z" ,
"updated_at" : "2023-08-01T15:44:35Z" ,
"pushed_at" : "2023-08-01T16:36:29Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
2023-08-02 15:32:14 +09:00
"subscribers_count" : 1
2023-07-29 15:32:37 +09:00
}
]