PoC-in-GitHub/2021/CVE-2021-32157.json
2023-08-13 15:25:24 +09:00

62 lines
No EOL
2.2 KiB
JSON

[
{
"id": 361309279,
"name": "CVE-2021-32157",
"full_name": "Mesh3l911\/CVE-2021-32157",
"owner": {
"login": "Mesh3l911",
"id": 74990355,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
"html_url": "https:\/\/github.com\/Mesh3l911"
},
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-32157",
"description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's Scheduled Cron Jobs feature",
"fork": false,
"created_at": "2021-04-25T02:08:34Z",
"updated_at": "2022-04-06T22:12:02Z",
"pushed_at": "2021-04-26T01:46:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 485596660,
"name": "CVE-2021-32157",
"full_name": "dnr6419\/CVE-2021-32157",
"owner": {
"login": "dnr6419",
"id": 43310843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43310843?v=4",
"html_url": "https:\/\/github.com\/dnr6419"
},
"html_url": "https:\/\/github.com\/dnr6419\/CVE-2021-32157",
"description": "Make it possible to build a vulnerable webmin virtual environment as a container using docker",
"fork": false,
"created_at": "2022-04-26T01:49:11Z",
"updated_at": "2022-04-26T06:43:32Z",
"pushed_at": "2022-04-26T02:03:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]