PoC-in-GitHub/2023/CVE-2023-26326.json
2025-02-13 15:32:01 +09:00

64 lines
No EOL
2.4 KiB
JSON

[
{
"id": 925889678,
"name": "exploit_cve-2023-26326_using_cve-2024-2961",
"full_name": "omarelshopky\/exploit_cve-2023-26326_using_cve-2024-2961",
"owner": {
"login": "omarelshopky",
"id": 69885253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69885253?v=4",
"html_url": "https:\/\/github.com\/omarelshopky",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/omarelshopky\/exploit_cve-2023-26326_using_cve-2024-2961",
"description": "Exploit for CVE-2023-26326 in the WordPress BuddyForms plugin, leveraging CVE-2024-2961 for remote code execution. This exploit bypasses PHP 8+ deserialization limitations by chaining vulnerabilities with php:\/\/filter.",
"fork": false,
"created_at": "2025-02-02T01:35:43Z",
"updated_at": "2025-02-02T11:26:22Z",
"pushed_at": "2025-02-02T11:26:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 931621500,
"name": "CVE-2023-26326_Buddyform_exploit",
"full_name": "mesudmammad1\/CVE-2023-26326_Buddyform_exploit",
"owner": {
"login": "mesudmammad1",
"id": 93409405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93409405?v=4",
"html_url": "https:\/\/github.com\/mesudmammad1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mesudmammad1\/CVE-2023-26326_Buddyform_exploit",
"description": null,
"fork": false,
"created_at": "2025-02-12T15:31:21Z",
"updated_at": "2025-02-12T15:34:20Z",
"pushed_at": "2025-02-12T15:34:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]