[ { "id": 631439804, "name": "CVE-2023-1671", "full_name": "ohnonoyesyes\/CVE-2023-1671", "owner": { "login": "ohnonoyesyes", "id": 93457304, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4", "html_url": "https:\/\/github.com\/ohnonoyesyes" }, "html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2023-1671", "description": "Pre-Auth RCE in Sophos Web Appliance", "fork": false, "created_at": "2023-04-23T02:58:17Z", "updated_at": "2023-04-23T14:38:39Z", "pushed_at": "2023-04-23T02:59:38Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 632051037, "name": "CVE-2023-1671-POC", "full_name": "W01fh4cker\/CVE-2023-1671-POC", "owner": { "login": "W01fh4cker", "id": 101872898, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101872898?v=4", "html_url": "https:\/\/github.com\/W01fh4cker" }, "html_url": "https:\/\/github.com\/W01fh4cker\/CVE-2023-1671-POC", "description": "CVE-2023-1671-POC, based on dnslog platform", "fork": false, "created_at": "2023-04-24T15:53:42Z", "updated_at": "2023-06-21T18:44:53Z", "pushed_at": "2023-04-26T02:40:41Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-1671" ], "visibility": "public", "forks": 2, "watchers": 16, "score": 0, "subscribers_count": 1 }, { "id": 633237983, "name": "CVE-2023-1671-POC", "full_name": "c4ln\/CVE-2023-1671-POC", "owner": { "login": "c4ln", "id": 99523265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99523265?v=4", "html_url": "https:\/\/github.com\/c4ln" }, "html_url": "https:\/\/github.com\/c4ln\/CVE-2023-1671-POC", "description": "CVE-2023-1671 POC in python", "fork": false, "created_at": "2023-04-27T04:31:44Z", "updated_at": "2023-04-27T05:34:31Z", "pushed_at": "2023-04-27T04:37:54Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 641885483, "name": "cve-2023-1671", "full_name": "csffs\/cve-2023-1671", "owner": { "login": "csffs", "id": 108768133, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108768133?v=4", "html_url": "https:\/\/github.com\/csffs" }, "html_url": "https:\/\/github.com\/csffs\/cve-2023-1671", "description": "Exploit to cve-2023-1671. So there is a test and exploitation function. The test sends a ping request to the dnslog domain from the vulnerable site. If the ping passes, the vulnerability exists, if it doesn't, then cve-2023-1671 is missing. The exploit function, on the other hand, sends a request with your command to the server.", "fork": false, "created_at": "2023-05-17T11:20:27Z", "updated_at": "2023-05-17T12:03:48Z", "pushed_at": "2023-05-17T12:03:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 } ]