PoC-in-GitHub/2023/CVE-2023-3824.json
2025-03-02 03:31:45 +09:00

126 lines
No EOL
4.7 KiB
JSON

[
{
"id": 773755811,
"name": "CVE-2023-3824",
"full_name": "jhonnybonny\/CVE-2023-3824",
"owner": {
"login": "jhonnybonny",
"id": 87495218,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87495218?v=4",
"html_url": "https:\/\/github.com\/jhonnybonny",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jhonnybonny\/CVE-2023-3824",
"description": "Vulnerability in PHP Phar files, due to buffer overflow, arises from insufficient length checks on file names within the Phar archive. Malicious actors can craft Phar files with long file names, leading to buffer overflow and potential execution of malicious code or data leakage. This vulnerability can be exploited for code execution CVE-2023-3824",
"fork": false,
"created_at": "2024-03-18T10:45:33Z",
"updated_at": "2024-10-21T13:17:57Z",
"pushed_at": "2024-03-18T10:49:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 913593509,
"name": "poc-cve-2023-3824",
"full_name": "fr33c0d3\/poc-cve-2023-3824",
"owner": {
"login": "fr33c0d3",
"id": 194177575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194177575?v=4",
"html_url": "https:\/\/github.com\/fr33c0d3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fr33c0d3\/poc-cve-2023-3824",
"description": "PoC CVE 2023-3824",
"fork": false,
"created_at": "2025-01-08T01:43:29Z",
"updated_at": "2025-02-04T21:22:23Z",
"pushed_at": "2025-01-08T01:49:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 915373751,
"name": "poc-cve",
"full_name": "bluefish3r\/poc-cve",
"owner": {
"login": "bluefish3r",
"id": 194559845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194559845?v=4",
"html_url": "https:\/\/github.com\/bluefish3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bluefish3r\/poc-cve",
"description": "poc-cve-2023-3824",
"fork": false,
"created_at": "2025-01-11T17:19:21Z",
"updated_at": "2025-01-11T17:43:19Z",
"pushed_at": "2025-01-11T17:42:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 930425343,
"name": "CVE-2023-3824",
"full_name": "exploitdevelop\/CVE-2023-3824",
"owner": {
"login": "exploitdevelop",
"id": 192897302,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192897302?v=4",
"html_url": "https:\/\/github.com\/exploitdevelop",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/exploitdevelop\/CVE-2023-3824",
"description": "In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. ",
"fork": false,
"created_at": "2025-02-10T16:03:58Z",
"updated_at": "2025-02-16T22:50:03Z",
"pushed_at": "2025-02-10T16:04:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]