PoC-in-GitHub/2021/CVE-2021-3164.json
2024-11-29 03:31:51 +09:00

33 lines
No EOL
1.3 KiB
JSON

[
{
"id": 331173610,
"name": "cve-2021-3164",
"full_name": "rmccarth\/cve-2021-3164",
"owner": {
"login": "rmccarth",
"id": 36937649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36937649?v=4",
"html_url": "https:\/\/github.com\/rmccarth",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rmccarth\/cve-2021-3164",
"description": "Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file. The application is written primarily with PHP so we use PHP in our PoC ",
"fork": false,
"created_at": "2021-01-20T02:48:46Z",
"updated_at": "2021-10-16T06:43:27Z",
"pushed_at": "2021-01-20T02:49:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}
]