PoC-in-GitHub/2023/CVE-2023-36845.json
2024-03-22 03:27:15 +09:00

566 lines
No EOL
20 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 692368063,
"name": "cve-2023-36845-scanner",
"full_name": "vulncheck-oss\/cve-2023-36845-scanner",
"owner": {
"login": "vulncheck-oss",
"id": 134310220,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134310220?v=4",
"html_url": "https:\/\/github.com\/vulncheck-oss"
},
"html_url": "https:\/\/github.com\/vulncheck-oss\/cve-2023-36845-scanner",
"description": "A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845",
"fork": false,
"created_at": "2023-09-16T09:11:21Z",
"updated_at": "2024-03-21T14:57:31Z",
"pushed_at": "2024-03-05T09:08:07Z",
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-36845",
"go-exploit"
],
"visibility": "public",
"forks": 7,
"watchers": 59,
"score": 0,
"subscribers_count": 2
},
{
"id": 696932971,
"name": "CVE-2023-36845",
"full_name": "kljunowsky\/CVE-2023-36845",
"owner": {
"login": "kljunowsky",
"id": 104329412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4",
"html_url": "https:\/\/github.com\/kljunowsky"
},
"html_url": "https:\/\/github.com\/kljunowsky\/CVE-2023-36845",
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
"fork": false,
"created_at": "2023-09-26T17:56:55Z",
"updated_at": "2024-03-21T06:02:23Z",
"pushed_at": "2023-12-29T14:56:44Z",
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bug-bounty-hunting",
"bugbounty",
"bugbountytips",
"bugbountytricks",
"cve-2023-36845",
"cybersecurity",
"hacking",
"juniper",
"juniper-firewall",
"juniper-networks",
"juniper-srx",
"poc",
"proof-of-concept",
"rce",
"remote-code-execution",
"remote-command-execution",
"security",
"web-application-security"
],
"visibility": "public",
"forks": 13,
"watchers": 42,
"score": 0,
"subscribers_count": 2
},
{
"id": 697223244,
"name": "CVE-2023-36845",
"full_name": "toanln-cov\/CVE-2023-36845",
"owner": {
"login": "toanln-cov",
"id": 85386928,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85386928?v=4",
"html_url": "https:\/\/github.com\/toanln-cov"
},
"html_url": "https:\/\/github.com\/toanln-cov\/CVE-2023-36845",
"description": "PoC CVE-2023-36845 on Juniper Device",
"fork": false,
"created_at": "2023-09-27T09:50:56Z",
"updated_at": "2023-09-27T09:50:56Z",
"pushed_at": "2023-09-27T09:59:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 697535572,
"name": "CVE-2023-36845",
"full_name": "halencarjunior\/CVE-2023-36845",
"owner": {
"login": "halencarjunior",
"id": 403088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/403088?v=4",
"html_url": "https:\/\/github.com\/halencarjunior"
},
"html_url": "https:\/\/github.com\/halencarjunior\/CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2023-09-27T23:56:07Z",
"updated_at": "2023-09-28T19:28:33Z",
"pushed_at": "2023-09-27T23:57:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 698046011,
"name": "CVE-2023-36845",
"full_name": "zaenhaxor\/CVE-2023-36845",
"owner": {
"login": "zaenhaxor",
"id": 83585135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83585135?v=4",
"html_url": "https:\/\/github.com\/zaenhaxor"
},
"html_url": "https:\/\/github.com\/zaenhaxor\/CVE-2023-36845",
"description": "CVE-2023-36845 - Juniper Firewall Remote code execution (RCE)",
"fork": false,
"created_at": "2023-09-29T03:11:37Z",
"updated_at": "2024-02-08T18:45:52Z",
"pushed_at": "2023-10-07T03:25:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 698815248,
"name": "CVE-2023-36845",
"full_name": "simrotion13\/CVE-2023-36845",
"owner": {
"login": "simrotion13",
"id": 29673625,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29673625?v=4",
"html_url": "https:\/\/github.com\/simrotion13"
},
"html_url": "https:\/\/github.com\/simrotion13\/CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2023-10-01T03:41:40Z",
"updated_at": "2023-10-18T09:56:27Z",
"pushed_at": "2023-10-01T03:43:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 699198959,
"name": "CVE-2023-36845-POC",
"full_name": "cyberh3als\/CVE-2023-36845-POC",
"owner": {
"login": "cyberh3als",
"id": 132987956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132987956?v=4",
"html_url": "https:\/\/github.com\/cyberh3als"
},
"html_url": "https:\/\/github.com\/cyberh3als\/CVE-2023-36845-POC",
"description": "CVE-2023-36845 PoC script automates the PoC for CVE-2023-36845 targeting Juniper Networks Junos OS's J-Web component on EX and SRX Series devices. It exploits a PHP flaw, allowing remote modification of the PHPRC variable. Successful exploitation can lead to code injection and execution.",
"fork": false,
"created_at": "2023-10-02T06:28:07Z",
"updated_at": "2024-02-28T20:08:22Z",
"pushed_at": "2023-10-02T10:31:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 719033136,
"name": "ansible-cve-2023-36845",
"full_name": "CKevens\/ansible-cve-2023-36845",
"owner": {
"login": "CKevens",
"id": 7390055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
"html_url": "https:\/\/github.com\/CKevens"
},
"html_url": "https:\/\/github.com\/CKevens\/ansible-cve-2023-36845",
"description": "Ansible Playbook for CVE-2023-36845(Juniper Networks Junos OS 远程代码执行漏洞)",
"fork": false,
"created_at": "2023-11-15T10:02:22Z",
"updated_at": "2024-02-22T12:58:22Z",
"pushed_at": "2023-11-14T16:59:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 749976311,
"name": "Automation-for-Juniper-cve-2023-36845",
"full_name": "Asbawy\/Automation-for-Juniper-cve-2023-36845",
"owner": {
"login": "Asbawy",
"id": 24960024,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24960024?v=4",
"html_url": "https:\/\/github.com\/Asbawy"
},
"html_url": "https:\/\/github.com\/Asbawy\/Automation-for-Juniper-cve-2023-36845",
"description": "Simple Automation script for juniper cve-2023-36845",
"fork": false,
"created_at": "2024-01-29T18:53:22Z",
"updated_at": "2024-03-15T06:35:06Z",
"pushed_at": "2024-01-30T19:27:34Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 750216098,
"name": "Juniper-CVE-2023-36845-Mass-Hunting",
"full_name": "jahithoque\/Juniper-CVE-2023-36845-Mass-Hunting",
"owner": {
"login": "jahithoque",
"id": 61009126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61009126?v=4",
"html_url": "https:\/\/github.com\/jahithoque"
},
"html_url": "https:\/\/github.com\/jahithoque\/Juniper-CVE-2023-36845-Mass-Hunting",
"description": "Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.",
"fork": false,
"created_at": "2024-01-30T08:00:23Z",
"updated_at": "2024-02-12T07:51:29Z",
"pushed_at": "2024-01-30T08:23:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 751165844,
"name": "Juniper-Bug-Automation-CVE-2023-36845",
"full_name": "cyb3rzest\/Juniper-Bug-Automation-CVE-2023-36845",
"owner": {
"login": "cyb3rzest",
"id": 29830064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29830064?v=4",
"html_url": "https:\/\/github.com\/cyb3rzest"
},
"html_url": "https:\/\/github.com\/cyb3rzest\/Juniper-Bug-Automation-CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2024-02-01T03:54:18Z",
"updated_at": "2024-02-01T04:12:54Z",
"pushed_at": "2024-02-01T04:12:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 752138002,
"name": "Juniper-exploit-CVE-2023-36845",
"full_name": "CharonDefalt\/Juniper-exploit-CVE-2023-36845",
"owner": {
"login": "CharonDefalt",
"id": 103410775,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103410775?v=4",
"html_url": "https:\/\/github.com\/CharonDefalt"
},
"html_url": "https:\/\/github.com\/CharonDefalt\/Juniper-exploit-CVE-2023-36845",
"description": null,
"fork": false,
"created_at": "2024-02-03T06:09:30Z",
"updated_at": "2024-02-03T06:10:08Z",
"pushed_at": "2024-02-03T06:10:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 756915860,
"name": "CVE-2023-36845-6-",
"full_name": "iveresk\/CVE-2023-36845-6-",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/CVE-2023-36845-6-",
"description": "CVE-2023-36845 и CVE-2023-36846 Juniper Junos OS J-Web RCE",
"fork": false,
"created_at": "2024-02-13T14:59:59Z",
"updated_at": "2024-02-13T15:11:24Z",
"pushed_at": "2024-02-13T15:11:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 757119162,
"name": "CVE-2023-36845",
"full_name": "ak1t4\/CVE-2023-36845",
"owner": {
"login": "ak1t4",
"id": 10950567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10950567?v=4",
"html_url": "https:\/\/github.com\/ak1t4"
},
"html_url": "https:\/\/github.com\/ak1t4\/CVE-2023-36845",
"description": "CVES ",
"fork": false,
"created_at": "2024-02-13T20:59:34Z",
"updated_at": "2024-02-14T19:35:49Z",
"pushed_at": "2024-02-13T21:47:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 757410546,
"name": "CVE-2023-36845-Juniper-Vulnerability",
"full_name": "0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
"owner": {
"login": "0xNehru",
"id": 160024662,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160024662?v=4",
"html_url": "https:\/\/github.com\/0xNehru"
},
"html_url": "https:\/\/github.com\/0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
"description": "This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection.",
"fork": false,
"created_at": "2024-02-14T12:47:21Z",
"updated_at": "2024-02-14T14:51:34Z",
"pushed_at": "2024-02-14T14:07:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 758197866,
"name": "CVE-2023-36845",
"full_name": "imhunterand\/CVE-2023-36845",
"owner": {
"login": "imhunterand",
"id": 109766416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109766416?v=4",
"html_url": "https:\/\/github.com\/imhunterand"
},
"html_url": "https:\/\/github.com\/imhunterand\/CVE-2023-36845",
"description": "Juniper - Remote Code Execution (CVE-2023-36845) PreAuth-RCE Exploits",
"fork": false,
"created_at": "2024-02-15T20:17:33Z",
"updated_at": "2024-02-15T20:22:10Z",
"pushed_at": "2024-02-15T20:22:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-36845"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 758837378,
"name": "CVE-2023-36845",
"full_name": "ifconfig-me\/CVE-2023-36845",
"owner": {
"login": "ifconfig-me",
"id": 25315805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
"html_url": "https:\/\/github.com\/ifconfig-me"
},
"html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2023-36845",
"description": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. ",
"fork": false,
"created_at": "2024-02-17T08:15:30Z",
"updated_at": "2024-02-17T08:16:33Z",
"pushed_at": "2024-02-17T15:19:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 759435815,
"name": "CVE-2023-36845",
"full_name": "e11i0t4lders0n\/CVE-2023-36845",
"owner": {
"login": "e11i0t4lders0n",
"id": 76389721,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76389721?v=4",
"html_url": "https:\/\/github.com\/e11i0t4lders0n"
},
"html_url": "https:\/\/github.com\/e11i0t4lders0n\/CVE-2023-36845",
"description": "CVE-2023-36845 Unauthenticated Juniper Remote Code Execution Vulnerability Scanner",
"fork": false,
"created_at": "2024-02-18T15:37:58Z",
"updated_at": "2024-02-18T18:31:24Z",
"pushed_at": "2024-02-18T18:44:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]