PoC-in-GitHub/2023/CVE-2023-35078.json
2025-01-16 03:32:55 +09:00

221 lines
No EOL
7.7 KiB
JSON

[
{
"id": 672152096,
"name": "CVE-2023-35078-Exploit-POC",
"full_name": "vchan-in\/CVE-2023-35078-Exploit-POC",
"owner": {
"login": "vchan-in",
"id": 17123227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17123227?v=4",
"html_url": "https:\/\/github.com\/vchan-in",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vchan-in\/CVE-2023-35078-Exploit-POC",
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
"fork": false,
"created_at": "2023-07-29T05:06:27Z",
"updated_at": "2024-12-06T23:51:28Z",
"pushed_at": "2023-07-29T16:58:16Z",
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 118,
"score": 0,
"subscribers_count": 4
},
{
"id": 672358707,
"name": "CVE-2023-35078",
"full_name": "lager1\/CVE-2023-35078",
"owner": {
"login": "lager1",
"id": 13869941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13869941?v=4",
"html_url": "https:\/\/github.com\/lager1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lager1\/CVE-2023-35078",
"description": "Proof of concept script to check if the site is vulnerable to CVE-2023-35078",
"fork": false,
"created_at": "2023-07-29T19:58:33Z",
"updated_at": "2024-02-12T18:33:47Z",
"pushed_at": "2023-07-29T22:49:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 672719149,
"name": "CVE-2023-35078",
"full_name": "raytheon0x21\/CVE-2023-35078",
"owner": {
"login": "raytheon0x21",
"id": 92903333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92903333?v=4",
"html_url": "https:\/\/github.com\/raytheon0x21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/raytheon0x21\/CVE-2023-35078",
"description": "Tools to scanner & exploit cve-2023-35078",
"fork": false,
"created_at": "2023-07-31T02:24:24Z",
"updated_at": "2024-01-21T12:04:06Z",
"pushed_at": "2023-08-27T15:10:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-35078"
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 673039770,
"name": "CVE-2023-35078",
"full_name": "synfinner\/CVE-2023-35078",
"owner": {
"login": "synfinner",
"id": 71105125,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71105125?v=4",
"html_url": "https:\/\/github.com\/synfinner",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/synfinner\/CVE-2023-35078",
"description": "Easy and non-intrusive script to check for CVE-2023-35078",
"fork": false,
"created_at": "2023-07-31T18:21:40Z",
"updated_at": "2023-07-31T18:22:26Z",
"pushed_at": "2023-07-31T20:37:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 673426774,
"name": "nmap-CVE-2023-35078-Exploit",
"full_name": "emanueldosreis\/nmap-CVE-2023-35078-Exploit",
"owner": {
"login": "emanueldosreis",
"id": 5330737,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5330737?v=4",
"html_url": "https:\/\/github.com\/emanueldosreis",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/emanueldosreis\/nmap-CVE-2023-35078-Exploit",
"description": "Nmap script to exploit CVE-2023-35078 - Mobile Iron Core",
"fork": false,
"created_at": "2023-08-01T15:41:12Z",
"updated_at": "2024-06-06T21:51:36Z",
"pushed_at": "2023-08-01T16:36:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 684867379,
"name": "CVE-2023-35078",
"full_name": "Blue-number\/CVE-2023-35078",
"owner": {
"login": "Blue-number",
"id": 67722627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67722627?v=4",
"html_url": "https:\/\/github.com\/Blue-number",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Blue-number\/CVE-2023-35078",
"description": " Ivanti Endpoint Manager Mobile (EPMM) POC",
"fork": false,
"created_at": "2023-08-30T02:36:20Z",
"updated_at": "2023-08-30T02:36:28Z",
"pushed_at": "2023-08-30T02:42:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 779303130,
"name": "CVE-2023-35078",
"full_name": "0nsec\/CVE-2023-35078",
"owner": {
"login": "0nsec",
"id": 99223413,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99223413?v=4",
"html_url": "https:\/\/github.com\/0nsec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0nsec\/CVE-2023-35078",
"description": "CVE-2023-35078 Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. ",
"fork": false,
"created_at": "2024-03-29T14:15:49Z",
"updated_at": "2024-05-14T07:04:22Z",
"pushed_at": "2024-08-19T12:07:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]