PoC-in-GitHub/2018/CVE-2018-8823.json
2019-12-12 14:14:27 +09:00

25 lines
No EOL
1.1 KiB
JSON

[
{
"id": 160734988,
"name": "CVE-2018-8823",
"full_name": "b3rksecurity\/CVE-2018-8823",
"owner": {
"login": "b3rksecurity",
"id": 44809204,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/44809204?v=4",
"html_url": "https:\/\/github.com\/b3rksecurity"
},
"html_url": "https:\/\/github.com\/b3rksecurity\/CVE-2018-8823",
"description": "Script coded by b3rksecurity for script kiddies who want a good PHP script for the auto-exploitation of the bamegamenu Remote Code Execution (+Zone H auto notification) What is remote code execution ? >> https:\/\/www.owasp.org\/index.php\/Code_Injection. The vulnerability issued on the GET method. Vuln path: \/modules\/bamegamenu\/ajax_phpcode.php?code=inject_your_php_code",
"fork": false,
"created_at": "2018-12-06T21:33:57Z",
"updated_at": "2019-06-10T13:21:24Z",
"pushed_at": "2018-12-06T21:45:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
}
]