[ { "id": 116822376, "name": "RAU_crypto", "full_name": "bao7uo\/RAU_crypto", "owner": { "login": "bao7uo", "id": 21125224, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21125224?v=4", "html_url": "https:\/\/github.com\/bao7uo" }, "html_url": "https:\/\/github.com\/bao7uo\/RAU_crypto", "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", "updated_at": "2024-04-01T11:16:11Z", "pushed_at": "2020-08-22T06:15:54Z", "stargazers_count": 164, "watchers_count": 164, "has_discussions": false, "forks_count": 47, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 47, "watchers": 164, "score": 0, "subscribers_count": 9 }, { "id": 550908047, "name": "Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut", "full_name": "KasunPriyashan\/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut", "owner": { "login": "KasunPriyashan", "id": 97877907, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97877907?v=4", "html_url": "https:\/\/github.com\/KasunPriyashan" }, "html_url": "https:\/\/github.com\/KasunPriyashan\/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut", "description": "Arbitrary code execution analysis based on Telerik-UI. This will be done so that the article can be read by others. The document provides an in-depth explanation of the various vectors involved with Telerik-UI for ASP.NET AJAX, as well as POST requests, the architecture of ASP.NET AJAX,", "fork": false, "created_at": "2022-10-13T14:19:12Z", "updated_at": "2022-10-13T14:19:12Z", "pushed_at": "2022-10-13T14:19:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 550909457, "name": "Telerik-UI-ASP.NET-AJAX-Exploitation", "full_name": "KasunPriyashan\/Telerik-UI-ASP.NET-AJAX-Exploitation", "owner": { "login": "KasunPriyashan", "id": 97877907, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97877907?v=4", "html_url": "https:\/\/github.com\/KasunPriyashan" }, "html_url": "https:\/\/github.com\/KasunPriyashan\/Telerik-UI-ASP.NET-AJAX-Exploitation", "description": "Unrestricted File Upload by Weak Encryption affected versions (CVE-2017-11317) 2. Remote Code Execution by Insecure Deserialization - (CVE-2019-18935)", "fork": false, "created_at": "2022-10-13T14:21:31Z", "updated_at": "2022-10-13T14:21:31Z", "pushed_at": "2022-10-13T14:22:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]