PoC-in-GitHub/2023/CVE-2023-35078.json

214 lines
7.4 KiB
JSON
Raw Normal View History

2023-07-29 15:32:37 +09:00
[
{
"id": 672152096,
"name": "CVE-2023-35078-Exploit-POC",
"full_name": "vchan-in\/CVE-2023-35078-Exploit-POC",
"owner": {
"login": "vchan-in",
"id": 17123227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17123227?v=4",
"html_url": "https:\/\/github.com\/vchan-in"
},
"html_url": "https:\/\/github.com\/vchan-in\/CVE-2023-35078-Exploit-POC",
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
"fork": false,
"created_at": "2023-07-29T05:06:27Z",
2024-05-10 21:28:46 +09:00
"updated_at": "2024-05-10T10:51:09Z",
2023-07-30 03:23:42 +09:00
"pushed_at": "2023-07-29T16:58:16Z",
2024-05-10 21:28:46 +09:00
"stargazers_count": 115,
"watchers_count": 115,
2023-07-29 15:32:37 +09:00
"has_discussions": false,
2023-11-07 15:25:19 +09:00
"forks_count": 31,
2023-07-29 15:32:37 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-11-07 15:25:19 +09:00
"forks": 31,
2024-05-10 21:28:46 +09:00
"watchers": 115,
2023-07-30 09:26:08 +09:00
"score": 0,
2023-08-04 15:32:51 +09:00
"subscribers_count": 4
2023-07-30 09:26:08 +09:00
},
{
"id": 672358707,
"name": "CVE-2023-35078",
"full_name": "lager1\/CVE-2023-35078",
"owner": {
"login": "lager1",
"id": 13869941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13869941?v=4",
"html_url": "https:\/\/github.com\/lager1"
},
"html_url": "https:\/\/github.com\/lager1\/CVE-2023-35078",
"description": "Proof of concept script to check if the site is vulnerable to CVE-2023-35078",
"fork": false,
"created_at": "2023-07-29T19:58:33Z",
2024-02-13 09:26:09 +09:00
"updated_at": "2024-02-12T18:33:47Z",
2023-07-30 09:26:08 +09:00
"pushed_at": "2023-07-29T22:49:12Z",
2024-02-13 09:26:09 +09:00
"stargazers_count": 4,
"watchers_count": 4,
2023-07-30 09:26:08 +09:00
"has_discussions": false,
2023-08-15 03:35:47 +09:00
"forks_count": 3,
2023-07-30 09:26:08 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-08-15 03:35:47 +09:00
"forks": 3,
2024-02-13 09:26:09 +09:00
"watchers": 4,
2023-07-29 15:32:37 +09:00
"score": 0,
2023-07-30 15:26:19 +09:00
"subscribers_count": 1
2023-07-31 15:30:17 +09:00
},
{
"id": 672719149,
2023-07-31 23:32:33 +09:00
"name": "CVE-2023-35078",
2024-01-21 03:27:48 +09:00
"full_name": "raytheon0x21\/CVE-2023-35078",
2023-07-31 15:30:17 +09:00
"owner": {
2024-01-21 03:27:48 +09:00
"login": "raytheon0x21",
2023-07-31 15:30:17 +09:00
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
2024-01-21 03:27:48 +09:00
"html_url": "https:\/\/github.com\/raytheon0x21"
2023-07-31 15:30:17 +09:00
},
2024-01-21 03:27:48 +09:00
"html_url": "https:\/\/github.com\/raytheon0x21\/CVE-2023-35078",
2023-08-28 03:28:45 +09:00
"description": "Tools to scanner & exploit cve-2023-35078",
2023-07-31 15:30:17 +09:00
"fork": false,
"created_at": "2023-07-31T02:24:24Z",
2024-01-21 21:36:38 +09:00
"updated_at": "2024-01-21T12:04:06Z",
2023-08-28 03:28:45 +09:00
"pushed_at": "2023-08-27T15:10:19Z",
2024-01-21 21:36:38 +09:00
"stargazers_count": 6,
"watchers_count": 6,
2023-07-31 15:30:17 +09:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2023-08-28 03:28:45 +09:00
"topics": [
"cve-2023-35078"
],
2023-07-31 15:30:17 +09:00
"visibility": "public",
"forks": 1,
2024-01-21 21:36:38 +09:00
"watchers": 6,
2023-07-31 15:30:17 +09:00
"score": 0,
2023-08-01 15:41:24 +09:00
"subscribers_count": 1
2023-08-01 03:28:52 +09:00
},
{
"id": 673039770,
"name": "CVE-2023-35078",
"full_name": "synfinner\/CVE-2023-35078",
"owner": {
"login": "synfinner",
"id": 71105125,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71105125?v=4",
"html_url": "https:\/\/github.com\/synfinner"
},
"html_url": "https:\/\/github.com\/synfinner\/CVE-2023-35078",
"description": "Easy and non-intrusive script to check for CVE-2023-35078",
"fork": false,
"created_at": "2023-07-31T18:21:40Z",
"updated_at": "2023-07-31T18:22:26Z",
2023-08-01 09:34:38 +09:00
"pushed_at": "2023-07-31T20:37:05Z",
2023-08-01 03:28:52 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2023-08-01 09:34:38 +09:00
"forks_count": 1,
2023-08-01 03:28:52 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-08-01 09:34:38 +09:00
"forks": 1,
2023-08-01 03:28:52 +09:00
"watchers": 0,
"score": 0,
2023-08-01 15:41:24 +09:00
"subscribers_count": 1
2023-08-02 03:28:25 +09:00
},
{
"id": 673426774,
"name": "nmap-CVE-2023-35078-Exploit",
"full_name": "emanueldosreis\/nmap-CVE-2023-35078-Exploit",
"owner": {
"login": "emanueldosreis",
"id": 5330737,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5330737?v=4",
"html_url": "https:\/\/github.com\/emanueldosreis"
},
"html_url": "https:\/\/github.com\/emanueldosreis\/nmap-CVE-2023-35078-Exploit",
"description": "Nmap script to exploit CVE-2023-35078 - Mobile Iron Core",
"fork": false,
"created_at": "2023-08-01T15:41:12Z",
2023-08-07 23:20:42 +09:00
"updated_at": "2023-08-07T13:52:16Z",
2023-08-02 03:28:25 +09:00
"pushed_at": "2023-08-01T16:36:29Z",
2023-08-07 23:20:42 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2023-08-02 03:28:25 +09:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2023-08-07 23:20:42 +09:00
"watchers": 1,
2023-08-02 03:28:25 +09:00
"score": 0,
2023-08-02 15:32:14 +09:00
"subscribers_count": 1
2023-08-30 15:27:15 +09:00
},
{
"id": 684867379,
"name": "CVE-2023-35078",
"full_name": "Blue-number\/CVE-2023-35078",
"owner": {
"login": "Blue-number",
"id": 67722627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67722627?v=4",
"html_url": "https:\/\/github.com\/Blue-number"
},
"html_url": "https:\/\/github.com\/Blue-number\/CVE-2023-35078",
"description": " Ivanti Endpoint Manager Mobile (EPMM) POC",
"fork": false,
"created_at": "2023-08-30T02:36:20Z",
"updated_at": "2023-08-30T02:36:28Z",
"pushed_at": "2023-08-30T02:42:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-11-27 15:30:47 +09:00
"subscribers_count": 1
2024-03-30 03:27:25 +09:00
},
{
"id": 779303130,
"name": "CVE-2023-35078",
"full_name": "0nsec\/CVE-2023-35078",
"owner": {
"login": "0nsec",
"id": 99223413,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99223413?v=4",
"html_url": "https:\/\/github.com\/0nsec"
},
"html_url": "https:\/\/github.com\/0nsec\/CVE-2023-35078",
"description": "CVE-2023-35078 Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. ",
"fork": false,
"created_at": "2024-03-29T14:15:49Z",
"updated_at": "2024-03-29T14:45:31Z",
"pushed_at": "2024-03-29T14:41:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-03-30 15:26:32 +09:00
"subscribers_count": 1
2023-07-29 15:32:37 +09:00
}
]