PoC-in-GitHub/2023/CVE-2023-44487.json

160 lines
5.3 KiB
JSON
Raw Normal View History

2023-10-10 20:38:01 +02:00
[
{
"id": 703062371,
"name": "CVE-2023-44487",
"full_name": "bcdannyboy\/CVE-2023-44487",
"owner": {
"login": "bcdannyboy",
"id": 12553297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
"html_url": "https:\/\/github.com\/bcdannyboy"
},
"html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487",
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
2023-10-16 08:42:16 +02:00
"updated_at": "2023-10-16T05:21:12Z",
2023-10-14 20:28:13 +02:00
"pushed_at": "2023-10-14T16:43:31Z",
2023-10-16 08:42:16 +02:00
"stargazers_count": 146,
"watchers_count": 146,
2023-10-10 20:38:01 +02:00
"has_discussions": false,
2023-10-15 20:26:10 +02:00
"forks_count": 29,
2023-10-10 20:38:01 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-10-15 20:26:10 +02:00
"forks": 29,
2023-10-16 08:42:16 +02:00
"watchers": 146,
2023-10-11 08:46:19 +02:00
"score": 0,
2023-10-14 08:29:53 +02:00
"subscribers_count": 5
2023-10-11 08:46:19 +02:00
},
{
"id": 703303512,
"name": "CVE-2023-44487",
"full_name": "imabee101\/CVE-2023-44487",
"owner": {
"login": "imabee101",
"id": 29169122,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4",
"html_url": "https:\/\/github.com\/imabee101"
},
"html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487",
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
2023-10-16 08:42:16 +02:00
"updated_at": "2023-10-16T01:39:18Z",
2023-10-13 14:43:07 +02:00
"pushed_at": "2023-10-13T11:19:10Z",
2023-10-16 08:42:16 +02:00
"stargazers_count": 24,
"watchers_count": 24,
2023-10-11 08:46:19 +02:00
"has_discussions": false,
2023-10-16 08:42:16 +02:00
"forks_count": 5,
2023-10-11 08:46:19 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2023-10-11 15:36:59 +02:00
"cve",
"cve-2023-44487",
2023-10-11 08:46:19 +02:00
"ddos",
"dos",
"dos-attack",
"poc",
"proof-of-concept"
],
"visibility": "public",
2023-10-16 08:42:16 +02:00
"forks": 5,
"watchers": 24,
2023-10-10 20:38:01 +02:00
"score": 0,
2023-10-14 08:29:53 +02:00
"subscribers_count": 2
2023-10-12 09:40:55 +02:00
},
{
"id": 703845749,
"name": "CVE-2023-44487",
"full_name": "ByteHackr\/CVE-2023-44487",
"owner": {
"login": "ByteHackr",
"id": 30409831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
"html_url": "https:\/\/github.com\/ByteHackr"
},
"html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487",
"description": "Test Script for CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T03:14:34Z",
"updated_at": "2023-10-12T03:30:38Z",
"pushed_at": "2023-10-12T03:30:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-10-13 08:55:48 +02:00
"subscribers_count": 1
2023-10-13 02:34:16 +02:00
},
{
"id": 703914770,
"name": "rapidreset",
"full_name": "pabloec20\/rapidreset",
"owner": {
"login": "pabloec20",
"id": 24191742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4",
"html_url": "https:\/\/github.com\/pabloec20"
},
"html_url": "https:\/\/github.com\/pabloec20\/rapidreset",
"description": "CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T07:06:42Z",
2023-10-13 20:31:51 +02:00
"updated_at": "2023-10-13T16:10:25Z",
2023-10-13 02:34:16 +02:00
"pushed_at": "2023-10-12T07:11:17Z",
2023-10-13 20:31:51 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2023-10-13 02:34:16 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-10-13 20:31:51 +02:00
"watchers": 1,
2023-10-13 02:34:16 +02:00
"score": 0,
2023-10-13 08:55:48 +02:00
"subscribers_count": 1
2023-10-14 02:35:32 +02:00
},
{
"id": 704732969,
"name": "rapidresetclient",
"full_name": "secengjeff\/rapidresetclient",
"owner": {
"login": "secengjeff",
"id": 146767590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4",
"html_url": "https:\/\/github.com\/secengjeff"
},
"html_url": "https:\/\/github.com\/secengjeff\/rapidresetclient",
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
2023-10-16 08:42:16 +02:00
"updated_at": "2023-10-16T02:38:02Z",
2023-10-14 02:35:32 +02:00
"pushed_at": "2023-10-14T00:08:56Z",
2023-10-16 08:42:16 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2023-10-14 02:35:32 +02:00
"has_discussions": false,
2023-10-15 20:26:10 +02:00
"forks_count": 2,
2023-10-14 02:35:32 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-10-15 20:26:10 +02:00
"forks": 2,
2023-10-16 08:42:16 +02:00
"watchers": 5,
2023-10-14 02:35:32 +02:00
"score": 0,
2023-10-14 08:29:53 +02:00
"subscribers_count": 1
2023-10-10 20:38:01 +02:00
}
]