PoC-in-GitHub/2020/CVE-2020-25213.json
2024-12-05 09:32:14 +09:00

285 lines
No EOL
9.9 KiB
JSON

[
{
"id": 302958732,
"name": "wp-file-manager-CVE-2020-25213",
"full_name": "mansoorr123\/wp-file-manager-CVE-2020-25213",
"owner": {
"login": "mansoorr123",
"id": 54185552,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54185552?v=4",
"html_url": "https:\/\/github.com\/mansoorr123",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mansoorr123\/wp-file-manager-CVE-2020-25213",
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2024-12-04T19:59:04Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bugbounty",
"infosec",
"zeroday"
],
"visibility": "public",
"forks": 24,
"watchers": 58,
"score": 0,
"subscribers_count": 2
},
{
"id": 312602621,
"name": "WPKiller",
"full_name": "kakamband\/WPKiller",
"owner": {
"login": "kakamband",
"id": 70383870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70383870?v=4",
"html_url": "https:\/\/github.com\/kakamband",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kakamband\/WPKiller",
"description": "CVE-2020-25213 Wordpress File Manager 6.7 Plugin 0day exploit",
"fork": false,
"created_at": "2020-11-13T14:47:27Z",
"updated_at": "2024-08-12T20:07:36Z",
"pushed_at": "2020-11-13T14:46:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 335841666,
"name": "CVE-2020-25213-Wordpress",
"full_name": "forse01\/CVE-2020-25213-Wordpress",
"owner": {
"login": "forse01",
"id": 76189258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76189258?v=4",
"html_url": "https:\/\/github.com\/forse01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/forse01\/CVE-2020-25213-Wordpress",
"description": null,
"fork": false,
"created_at": "2021-02-04T04:52:06Z",
"updated_at": "2023-03-16T01:13:50Z",
"pushed_at": "2021-03-05T02:31:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 347219302,
"name": "Wordpress-CVE-2020-25213",
"full_name": "0000000O0Oo\/Wordpress-CVE-2020-25213",
"owner": {
"login": "0000000O0Oo",
"id": 61102077,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61102077?v=4",
"html_url": "https:\/\/github.com\/0000000O0Oo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0000000O0Oo\/Wordpress-CVE-2020-25213",
"description": "Will write a python script for exploiting this vulnerability ",
"fork": false,
"created_at": "2021-03-12T22:58:43Z",
"updated_at": "2021-03-13T13:15:06Z",
"pushed_at": "2021-03-13T13:15:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 354304279,
"name": "CVE-2020-25213",
"full_name": "piruprohacking\/CVE-2020-25213",
"owner": {
"login": "piruprohacking",
"id": 81864674,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81864674?v=4",
"html_url": "https:\/\/github.com\/piruprohacking",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/piruprohacking\/CVE-2020-25213",
"description": null,
"fork": false,
"created_at": "2021-04-03T13:52:21Z",
"updated_at": "2021-04-03T13:53:06Z",
"pushed_at": "2021-04-03T13:53:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 495906064,
"name": "CVE-2020-25213",
"full_name": "b1ackros337\/CVE-2020-25213",
"owner": {
"login": "b1ackros337",
"id": 106174449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106174449?v=4",
"html_url": "https:\/\/github.com\/b1ackros337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/b1ackros337\/CVE-2020-25213",
"description": null,
"fork": false,
"created_at": "2022-05-24T16:35:23Z",
"updated_at": "2022-07-09T13:27:09Z",
"pushed_at": "2022-07-09T13:47:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 592012076,
"name": "Python-exploit-CVE-2020-25213",
"full_name": "BLY-Coder\/Python-exploit-CVE-2020-25213",
"owner": {
"login": "BLY-Coder",
"id": 63339164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63339164?v=4",
"html_url": "https:\/\/github.com\/BLY-Coder",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BLY-Coder\/Python-exploit-CVE-2020-25213",
"description": "Python exploit for RCE in Wordpress",
"fork": false,
"created_at": "2023-01-22T16:54:25Z",
"updated_at": "2024-08-12T20:29:26Z",
"pushed_at": "2023-03-13T13:32:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 673716937,
"name": "Python-CVE-2020-25213",
"full_name": "E1tex\/Python-CVE-2020-25213",
"owner": {
"login": "E1tex",
"id": 134239936,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134239936?v=4",
"html_url": "https:\/\/github.com\/E1tex",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/E1tex\/Python-CVE-2020-25213",
"description": "Python Interactive Exploit for WP File Manager Vulnerability. The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension.",
"fork": false,
"created_at": "2023-08-02T09:06:13Z",
"updated_at": "2024-11-08T04:40:46Z",
"pushed_at": "2023-08-02T10:41:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 728154421,
"name": "CVE-2020-25213",
"full_name": "Nguyen-id\/CVE-2020-25213",
"owner": {
"login": "Nguyen-id",
"id": 145361899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145361899?v=4",
"html_url": "https:\/\/github.com\/Nguyen-id",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nguyen-id\/CVE-2020-25213",
"description": null,
"fork": false,
"created_at": "2023-12-06T10:47:11Z",
"updated_at": "2023-12-06T10:47:54Z",
"pushed_at": "2023-12-06T10:47:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]