{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":669910391,"defaultBranch":"main","name":"hackers_CVE_2023_poc","ownerLogin":"abrahim7112","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2023-07-23T20:33:17.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/82097150?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1692874389.0","currentOid":""},"activityList":{"items":[{"before":"a5bae1f483d3d57d362a8d5f3fe7dc9aa631a1df","after":"f1def47496154e685703f3d5417c105e7cb2c483","ref":"refs/heads/main","pushedAt":"2024-02-05T12:26:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Delete xmlin/apktool.jar\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Delete xmlin/apktool.jar"}},{"before":"7a5e224f71f88c0fe65b89ede25a323dafc59ac6","after":"a5bae1f483d3d57d362a8d5f3fe7dc9aa631a1df","ref":"refs/heads/main","pushedAt":"2023-10-10T17:51:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update README.md\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update README.md"}},{"before":"6477adcf48520e5117880f934ac91ef0f06772c0","after":"7a5e224f71f88c0fe65b89ede25a323dafc59ac6","ref":"refs/heads/main","pushedAt":"2023-08-30T14:47:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update hackers.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update hackers.py"}},{"before":"005b8d6d1394dceea3662e2382dbbdeddb463f17","after":"6477adcf48520e5117880f934ac91ef0f06772c0","ref":"refs/heads/main","pushedAt":"2023-08-30T14:46:11.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_28771_poc.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_28771_poc.py"}},{"before":"0e86374e0714f06b5766b67130cd029b785163c5","after":"005b8d6d1394dceea3662e2382dbbdeddb463f17","ref":"refs/heads/main","pushedAt":"2023-08-30T14:41:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_27350.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_27350.py"}},{"before":"7cf135ebd1fa56cc941b0bd71b1a504a9ff1fdb6","after":"0e86374e0714f06b5766b67130cd029b785163c5","ref":"refs/heads/main","pushedAt":"2023-08-30T14:41:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_27163.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_27163.py"}},{"before":"be64d6ee96102ddf6e36bb01546ff906705181d8","after":"7cf135ebd1fa56cc941b0bd71b1a504a9ff1fdb6","ref":"refs/heads/main","pushedAt":"2023-08-30T14:40:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_24488.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_24488.py"}},{"before":"b1d7bc7e32604f65efc0a537ffa3e8b002043e4a","after":"be64d6ee96102ddf6e36bb01546ff906705181d8","ref":"refs/heads/main","pushedAt":"2023-08-30T14:39:23.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_23488.py\n\n# Running this script against a WordPress instance with Paid Membership Pro plugin\r\n# tells you if the target is vulnerable.\r\n# As the SQL injection technique required to exploit it is Time-based blind, instead of\r\n# trying to directly exploit the vuln, it will generate the appropriate sqlmap command\r\n# to dump the whole database (probably very time-consuming) or specific chose data like\r\n# usernames and passwords.\r\n\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_23488.py"}},{"before":"23421464049799d190be75ac8e704287d338d5a5","after":"b1d7bc7e32604f65efc0a537ffa3e8b002043e4a","ref":"refs/heads/main","pushedAt":"2023-08-30T14:38:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_23333.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_23333.py"}},{"before":"7e4f57798b79f1e935631dc30e4f87de0854ad60","after":"23421464049799d190be75ac8e704287d338d5a5","ref":"refs/heads/main","pushedAt":"2023-08-30T14:37:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_21837.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_21837.py"}},{"before":"665d522c58b4614295ac554800d98f740f1eabd6","after":"7e4f57798b79f1e935631dc30e4f87de0854ad60","ref":"refs/heads/main","pushedAt":"2023-08-30T14:35:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_21554.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_21554.py"}},{"before":"6e8ff2756829d33ce1f1ca273b5e97ac533574c0","after":"665d522c58b4614295ac554800d98f740f1eabd6","ref":"refs/heads/main","pushedAt":"2023-08-30T14:35:23.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_20887.py\n\nVMWare Aria Operations for Networks (vRealize Network Insight) pre-authenticated RCE\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_20887.py"}},{"before":"933bd23404ba49e9b75033705d3437e885926e10","after":"6e8ff2756829d33ce1f1ca273b5e97ac533574c0","ref":"refs/heads/main","pushedAt":"2023-08-30T14:34:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_20110.py\n\nSmart Software Manager On-Prem Release 8-202212 - Authenticated SQL Injection in 'filter_by' parameter\r\n\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_20110.py"}},{"before":"c1dbdfa1f8be5b5a32bf4c356130e3c2f870f21f","after":"933bd23404ba49e9b75033705d3437e885926e10","ref":"refs/heads/main","pushedAt":"2023-08-30T14:33:29.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_3460.py\n\nUltimate Member Unauthorized Administrator Access Exploit \n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_3460.py"}},{"before":"385775645bda1afa1572cb710e0e19189aa1a0ad","after":"c1dbdfa1f8be5b5a32bf4c356130e3c2f870f21f","ref":"refs/heads/main","pushedAt":"2023-08-30T14:32:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_2982.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_2982.py"}},{"before":"c20c43c2e769fbed54d10e8be96ceff92551f148","after":"385775645bda1afa1572cb710e0e19189aa1a0ad","ref":"refs/heads/main","pushedAt":"2023-08-30T14:31:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_2877.py\n\nFormidable Forms < 6.3.1 - Subscriber+ Remote Code Execution\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_2877.py"}},{"before":"9878f3885ec0ffbcbf2065c4a11dbc99c8df3ab6","after":"c20c43c2e769fbed54d10e8be96ceff92551f148","ref":"refs/heads/main","pushedAt":"2023-08-30T14:30:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_2825_POC.py\n\nThis Proof Of Concept leverages a path traversal vulnerability\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_2825_POC.py"}},{"before":"e5535e17a49d4b8993b69cd25957312811817cbd","after":"9878f3885ec0ffbcbf2065c4a11dbc99c8df3ab6","ref":"refs/heads/main","pushedAt":"2023-08-30T14:30:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_2825.py\n\nCVE-2023-2825 - GitLab Unauthenticated arbitrary file read\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_2825.py"}},{"before":"3a7fbdf845e04993b6e9abd51c72309958c4d19c","after":"e5535e17a49d4b8993b69cd25957312811817cbd","ref":"refs/heads/main","pushedAt":"2023-08-30T14:28:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_1671.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_1671.py"}},{"before":"4c0e3652543f98b6f4efaea59a79a9c977a0544f","after":"3a7fbdf845e04993b6e9abd51c72309958c4d19c","ref":"refs/heads/main","pushedAt":"2023-08-30T14:27:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2023_0861.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2023_0861.py"}},{"before":"021dc8587244b35371414ab78578b64b06b20404","after":"4c0e3652543f98b6f4efaea59a79a9c977a0544f","ref":"refs/heads/main","pushedAt":"2023-08-30T14:26:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2022_42475_RCE_POC.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2022_42475_RCE_POC.py"}},{"before":"05510d92d6c7a9b6cd903e144be396d654110bc1","after":"021dc8587244b35371414ab78578b64b06b20404","ref":"refs/heads/main","pushedAt":"2023-08-30T14:24:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update requirements.txt\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update requirements.txt"}},{"before":"4742669f767f3cc6b7958adac6fdddab34815a54","after":"05510d92d6c7a9b6cd903e144be396d654110bc1","ref":"refs/heads/main","pushedAt":"2023-08-30T14:19:52.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2022_40684.py\n\nAn authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.\r\n\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2022_40684.py"}},{"before":"520622ed02de497508a0866981df40f8ad81a895","after":"4742669f767f3cc6b7958adac6fdddab34815a54","ref":"refs/heads/main","pushedAt":"2023-08-30T14:19:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2022_31854.py\n\n phpIPAM 1.4.5 - Remote Code Execution (RCE) (Authenticated)\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2022_31854.py"}},{"before":"40ea1071dd6e9b00feaa05c19135c46ed154d490","after":"520622ed02de497508a0866981df40f8ad81a895","ref":"refs/heads/main","pushedAt":"2023-08-30T14:18:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update cve_2022_2414_poc.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update cve_2022_2414_poc.py"}},{"before":"593909461481bab6c509f311feca6915d914b054","after":"40ea1071dd6e9b00feaa05c19135c46ed154d490","ref":"refs/heads/main","pushedAt":"2023-08-30T14:16:52.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update xssearch.py\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update xssearch.py"}},{"before":"61c93c4bebc9af9ea0db7baa4e67f15b5579354b","after":"593909461481bab6c509f311feca6915d914b054","ref":"refs/heads/main","pushedAt":"2023-08-30T14:16:06.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update cve_2022_39197_poc.py\n\nVulnerability Intro\r\n\r\nAccording to the Update Log of the latest version 4.7.1 officially released by CobaltStrike on 20 September, teamserver version(<=4.7) has XSS vulnerability, which can cause RCE.\r\n\r\n We were contacted by an independent researcher named \"Beichendream\" to inform us of an XSS vulnerability they found in the team's servers. This would allow an attacker to set a malformed username in the Beacon configuration, allowing them to execute code RCE remotely.\r\n\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update cve_2022_39197_poc.py"}},{"before":"dc525106b767ce2a31a1bb8eec2af66a3de8ebbe","after":"61c93c4bebc9af9ea0db7baa4e67f15b5579354b","ref":"refs/heads/main","pushedAt":"2023-08-30T14:14:48.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2022_29455.py\n\nDOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions.\r\n\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2022_29455.py"}},{"before":"a9a7a9ec946f5e4615f873fcdf6dc5fdda4d493b","after":"dc525106b767ce2a31a1bb8eec2af66a3de8ebbe","ref":"refs/heads/main","pushedAt":"2023-08-30T14:13:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2022_26809.py\n\nRemote Procedure Call Runtime Remote Code Execution Vulnerability\r\n\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2022_26809.py"}},{"before":"81ecac00e699202589245d8194ffbb45e9dd1fd6","after":"a9a7a9ec946f5e4615f873fcdf6dc5fdda4d493b","ref":"refs/heads/main","pushedAt":"2023-08-30T14:13:13.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"abrahim7112","name":"ibrahim ali","path":"/abrahim7112","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/82097150?s=80&v=4"},"commit":{"message":"Update CVE_2021_31762.py\n\n Webmin 1.973 - 'save_user.cgi' Cross-Site Request Forgery (CSRF)\n\nSigned-off-by: ibrahim ali <82097150+abrahim7112@users.noreply.github.com>","shortMessageHtmlLink":"Update CVE_2021_31762.py"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAD8jt_NQA","startCursor":null,"endCursor":null}},"title":"Activity ยท abrahim7112/hackers_CVE_2023_poc"}