mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-09-21 08:35:18 +02:00
33 lines
No EOL
1.3 KiB
JSON
33 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 1049015520,
|
|
"name": "Webapp_Pentast",
|
|
"full_name": "amhar-hckr\/Webapp_Pentast",
|
|
"owner": {
|
|
"login": "amhar-hckr",
|
|
"id": 52594609,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52594609?v=4",
|
|
"html_url": "https:\/\/github.com\/amhar-hckr",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/amhar-hckr\/Webapp_Pentast",
|
|
"description": "CVE-2022-31147 is a path traversal flaw in matthiasmullie\/minify. This guide helps security teams test for arbitrary file read on Linux and Windows using Python and curl. It covers automated payload generation, manual validation, and safe practices for vulnerability assessment.",
|
|
"fork": false,
|
|
"created_at": "2025-09-02T11:11:47Z",
|
|
"updated_at": "2025-09-02T11:39:48Z",
|
|
"pushed_at": "2025-09-02T11:39:45Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |