PoC-in-GitHub/2021/CVE-2021-36711.json
2022-08-09 21:18:02 +09:00

42 lines
No EOL
1.4 KiB
JSON

[
{
"id": 406167128,
"name": "Sashimi-Evil-OctoBot-Tentacle",
"full_name": "Nwqda\/Sashimi-Evil-OctoBot-Tentacle",
"owner": {
"login": "Nwqda",
"id": 89986678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89986678?v=4",
"html_url": "https:\/\/github.com\/Nwqda"
},
"html_url": "https:\/\/github.com\/Nwqda\/Sashimi-Evil-OctoBot-Tentacle",
"description": "CVE-2021-36711 - Script PoC that exploits the Tentacles upload functionality of OctoBot trading bot and which leads to a remote code execution (RCE).",
"fork": false,
"created_at": "2021-09-14T00:10:30Z",
"updated_at": "2022-08-09T10:03:25Z",
"pushed_at": "2022-07-09T05:48:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cryptobot",
"cryptocurrency",
"infosec",
"octobot",
"payloads",
"poc",
"rce",
"remote-code-execution",
"tentacles",
"trading-bot",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
}
]