{"vulnerability": "CVE-2023-23333", "sightings": [{"uuid": "afeead0e-bdfa-476f-a949-952b383676e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-31)", "content": "", "creation_timestamp": "2025-01-31T00:00:00.000000Z"}, {"uuid": "53a815ba-af09-4041-ad31-070fa023b3cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-11)", "content": "", "creation_timestamp": "2025-01-11T00:00:00.000000Z"}, {"uuid": "abd62dd8-ea01-405a-a085-9f1624eab804", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "a26f5aaa-8a16-4911-a21e-d425997ad189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:51.000000Z"}, {"uuid": "ad6eb7fe-b408-4566-bae5-5244acdc5302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-12)", "content": "", "creation_timestamp": "2024-12-12T00:00:00.000000Z"}, {"uuid": "053986a1-12a7-4f15-ac1e-181e5612f7ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-19)", "content": "", "creation_timestamp": "2025-09-19T00:00:00.000000Z"}, {"uuid": "db62e131-dc4f-4c92-9d9e-d0db4b7b0592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-07)", "content": "", "creation_timestamp": "2025-07-07T00:00:00.000000Z"}, {"uuid": "a91206d7-3ed1-4520-902d-7c38197f987d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "e3706a05-4650-4f20-b11c-34dd32b3eb32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-29)", "content": "", "creation_timestamp": "2025-07-29T00:00:00.000000Z"}, {"uuid": "b5d4e7c4-bd54-475e-908c-330be8cf96e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:00.000000Z"}, {"uuid": "ee496ca7-4d23-4a00-a655-b614a369edca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "92bdcdc0-db5f-4735-b527-fa7f1e93db78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-09)", "content": "", "creation_timestamp": "2025-11-09T00:00:00.000000Z"}, {"uuid": "a06417aa-6b7f-42d4-8e3a-ee7edd0f5269", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-28)", "content": "", "creation_timestamp": "2025-11-28T00:00:00.000000Z"}, {"uuid": "480567ce-8566-4f5b-a5cf-069f03b4bcb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-26)", "content": "", "creation_timestamp": "2025-11-26T00:00:00.000000Z"}, {"uuid": "84c9fe54-8c5a-4937-b875-23bd9740d93a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-01)", "content": "", "creation_timestamp": "2026-02-01T00:00:00.000000Z"}, {"uuid": "3971334f-8f98-400d-ad54-a7fe79d243cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/solarview_unauth_rce_cve_2023_23333.rb", "content": "", "creation_timestamp": "2023-09-05T22:13:03.000000Z"}, {"uuid": "c473d9e9-3aa0-43c3-a571-8268f500e9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-06)", "content": "", "creation_timestamp": "2026-02-06T00:00:00.000000Z"}, {"uuid": "84235fdf-ab31-4aa4-ac52-87af29efcb80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "f191f170-a51c-4036-8ac3-e640e41af1a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4842", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aNmap NSE script to dump / test Solarwinds CVE-2023-23333 vulnerability\nURL\uff1ahttps://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-02T21:54:33.000000Z"}, {"uuid": "3c376563-334c-4a8f-a5d8-6408e48fe5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-14)", "content": "", "creation_timestamp": "2026-02-14T00:00:00.000000Z"}, {"uuid": "d8841059-5aed-4a37-b00a-357e1c9db9af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6153", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC for CVE-2023-23333\nURL\uff1ahttps://github.com/WhiteOwl-Pub/SolarView-PoC-CVE-2023-23333\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-12T16:30:52.000000Z"}, {"uuid": "66fb9ceb-fb03-45ed-bc49-fc59f1058d1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "https://t.me/arpsyndicate/1818", "content": "#ExploitObserverAlert\n\nCVE-2023-23333\n\nDESCRIPTION: Exploit Observer has 14 entries related to CVE-2023-23333. There is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.\n\nFIRST-EPSS: 0.370240000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-16T12:14:30.000000Z"}, {"uuid": "c0f1637b-6dc7-499d-9126-a9786dfc7620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/malwar3s/28", "content": "https://github.com/Timorlover/CVE-2023-23333", "creation_timestamp": "2023-02-09T14:48:00.000000Z"}, {"uuid": "127109c6-07b5-4444-b3dc-4ed16add94e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1250", "content": "https://github.com/abbycantcode/Nuclei-Template\nhttps://github.com/foulenzer/foulenzer-templates\nhttps://github.com/joanbono/nuclei-templates\nhttps://github.com/pacho15/mynuclei_templates\nhttps://github.com/themastersunil/Nuclei-TamplatesBackup.git\nhttps://github.com/themastersunil/nucleiDB\nhttps://github.com/trungkay2/Nuclei-template\nhttps://github.com/shubham-rooter/Nuclei-Template-Collection\nhttps://gist.github.com/0x240x23elu\nhttps://gist.github.com/ResistanceIsUseless/e46848f67706a8aa1205c9d2866bff31\nhttps://github.com/0x71rex/0-Nuclei-Templates\nhttps://github.com/0x727/ObserverWard_0x727\nhttps://github.com/0xAwali/Virtual-Host\nhttps://github.com/0xElkot/My-Nuclei-Templates\nhttps://github.com/0xKayala/Custom-Nuclei-Templates\nhttps://github.com/0xPugazh/my-nuclei-templates\nhttps://github.com/0xmaximus/final_freaking_nuclei_templates\nhttps://github.com/10kHacktech/nuclei_templates\nhttps://github.com/1in9e/my-nuclei-templates\nhttps://github.com/2jung/nuclei-templates\nhttps://github.com/5cr1pt/templates\nhttps://github.com/ARPSyndicate/kenzer-templates\nhttps://github.com/Akokonunes/Private-Nuclei-Templates\nhttps://github.com/Arvinthksrct/alltemplate\nhttps://github.com/AshiqurEmon/nuclei_templates.git\nhttps://github.com/BagheeraAltered/FuzzingTemplate\nhttps://github.com/BeRserKerSec/CVE-2021-26084-Nuclei-template\nhttps://github.com/CharanRayudu/Custom-Nuclei-Templates\nhttps://github.com/ChristianWeiler/custom-nuclei-templates\nhttps://github.com/Dalaho-bangin/my_nuclei_templates\nhttps://github.com/Dalaho-bangin/nuclei-templates2\nhttps://github.com/Deep2142004/Nuclei-Templates\nhttps://github.com/Deepparasiya/Nuclei-Templates\nhttps://github.com/DoubleTakes/nuclei-templates\nhttps://github.com/DrakenKun-cyber/Templates\nhttps://github.com/Elsfa7-110/log4jNuclei\nhttps://github.com/Elsfa7-110/mynuclei-templates\nhttps://github.com/Erenlancaster/CVE-2021-46704\nhttps://github.com/Esonhugh/public-nuclei-template\nhttps://github.com/ExpLangcn/NucleiTP\nhttps://github.com/Facucuervo87/openssl-3.0.4-template\nhttps://github.com/GlennPegden2/misc-nuclei-scripts\nhttps://github.com/Gotcha-1G/CVE-2022-42889\nhttps://github.com/Hack4rLIFE/CVE-2022-42889\nhttps://github.com/Harish4948/Nuclei-Templates\nhttps://github.com/HernanRodriguez1/ScanReflectedSSTI\nhttps://github.com/HideNsec/nuclei-bitrix-templates\nhttps://github.com/Hunt2behunter/nuclei-templates\nhttps://github.com/Jagomeiister/nuclei-templates\nhttps://github.com/JoshMorrison99/url-based-nuclei-templates\nhttps://github.com/Kaue-Navarro/Templates-kaue-nuclei\nhttps://github.com/KeepHowling/all_freaking_nuclei_templates\nhttps://github.com/Lopseg/nuclei-c-templates\nhttps://github.com/Lu3ky13/Authorization-Nuclei-Templates\nhttps://github.com/MR-pentestGuy/nuclei-templates\nhttps://github.com/MikeeI/nuclei-templates\nhttps://github.com/Mr-B0hl00l/nuclei-templates\nhttps://github.com/Mr-xn/CVE-2023-23333\nhttps://github.com/MrCl0wnLab/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed\nhttps://github.com/MrCl0wnLab/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter\nhttps://github.com/NightRang3r/misc_nuclei_templates\nhttps://github.com/NitinYadav00/My-Nuclei-Templates\nhttps://github.com/Odayex/Random-Nuclei-Templates\nhttps://github.com/Pavan-Alapati/nuclei-templates\nhttps://github.com/PedroFerreira97/nuclei_templates\nhttps://github.com/R-s0n/Custom_Vuln_Scan_Templates\nhttps://github.com/Rabb1ter/nuclei-templates\nhttps://github.com/RajaUzairAbdullah/nuclei-templates\nhttps://github.com/Red-Darkin/Custom-Nuclei-Templates\nhttps://github.com/Saboor-Hakimi/CVE-2023-23752\nhttps://github.com/Saimonkabir/Nuclei-Templates\nhttps://github.com/Saptak9983/Nuclei-Template\nhttps://github.com/SecTheBit/CVE-2022-1388\nhttps://github.com/Shakilll/my_nuclei_templates\nhttps://github.com/ShangRui-hash/my-nuclei-templates", "creation_timestamp": "2025-04-22T02:52:21.000000Z"}, {"uuid": "1d82e263-81f5-4554-8377-eeb02fc954a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1249", "content": "https://github.com/U53RW4R3/nuclei-fuzzer-templates\nhttps://github.com/edoardottt/missing-cve-nuclei-templates\nhttps://github.com/szybnev/nuclei-custom\nhttps://github.com/r3dcl1ff/Symfony-Fuck\nhttps://github.com/RandomRobbieBF/nuclei-drupal-sa\nhttps://github.com/ed-red/redmc_custom_templates_nuclei\nhttps://github.com/imhunterand/nuclei-custom-templates\nhttps://github.com/vulnspace/nuclei-templates\nhttps://github.com/microphone-mathematics/custom-nuclei-templates\nhttps://github.com/valaDevs/nuclei-backupfile-finder\nhttps://github.com/h0tak88r/nuclei_templates\nhttps://github.com/solo10010/solo-nuclei-templates\nhttps://github.com/zerbaliy3v/custom-nuclei-templates\nhttps://github.com/Excis3/bans4-nuclei\nhttps://github.com/Dalaho-bangin/my_nuclei_templates\nhttps://github.com/pikpikcu/nuclei-fuzz\nhttps://github.com/bhataasim1/PersonalTemplates\nhttps://github.com/reewardius/log4shell-templates\nhttps://github.com/0xKayala/Custom-Nuclei-Templates\nhttps://github.com/VulnExpo/nuclei-templates\nhttps://github.com/thanhnx9/nuclei-templates-cutomer\nhttps://github.com/nvsecurity/nightvision-nuclei-templates\nhttps://github.com/Red-Darkin/Custom-Nuclei-Templates\nhttps://github.com/h4ndsh/nuclei-templates\nhttps://github.com/EslamMonex/subdomain-takeover\nhttps://github.com/kh4sh3i/Webmin-CVE\nhttps://github.com/umityn/my-nuclei-templates\nhttps://github.com/badboycxcc/CVE-2023-24100\nhttps://github.com/qaisarafridi/MY-Nuclei-Templates\nhttps://github.com/damon-sec/TCSZ-Nuclei\nhttps://github.com/mdsabbirkhan/0xPugazh-my-nuclei-templates\nhttps://github.com/0x71rex/0-Nuclei-Templates\nhttps://github.com/projectdiscovery/nuclei-templates\nhttps://github.com/0x71rex/0-fuzzing-templates\nhttps://github.com/0x727/ObserverWard\nhttps://github.com/0xAwali/Blind-SSRF\nhttps://github.com/Lu3ky13/Authorization-Nuclei-Templates\nhttps://github.com/PedroF-369/nuclei_templates\nhttps://github.com/boobooHQ/private_templates\nhttps://github.com/bug-vs-me/nuclei\nhttps://github.com/freakyclown/Nuclei_templates\nhttps://github.com/pikpikcu/my-nuclei-templates\nhttps://github.com/rix4uni/BugBountyTips\nhttps://github.com/themoonbaba/private_templates\nhttps://github.com/0xElkot/My-Nuclei-Templates\nhttps://github.com/themoonbaba/private_templates/blob/main/springboot_heapdump.yaml\nhttps://github.com/NoRed0x/nored0x-Nuclei-Templates\nhttps://github.com/rxerium/CISA-KEV\nhttps://github.com/HideNsec/nuclei-bitrix-templates\nhttps://github.com/reewardius/interested-nuclei-templates\nhttps://github.com/HernanRodriguez1/ScanReflectedSSTI\nhttps://github.com/praetorian-inc/zeroqlik-detect\nhttps://github.com/zodmagus/z0ds3c-Nuclei-Templates\nhttps://github.com/Mr-xn/CVE-2023-23333\nhttps://github.com/BagheeraAltered/FuzzingTemplate\nhttps://github.com/Shakilll/my_nuclei_templates\nhttps://github.com/vijay922/XXE-FUZZ\nhttps://github.com/topscoder/nuclei-zero-day\nhttps://github.com/JoshMorrison99/my-nuceli-templates\nhttps://github.com/20142995/nuclei-templates\nhttps://github.com/JohnDoeAnonITA/NucleiTemplatePRV\nhttps://github.com/Co5mos/nuclei-tps\nhttps://github.com/al00000000al/my_nuclei_templates\nhttps://github.com/madisec/nuclei-templates\nhttps://github.com/Caddyshack2175/nuclei-custom-templates\nhttps://github.com/0xc4sper0/Nuclei-templates\nhttps://github.com/r3dcl1ff/nuclei-templates\nhttps://github.com/xcode0xbug/Nuclei-Private-YAML-Templates\nhttps://github.com/Lu3ky13/Authorization-Nuclei-Templates\nhttps://github.com/MuhammadWaseem29/Nuclei-templates-waseem\nhttps://github.com/ViktorMares/geoserver-nuclei-template\nhttps://github.com/securitytaters/nuclei-templates\nhttps://github.com/0XParthJ/Nuclei-Templates\nhttps://github.com/1dayluo/My-Nuclei-Templates\nhttps://github.com/Aituglo/nuclei-templates\nhttps://github.com/ChiaraNRTT96/BountySkill\nhttps://github.com/Linuxinet/nuclei-templates\nhttps://github.com/Nithissh0708/Custom-Nuclei-Templates", "creation_timestamp": "2025-04-22T02:52:21.000000Z"}, {"uuid": "bbf6971d-7655-4f9b-8fb0-794e0f0c09d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1247", "content": "https://github.com/exploit-io/nuclei-fuzz-templates\nhttps://github.com/yashrupavatiya26/custom-nuclei-template\nhttps://github.com/ts4rin4/templates4nuclei\nhttps://github.com/Caddyshack2175/nuclei-custom-templates\nhttps://github.com/0xr2r/templates-nucleir2r\nhttps://github.com/pushpak-11/customTemplates\nhttps://github.com/Christbowel/CVE-2024-25600_Nuclei-Template\nhttps://github.com/Shakilll/my_nuclei_templates\nhttps://github.com/xjhonly/nuclei-templates\nhttps://github.com/0x71rex/0-Nuclei-Templates\nhttps://github.com/0xPugal/my-nuclei-templates\nhttps://github.com/damon-sec/TCSZ-Nuclei\nhttps://github.com/qaisarafridi/MY-Nuclei-Templates\nhttps://github.com/badboycxcc/CVE-2023-24100\nhttps://github.com/umityn/my-nuclei-templates\nhttps://github.com/0xKayala/Custom-Nuclei-Templates\nhttps://github.com/thanhnx9/nuclei-templates-cutomer\nhttps://github.com/VulnExpo/nuclei-templates\nhttps://github.com/mdsabbirkhan/0xPugazh-my-nuclei-templates\nhttps://github.com/vulnspace/nuclei-templates\nhttps://github.com/microphone-mathematics/custom-nuclei-templates\nhttps://github.com/praetorian-inc/zeroqlik-detect\nhttps://github.com/hackerhijeck/Fuzzing_with_nuclei\nhttps://github.com/valaDevs/nuclei-backupfile-finder\nhttps://github.com/reewardius/interested-nuclei-templates\nhttps://github.com/zodmagus/z0ds3c-Nuclei-Templates\nhttps://github.com/Mr-xn/CVE-2023-23333\nhttps://github.com/bug-vs-me/WPML-XSS\nhttps://github.com/sudouday/nuclei-templates\nhttps://github.com/cyberheartmi9/Proxyshell-Scanner\nhttps://github.com/numanturle/CVE-2022-41040\nhttps://github.com/numanturle/Log4jNuclei\nhttps://github.com/CharanRayudu/Custom-Nuclei-Templates\nhttps://github.com/daffainfo/my-nuclei-templates\nhttps://github.com/thebrnwal/Content-Injection-Nuclei-Script\nhttps://github.com/ree4pwn/my-nuclei-templates\nhttps://github.com/peanuth8r/Nuclei_Templates\nhttps://github.com/pikpikcu/nuclei-templates\nhttps://github.com/esetal/nuclei-bb-templates\nhttps://github.com/ARPSyndicate/kenzer-templates\nhttps://github.com/medbsq/ncl\nhttps://github.com/notnotnotveg/nuclei-custom-templates\nhttps://github.com/clarkvoss/Nuclei-Templates\nhttps://github.com/z3bd/nuclei-templates\nhttps://github.com/peanuth8r/Nuclei_Templates\nhttps://github.com/thebrnwal/Content-Injection-Nuclei-Script\nhttps://github.com/ree4pwn/my-nuclei-templates\nhttps://github.com/im403/nuclei-temp\nhttps://github.com/System00-Security/backflow\nhttps://github.com/geeknik/nuclei-templates-1\nhttps://github.com/geeknik/the-nuclei-templates\nhttps://github.com/optiv/mobile-nuclei-templates\nhttps://github.com/obreinx/nuceli-templates\nhttps://github.com/randomstr1ng/nuclei-sap-templates\nhttps://github.com/CharanRayudu/Custom-Nuclei-Templates\nhttps://github.com/n1f2c3/mytemplates\nhttps://github.com/kabilan1290/templates\nhttps://github.com/smaranchand/nuclei-templates\nhttps://github.com/Saimonkabir/Nuclei-Templates\nhttps://github.com/yavolo/nuclei-templates\nhttps://github.com/sadnansakin/my-nuclei-templates\nhttps://github.com/5cr1pt/templates\nhttps://github.com/rahulkadavil/nuclei-templates\nhttps://github.com/shifa123/detections\nhttps://github.com/daffainfo/my-nuclei-templates\nhttps://github.com/javaongsan/nuclei-templates\nhttps://github.com/AshiqurEmon/nuclei_templates\nhttps://gist.github.com/ResistanceIsUseless/e46848f67706a8aa1205c9d2866bff31\nhttps://github.com/NitinYadav00/My-Nuclei-Templates\nhttps://github.com/sharathkramadas/k8s-nuclei-templates\nhttps://github.com/securitytest3r/nuclei_templates_work\nhttps://github.com/MR-pentestGuy/nuclei-templates\nhttps://github.com/thelabda/nuclei-templates\nhttps://github.com/1in9e/my-nuclei-templates\nhttps://github.com/redteambrasil/nuclei-templates\nhttps://github.com/Saptak9983/Nuclei-Template\nhttps://github.com/Harish4948/Nuclei-Templates\nhttps://github.com/R-s0n/Custom_Vuln_Scan_Templates", "creation_timestamp": "2025-04-22T02:52:21.000000Z"}, {"uuid": "0309a035-2a7e-4b32-b274-81c9fc990682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/42067", "content": "CVE-2023-23333\nScanner + Loader\nFofa Dork\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\nFile password: ATLASAPI\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\n@Benshii\nThe ATLAS API corporation", "creation_timestamp": "2024-06-16T14:51:48.000000Z"}, {"uuid": "f6b6c888-0a8e-4fcd-8cda-bcb4b28da414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2316", "content": "#Tools\u00a0 \ud83d\udee0\ufe0f \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n\u200b\u200bWSAPatch\n\nMake WSA(Windows Subsystem for Android) run on Windows 10.\n\nhttps://github.com/cinit/WSAPatch\n\n\u200b\u200bmac-changerPro\n\nThis is a bash script that can change the MAC address of either the eth0 or wlan0 network interface.\n\nhttps://github.com/4m3rr0r/mac-changerPro\n\n\u200b\u200bOneNoteAnalyzer\n\nA C# based tool for analysing malicious OneNote documents.\n\nhttps://github.com/knight0x07/OneNoteAnalyzer\n\n\u200b\u200bRasmanPotato\n\nAbuse Impersonate Privilege from Service to SYSTEM like other potatoes do\n\nhttps://github.com/crisprss/RasmanPotato\n\n#redteam\n\n\u200b\u200bSummary\n\nThere is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.\n\nhttps://github.com/Timorlover/CVE-2023-23333\n\n#cve #poc\n\n\u200b\u200bGolang Security Checker\n\nInspects source code for security problems by scanning the Go AST.\n\nhttps://github.com/securego/gosec\n\n\u200b\u200bSemgrep rules for smart contracts\n\nIn this repository you can find semgrep rules that look for patterns of vulnerabilities in smart contracts based on actual DeFi exploits.\n\nhttps://github.com/Decurity/semgrep-smart-contracts\n\n#pentesting #bugbounty\n\n\u200b\u200bHellgateLoader_CSharp\n\nLoad shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.\n\nhttps://github.com/Kara-4search/HellgateLoader_CSharp\n\n\u200b\u200bPhishingKit-Yara-Rules\n\nRepository of Yara rules dedicated to Phishing Kits Zip files\n\nhttps://github.com/t4d/PhishingKit-Yara-Rules\n\n\u200b\u200bSecrets Patterns Database \ud83d\uddc4\n\nThe largest open-source database for detecting secrets, API keys, passwords, tokens, and more. Use secrets-patterns-db to feed your secret scanning engine with regex patterns for identifying secrets.\n\nhttps://github.com/mazen160/secrets-patterns-db\n\n#pentesting #bugbounty\n\n\u200b\u200bntdlll-unhooking-collection\n\ndifferent ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)\n\nhttps://github.com/TheD1rkMtr/ntdlll-unhooking-collection\n\n#redteam #hackers\n\nBTC:\nbc1q62lwma4r3w3klq4mcn5hys9nps5h40qmafrc8e\n\n#Tools\u00a0 \ud83d\udee0\ufe0f \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\nwww.ghostclan.org", "creation_timestamp": "2023-02-22T07:31:29.000000Z"}, {"uuid": "b3d985c6-34f2-4da8-be85-7a10102f0396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/ATLASAPI/74", "content": "CVE-2023-23333\nScanner + Loader\nFofa Dork\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\nFile password: ATLASAPI\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\n@Benshii\nThe ATLAS API corporation", "creation_timestamp": "2024-03-27T18:38:10.000000Z"}, {"uuid": "393372d7-5085-4f55-99d0-f42240c7e905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3085", "content": "25 Tools \ud83d\udd27  \ud83d\udd28\ud83d\udd27 - Hackers Factory\n\n\u200b\u200bPython3 C2 Course Code Modules\n\n\u2022 SMTP Module\n\u2022 File Transfer Module\n\u2022 Securing Your Payload Channels\n\nhttps://github.com/dievus/Python3-C2-Course-Code-Modules\n\n#infosec #pentesting #redteam\n\n\u200b\u200bRedTeamScripts\n\nThis repo will contain some random Red Team Scripts that I made that can be useful for others.\n\nhttps://github.com/api0cradle/RedTeamScripts\n\n#infosec #pentesting #redteam\n\n\u200b\u200bHBSQLI\n\nAutomated tool for testing header based blind sql injection.\n\nhttps://github.com/SAPT01/HBSQLI\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bCVE-2022-38694\n\nAn attacker with physical access to the device can overwrite a function pointer somewhere in the BootROM data section or a return address stored on the stack and execute their own code with BootROM privileges.\n\nhttps://github.com/TomKing062/CVE-2022-38694_unlock_bootloader\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bDopamine\n\nA semi-untethered permasigned jailbreak for iOS 15\n\nhttps://github.com/opa334/Dopamine\n\n#cybersecurity #infosec\n\n\u200b\u200bebpfmon\n\nA tool for monitoring eBPF programs. It is designed to be used with bpftool from the linux kernel. ebpfmon is a TUI (terminal UI) application written in Go that allows you to do real-time monitoring of eBPF programs.\n\nhttps://github.com/redcanaryco/ebpfmon\n\n#cybersecurity #infosec\n\n\u200b\u200bBaseComp\n\nA Comparative Analysis for Integrity Protection in Cellular Baseband Software\n\nhttps://github.com/kaist-hacking/BaseComp\n\n#cybersecurity #infosec\n\n\u200b\u200bZehef\n\nA osint tool who studies the emails \ud83d\udce9\n\nhttps://github.com/N0rz3/Zehef\n\n#OSINT #cybersecurity #infosec\n\n\u200b\u200bgzip-js-injector\n\nGZIP Page Zero Overhead Injection.\n\nhttps://github.com/EtherDream/gzip-js-injector\n\n#infosec #pentesting #redteam\n\n\u200b\u200btelegram-tracker\n\nThe package connects to Telegram's API to generate JSON files containing data for channels, including information and posts. It allows you to search for specific channels or a set of channels provided in a text file, with one channel per line.\n\nhttps://github.com/estebanpdl/telegram-tracker\n\n#OSINT #cybersecurity #infosec\n\n\u200b\u200bOne-Liner-Collections\n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements.\nhttps://github.com/thecybertix/One-Liner-Collections\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bPayloads All The PDFs\n\nA list of crafted malicious PDF files to test the security of PDF readers and tools.\n\nhttps://github.com/luigigubello/PayloadsAllThePDFs\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200busb-sniffer\n\nLow-cost LS/FS/HS USB sniffer with Wireshark interface. This sniffer can be used standalone from a command line or as a plugin for Wireshark with direct control from the UI. Either way, the capture is saved in a standard PcapNG format.\n\nhttps://github.com/ataradov/usb-sniffer\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bNucleiFuzzer \n\nA powerful automation tool for detecting xss,sqli,ssrf,open-redirect..etc vulnerabilities in web applications.\n\nhttps://github.com/0xKayala/NucleiFuzzer\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bAirGuard\n\nProtect yourself from being tracked \ud83c\udf0d by #AirTags \ud83c\udff7 and Find My accessories \ud83d\udccd\n\nhttps://github.com/seemoo-lab/AirGuard\n\n\u200b\u200bVulnerability_PoC\n\nThe PoC/Exploit of some interesting vulnerabilities.\n\nhttps://github.com/numencyber/Vulnerability_PoC\n\n#cybersecurity #infosec\n\n\u200b\u200bSecurity Research\n\nThis project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.\n\nhttps://github.com/google/security-research\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bPHP Cookie Stealer\n\nThis project is a simple PHP script used to demonstrate how an attacker can steal cookies. It captures the victim's cookie, IP address, user agent, and geographical details, and then logs this information.\n\nhttps://github.com/noxvix/Xss-Exploitation\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2023-23333\n\nSolarView Compact through 6.00 downloader.php commands injection (RCE) nuclei-templates.\n\nhttps://github.com/Mr-xn/CVE-2023-23333\n\n#cve #cybersecurity #infosec\n\n1/2", "creation_timestamp": "2023-06-18T13:18:19.000000Z"}, {"uuid": "c6c0f332-4a8b-4901-ac33-1cfd6f476932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/LeakingCode/12937", "content": "CVE-2023-23333\nScanner + Loader\nFofa Dork\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\nFile password: ATLASAPI\n\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\n@Benshii\nThe ATLAS API corporation", "creation_timestamp": "2024-06-16T14:51:48.000000Z"}, {"uuid": "9234a557-c923-4734-b2c8-994b395644b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/1142", "content": "", "creation_timestamp": "2023-09-10T04:25:21.000000Z"}, {"uuid": "cec30dbb-f313-4dc5-81e0-c7ae7213c7d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/RAT070/351", "content": "CVE-2023-23333 : SolarView Compact 6.00 - Remote Command Execution\n\n\n\u0647\u0646\u0627\u0643 \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u0623\u0648\u0627\u0645\u0631 \u0641\u064a SolarView Compact \u062d\u062a\u0649 6.00 \u060c \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u0623\u0648\u0627\u0645\u0631 \u0645\u0646 \u062e\u0644\u0627\u0644 \u062a\u062c\u0627\u0648\u0632 \u0627\u0644\u0642\u064a\u0648\u062f \u0627\u0644\u062f\u0627\u062e\u0644\u064a\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 downloader.php.\n\n\nPOC : https://github.com/Timorlover/CVE-2023-23333", "creation_timestamp": "2023-04-02T03:46:28.000000Z"}, {"uuid": "33ad6aee-81f4-4175-aca8-aee90756505d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/699", "content": "CVE-2023-23333 : SolarView Compact 6.00 - Remote Command Execution\nPOC : https://github.com/Timorlover/CVE-2023-23333", "creation_timestamp": "2023-02-19T06:30:20.000000Z"}, {"uuid": "fded56cb-9d79-444d-91c3-4c9bd7391292", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/431", "content": "https://github.com/Timorlover/CVE-2023-23333\n#github", "creation_timestamp": "2023-09-16T02:27:03.000000Z"}, {"uuid": "8f961875-6845-4604-beb4-912ff617badf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "Telegram/m5dKIu35pETk5Dr59D7THjGmk0JVBTxqPZn_WTns2gf7Ddc", "content": "", "creation_timestamp": "2023-04-01T00:34:08.000000Z"}, {"uuid": "fad29733-77c9-4c93-b2cf-220bce92625c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}, {"uuid": "be30df79-d13e-44a4-9cb0-238a86698bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "seen", "source": "https://t.me/cibsecurity/57622", "content": "\u203c CVE-2023-23333 \u203c\n\nThere is a command injection vulnerability in SolarView Compact through 6.00, attackers can execute commands by bypassing internal restrictions through downloader.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-07T00:23:30.000000Z"}, {"uuid": "9dd3d106-e703-42cb-b6ee-a4caef596787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/848", "content": "SolarView Compact &lt;=ver 6.00\n\nurl /downloader.php?file=;echo%20Y2F0IC9ldGMvcGFzc3dkCg==|base64%20-d|bash%00.zip\n\ncve-2023-23333\n#poc", "creation_timestamp": "2023-08-10T13:55:36.000000Z"}, {"uuid": "4b48b240-4242-4066-a27e-c55a683543e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/931", "content": "cve-2023-23333\n\nGET /downloader.php?file=%3Bid%00.zip HTTP/1.1\n\n#poc", "creation_timestamp": "2023-08-24T14:43:25.000000Z"}, {"uuid": "67dcefcd-5013-4757-900b-07693249b34f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8777", "content": "#Offensive_security\n1. P4wnP1-LTE: LTE modem for long range USB shenanigans\nhttps://sensepost.com/blog/2023/p4wnp1-lte\n2. MalRDP: Implementing Rouge RDP Manually\nhttps://shorsec.io/blog/malrdp-implementing-rouge-rdp-manually\n3. Nmap NSE script to dump/test Solarwinds CVE-2023-23333 vulnerability\nhttps://github.com/emanueldosreis/nmap-CVE-2023-23333-exploit", "creation_timestamp": "2023-08-02T13:18:25.000000Z"}, {"uuid": "401ab21f-1f32-4cd2-b6da-34759f667010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-23333", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7706", "content": "#exploit\n1. CVE-2022-44268:\nImageMagick arbitrary file read\nhttps://github.com/Vulnmachines/imagemagick-CVE-2022-44268\n\n2. CVE-2023-22855:\nKardex Control Center Exploit\nhttps://github.com/patrickhener/CVE-2023-22855\n\n3. CVE-2023-23333:\nCI vulnerability in SolarView Compact &lt;6.00\nhttps://github.com/Timorlover/CVE-2023-23333", "creation_timestamp": "2023-02-07T11:01:01.000000Z"}]}