mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 05:12:21 +01:00
107 lines
No EOL
3.6 KiB
JSON
107 lines
No EOL
3.6 KiB
JSON
[
|
|
{
|
|
"id": 655758961,
|
|
"name": "CVE-2023-27372",
|
|
"full_name": "nuts7\/CVE-2023-27372",
|
|
"owner": {
|
|
"login": "nuts7",
|
|
"id": 66285128,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66285128?v=4",
|
|
"html_url": "https:\/\/github.com\/nuts7"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nuts7\/CVE-2023-27372",
|
|
"description": "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.",
|
|
"fork": false,
|
|
"created_at": "2023-06-19T14:36:47Z",
|
|
"updated_at": "2023-07-05T07:35:02Z",
|
|
"pushed_at": "2023-06-22T07:19:36Z",
|
|
"stargazers_count": 40,
|
|
"watchers_count": 40,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2023-27372",
|
|
"cve2023",
|
|
"deserialization",
|
|
"exploit",
|
|
"nuclei",
|
|
"nuclei-templates",
|
|
"php",
|
|
"poc",
|
|
"rce",
|
|
"remote-code-execution",
|
|
"spip",
|
|
"vulnerability",
|
|
"web-hacking"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 40,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 658454751,
|
|
"name": "CVE-2023-27372",
|
|
"full_name": "tucommenceapousser\/CVE-2023-27372",
|
|
"owner": {
|
|
"login": "tucommenceapousser",
|
|
"id": 129875733,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129875733?v=4",
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tucommenceapousser\/CVE-2023-27372",
|
|
"description": "SPIP Vulnerability Scanner - CVE-2023-27372 Detector",
|
|
"fork": false,
|
|
"created_at": "2023-06-25T19:39:37Z",
|
|
"updated_at": "2023-06-25T19:39:38Z",
|
|
"pushed_at": "2023-06-25T19:31:01Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 662629965,
|
|
"name": "CVE-2023-27372-PoC",
|
|
"full_name": "RSTG0D\/CVE-2023-27372-PoC",
|
|
"owner": {
|
|
"login": "RSTG0D",
|
|
"id": 103416140,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103416140?v=4",
|
|
"html_url": "https:\/\/github.com\/RSTG0D"
|
|
},
|
|
"html_url": "https:\/\/github.com\/RSTG0D\/CVE-2023-27372-PoC",
|
|
"description": "This is a PoC for CVE-2023-27372 which spawns a fully interactive shell. ",
|
|
"fork": false,
|
|
"created_at": "2023-07-05T14:41:03Z",
|
|
"updated_at": "2023-07-06T12:55:50Z",
|
|
"pushed_at": "2023-07-05T14:42:24Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |