PoC-in-GitHub/2018/CVE-2018-8823.json

25 lines
1.1 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 160734988,
"name": "CVE-2018-8823",
"full_name": "b3rksecurity\/CVE-2018-8823",
"owner": {
"login": "b3rksecurity",
"id": 44809204,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/44809204?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/b3rksecurity"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/b3rksecurity\/CVE-2018-8823",
"description": "Script coded by b3rksecurity for script kiddies who want a good PHP script for the auto-exploitation of the bamegamenu Remote Code Execution (+Zone H auto notification) What is remote code execution ? >> https:\/\/www.owasp.org\/index.php\/Code_Injection. The vulnerability issued on the GET method. Vuln path: \/modules\/bamegamenu\/ajax_phpcode.php?code=inject_your_php_code",
"fork": false,
"created_at": "2018-12-06T21:33:57Z",
"updated_at": "2019-06-10T13:21:24Z",
"pushed_at": "2018-12-06T21:45:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
}
]