mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
223 lines
No EOL
7.9 KiB
JSON
223 lines
No EOL
7.9 KiB
JSON
[
|
|
{
|
|
"id": 806179763,
|
|
"name": "cve-2023-30253",
|
|
"full_name": "Rubikcuv5\/cve-2023-30253",
|
|
"owner": {
|
|
"login": "Rubikcuv5",
|
|
"id": 47946047,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47946047?v=4",
|
|
"html_url": "https:\/\/github.com\/Rubikcuv5",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Rubikcuv5\/cve-2023-30253",
|
|
"description": "Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.",
|
|
"fork": false,
|
|
"created_at": "2024-05-26T15:43:08Z",
|
|
"updated_at": "2024-09-25T13:12:28Z",
|
|
"pushed_at": "2024-05-26T23:50:40Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 806520189,
|
|
"name": "CVE-2023-30253-Exploit",
|
|
"full_name": "04Shivam\/CVE-2023-30253-Exploit",
|
|
"owner": {
|
|
"login": "04Shivam",
|
|
"id": 114946384,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114946384?v=4",
|
|
"html_url": "https:\/\/github.com\/04Shivam",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/04Shivam\/CVE-2023-30253-Exploit",
|
|
"description": "Poc for CVE-2023-30253 ",
|
|
"fork": false,
|
|
"created_at": "2024-05-27T11:00:43Z",
|
|
"updated_at": "2024-06-11T17:31:56Z",
|
|
"pushed_at": "2024-05-27T11:16:02Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 806630340,
|
|
"name": "Exploit-for-Dolibarr-17.0.0-CVE-2023-30253",
|
|
"full_name": "nikn0laty\/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253",
|
|
"owner": {
|
|
"login": "nikn0laty",
|
|
"id": 96344826,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96344826?v=4",
|
|
"html_url": "https:\/\/github.com\/nikn0laty",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nikn0laty\/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253",
|
|
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
|
|
"fork": false,
|
|
"created_at": "2024-05-27T15:10:12Z",
|
|
"updated_at": "2024-12-13T04:47:13Z",
|
|
"pushed_at": "2024-05-28T15:10:20Z",
|
|
"stargazers_count": 37,
|
|
"watchers_count": 37,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 37,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 818045212,
|
|
"name": "CVE-2023-30253-PoC",
|
|
"full_name": "g4nkd\/CVE-2023-30253-PoC",
|
|
"owner": {
|
|
"login": "g4nkd",
|
|
"id": 150204934,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150204934?v=4",
|
|
"html_url": "https:\/\/github.com\/g4nkd",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/g4nkd\/CVE-2023-30253-PoC",
|
|
"description": "CVE-2023-30253 PoC",
|
|
"fork": false,
|
|
"created_at": "2024-06-21T01:41:34Z",
|
|
"updated_at": "2024-07-31T00:18:17Z",
|
|
"pushed_at": "2024-07-31T00:16:42Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 819502016,
|
|
"name": "Dolibarr-17.0.0-Exploit-CVE-2023-30253",
|
|
"full_name": "dollarboysushil\/Dolibarr-17.0.0-Exploit-CVE-2023-30253",
|
|
"owner": {
|
|
"login": "dollarboysushil",
|
|
"id": 48991715,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48991715?v=4",
|
|
"html_url": "https:\/\/github.com\/dollarboysushil",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dollarboysushil\/Dolibarr-17.0.0-Exploit-CVE-2023-30253",
|
|
"description": "In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions.",
|
|
"fork": false,
|
|
"created_at": "2024-06-24T16:22:31Z",
|
|
"updated_at": "2024-10-19T08:13:33Z",
|
|
"pushed_at": "2024-06-24T16:39:15Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2023-30253",
|
|
"dolibarr",
|
|
"dolibarr-exploit"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 826647567,
|
|
"name": "DolibabyPhp",
|
|
"full_name": "andria-dev\/DolibabyPhp",
|
|
"owner": {
|
|
"login": "andria-dev",
|
|
"id": 19195374,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19195374?v=4",
|
|
"html_url": "https:\/\/github.com\/andria-dev",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/andria-dev\/DolibabyPhp",
|
|
"description": "An authenticated RCE exploit for Dolibarr ERP\/CRM CVE-2023-30253.",
|
|
"fork": false,
|
|
"created_at": "2024-07-10T05:39:01Z",
|
|
"updated_at": "2024-07-17T01:01:38Z",
|
|
"pushed_at": "2024-07-20T23:27:38Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 860627688,
|
|
"name": "CVE-2023-30253",
|
|
"full_name": "bluetoothStrawberry\/CVE-2023-30253",
|
|
"owner": {
|
|
"login": "bluetoothStrawberry",
|
|
"id": 154050956,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154050956?v=4",
|
|
"html_url": "https:\/\/github.com\/bluetoothStrawberry",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bluetoothStrawberry\/CVE-2023-30253",
|
|
"description": "Dolibarr 17.0.0 PHP Code Injection Exploit",
|
|
"fork": false,
|
|
"created_at": "2024-09-20T19:54:22Z",
|
|
"updated_at": "2024-09-20T20:05:34Z",
|
|
"pushed_at": "2024-09-20T20:05:31Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |