mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
25 lines
No EOL
1.1 KiB
JSON
25 lines
No EOL
1.1 KiB
JSON
[
|
|
{
|
|
"id": 160734988,
|
|
"name": "CVE-2018-8823",
|
|
"full_name": "b3rksecurity\/CVE-2018-8823",
|
|
"owner": {
|
|
"login": "b3rksecurity",
|
|
"id": 44809204,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/44809204?v=4",
|
|
"html_url": "https:\/\/github.com\/b3rksecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/b3rksecurity\/CVE-2018-8823",
|
|
"description": "Script coded by b3rksecurity for script kiddies who want a good PHP script for the auto-exploitation of the bamegamenu Remote Code Execution (+Zone H auto notification) What is remote code execution ? >> https:\/\/www.owasp.org\/index.php\/Code_Injection. The vulnerability issued on the GET method. Vuln path: \/modules\/bamegamenu\/ajax_phpcode.php?code=inject_your_php_code",
|
|
"fork": false,
|
|
"created_at": "2018-12-06T21:33:57Z",
|
|
"updated_at": "2019-06-10T13:21:24Z",
|
|
"pushed_at": "2018-12-06T21:45:38Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0
|
|
}
|
|
] |