PoC-in-GitHub/2023/CVE-2023-0669.json

156 lines
5.4 KiB
JSON
Raw Normal View History

2023-02-11 21:31:02 +09:00
[
{
"id": 600041726,
"name": "CVE-2023-0669",
"full_name": "0xf4n9x\/CVE-2023-0669",
"owner": {
"login": "0xf4n9x",
"id": 40891670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
"html_url": "https:\/\/github.com\/0xf4n9x"
},
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2023-0669",
"description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.",
"fork": false,
"created_at": "2023-02-10T13:02:55Z",
2023-09-11 15:36:49 +09:00
"updated_at": "2023-09-11T05:38:46Z",
2023-02-13 21:33:27 +09:00
"pushed_at": "2023-02-13T07:15:28Z",
2023-09-11 15:36:49 +09:00
"stargazers_count": 93,
"watchers_count": 93,
2023-02-11 21:31:02 +09:00
"has_discussions": false,
2023-09-03 09:28:28 +09:00
"forks_count": 20,
2023-02-11 21:31:02 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-09-03 09:28:28 +09:00
"forks": 20,
2023-09-11 15:36:49 +09:00
"watchers": 93,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-02-16 09:47:46 +09:00
},
{
"id": 602298086,
"name": "CVE-2023-0669",
2023-07-06 09:24:03 +09:00
"full_name": "cataliniovita\/CVE-2023-0669",
2023-02-16 09:47:46 +09:00
"owner": {
2023-07-06 09:24:03 +09:00
"login": "cataliniovita",
2023-02-16 09:47:46 +09:00
"id": 60446603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60446603?v=4",
2023-07-06 09:24:03 +09:00
"html_url": "https:\/\/github.com\/cataliniovita"
2023-02-16 09:47:46 +09:00
},
2023-07-06 09:24:03 +09:00
"html_url": "https:\/\/github.com\/cataliniovita\/CVE-2023-0669",
2023-02-16 09:47:46 +09:00
"description": "CVE-2023-0669 GoAnywhere MFT command injection vulnerability",
"fork": false,
"created_at": "2023-02-15T23:00:18Z",
"updated_at": "2023-02-15T23:00:18Z",
"pushed_at": "2023-02-15T23:00:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-02-18 15:30:11 +09:00
},
2023-02-21 21:31:15 +09:00
{
"id": 604487308,
"name": "CVE-2023-0669",
"full_name": "Griffin-01\/CVE-2023-0669",
"owner": {
"login": "Griffin-01",
"id": 59146115,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59146115?v=4",
"html_url": "https:\/\/github.com\/Griffin-01"
},
"html_url": "https:\/\/github.com\/Griffin-01\/CVE-2023-0669",
"description": null,
"fork": false,
"created_at": "2023-02-21T06:52:28Z",
"updated_at": "2023-02-21T06:52:28Z",
"pushed_at": "2023-02-21T06:52:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-02-22 09:30:39 +09:00
},
2023-02-26 15:28:09 +09:00
{
"id": 606615026,
2023-02-27 09:27:57 +09:00
"name": "CVE-2023-0669-Analysis",
"full_name": "yosef0x01\/CVE-2023-0669-Analysis",
2023-02-26 15:28:09 +09:00
"owner": {
"login": "yosef0x01",
"id": 96077889,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96077889?v=4",
"html_url": "https:\/\/github.com\/yosef0x01"
},
2023-02-27 09:27:57 +09:00
"html_url": "https:\/\/github.com\/yosef0x01\/CVE-2023-0669-Analysis",
2023-04-12 09:30:56 +09:00
"description": "CVE analysis for CVE-2023-0669",
2023-02-26 15:28:09 +09:00
"fork": false,
"created_at": "2023-02-26T02:33:54Z",
2023-09-03 09:28:28 +09:00
"updated_at": "2023-09-02T21:58:24Z",
2023-03-13 03:28:05 +09:00
"pushed_at": "2023-03-12T17:37:44Z",
2023-09-03 09:28:28 +09:00
"stargazers_count": 8,
"watchers_count": 8,
2023-02-27 09:27:57 +09:00
"has_discussions": false,
2023-09-03 09:28:28 +09:00
"forks_count": 2,
2023-02-27 09:27:57 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-09-03 09:28:28 +09:00
"forks": 2,
"watchers": 8,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-04-06 15:30:34 +09:00
},
{
"id": 624244077,
"name": "CVE-2023-0669",
"full_name": "Avento\/CVE-2023-0669",
"owner": {
"login": "Avento",
"id": 13798539,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13798539?v=4",
"html_url": "https:\/\/github.com\/Avento"
},
"html_url": "https:\/\/github.com\/Avento\/CVE-2023-0669",
2023-04-07 15:28:39 +09:00
"description": "GoAnywhere MFT CVE-2023-0669 LicenseResponseServlet Deserialization Vulnerabilities Python RCE PoC(Proof of Concept)",
2023-04-06 15:30:34 +09:00
"fork": false,
"created_at": "2023-04-06T03:40:03Z",
2023-07-27 15:32:37 +09:00
"updated_at": "2023-07-27T03:40:58Z",
2023-07-07 22:48:41 +09:00
"pushed_at": "2023-07-07T10:42:46Z",
2023-07-27 15:32:37 +09:00
"stargazers_count": 4,
"watchers_count": 4,
2023-04-06 15:30:34 +09:00
"has_discussions": false,
2023-07-02 22:46:17 +09:00
"forks_count": 3,
2023-04-06 15:30:34 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2023-04-13 15:29:27 +09:00
"topics": [
"cve-2023-0669",
"deserialization-vulnerabilities",
"licenseresponseservlet"
],
2023-04-06 15:30:34 +09:00
"visibility": "public",
2023-07-02 22:46:17 +09:00
"forks": 3,
2023-07-27 15:32:37 +09:00
"watchers": 4,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-02-11 21:31:02 +09:00
}
]