mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
33 lines
No EOL
1.3 KiB
JSON
33 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 331173610,
|
|
"name": "cve-2021-3164",
|
|
"full_name": "rmccarth\/cve-2021-3164",
|
|
"owner": {
|
|
"login": "rmccarth",
|
|
"id": 36937649,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36937649?v=4",
|
|
"html_url": "https:\/\/github.com\/rmccarth",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/rmccarth\/cve-2021-3164",
|
|
"description": "Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file. The application is written primarily with PHP so we use PHP in our PoC ",
|
|
"fork": false,
|
|
"created_at": "2021-01-20T02:48:46Z",
|
|
"updated_at": "2021-10-16T06:43:27Z",
|
|
"pushed_at": "2021-01-20T02:49:27Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
}
|
|
] |