[ { "id": 116822376, "name": "RAU_crypto", "full_name": "bao7uo\/RAU_crypto", "owner": { "login": "bao7uo", "id": 21125224, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21125224?v=4", "html_url": "https:\/\/github.com\/bao7uo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bao7uo\/RAU_crypto", "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", "updated_at": "2024-12-20T18:58:54Z", "pushed_at": "2020-08-22T06:15:54Z", "stargazers_count": 171, "watchers_count": 171, "has_discussions": false, "forks_count": 48, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 48, "watchers": 171, "score": 0, "subscribers_count": 9 }, { "id": 550908047, "name": "Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut", "full_name": "KasunPriyashan\/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut", "owner": { "login": "KasunPriyashan", "id": 97877907, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97877907?v=4", "html_url": "https:\/\/github.com\/KasunPriyashan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KasunPriyashan\/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut", "description": "Arbitrary code execution analysis based on Telerik-UI. This will be done so that the article can be read by others. The document provides an in-depth explanation of the various vectors involved with Telerik-UI for ASP.NET AJAX, as well as POST requests, the architecture of ASP.NET AJAX,", "fork": false, "created_at": "2022-10-13T14:19:12Z", "updated_at": "2022-10-13T14:19:12Z", "pushed_at": "2022-10-13T14:19:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 550909457, "name": "Telerik-UI-ASP.NET-AJAX-Exploitation", "full_name": "KasunPriyashan\/Telerik-UI-ASP.NET-AJAX-Exploitation", "owner": { "login": "KasunPriyashan", "id": 97877907, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97877907?v=4", "html_url": "https:\/\/github.com\/KasunPriyashan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/KasunPriyashan\/Telerik-UI-ASP.NET-AJAX-Exploitation", "description": "Unrestricted File Upload by Weak Encryption affected versions (CVE-2017-11317) 2. Remote Code Execution by Insecure Deserialization - (CVE-2019-18935)", "fork": false, "created_at": "2022-10-13T14:21:31Z", "updated_at": "2022-10-13T14:21:31Z", "pushed_at": "2022-10-13T14:22:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 830495628, "name": "CVE-2017-11317-and-CVE-2017-11357-in-Telerik", "full_name": "hlong12042\/CVE-2017-11317-and-CVE-2017-11357-in-Telerik", "owner": { "login": "hlong12042", "id": 58381595, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58381595?v=4", "html_url": "https:\/\/github.com\/hlong12042", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hlong12042\/CVE-2017-11317-and-CVE-2017-11357-in-Telerik", "description": null, "fork": false, "created_at": "2024-07-18T11:41:16Z", "updated_at": "2024-07-18T12:40:38Z", "pushed_at": "2024-07-18T12:40:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]