mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
95 lines
No EOL
3.4 KiB
JSON
95 lines
No EOL
3.4 KiB
JSON
[
|
|
{
|
|
"id": 597984195,
|
|
"name": "CVE-2023-23333",
|
|
"full_name": "Timorlover\/CVE-2023-23333",
|
|
"owner": {
|
|
"login": "Timorlover",
|
|
"id": 116296194,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116296194?v=4",
|
|
"html_url": "https:\/\/github.com\/Timorlover",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Timorlover\/CVE-2023-23333",
|
|
"description": "There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.",
|
|
"fork": false,
|
|
"created_at": "2023-02-06T06:20:40Z",
|
|
"updated_at": "2023-07-13T20:44:04Z",
|
|
"pushed_at": "2023-02-06T06:35:29Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 654621817,
|
|
"name": "CVE-2023-23333",
|
|
"full_name": "Mr-xn\/CVE-2023-23333",
|
|
"owner": {
|
|
"login": "Mr-xn",
|
|
"id": 18260135,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
|
"html_url": "https:\/\/github.com\/Mr-xn",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2023-23333",
|
|
"description": "SolarView Compact through 6.00 downloader.php commands injection (RCE) nuclei-templates",
|
|
"fork": false,
|
|
"created_at": "2023-06-16T14:33:31Z",
|
|
"updated_at": "2024-06-21T00:11:12Z",
|
|
"pushed_at": "2023-06-16T14:40:00Z",
|
|
"stargazers_count": 13,
|
|
"watchers_count": 13,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 13,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 673443044,
|
|
"name": "nmap-CVE-2023-23333-exploit",
|
|
"full_name": "emanueldosreis\/nmap-CVE-2023-23333-exploit",
|
|
"owner": {
|
|
"login": "emanueldosreis",
|
|
"id": 5330737,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5330737?v=4",
|
|
"html_url": "https:\/\/github.com\/emanueldosreis",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/emanueldosreis\/nmap-CVE-2023-23333-exploit",
|
|
"description": "Nmap NSE script to dump \/ test Solarwinds CVE-2023-23333 vulnerability",
|
|
"fork": false,
|
|
"created_at": "2023-08-01T16:24:37Z",
|
|
"updated_at": "2024-06-06T21:51:33Z",
|
|
"pushed_at": "2023-08-01T16:36:49Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |