mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
29 lines
No EOL
1.2 KiB
JSON
29 lines
No EOL
1.2 KiB
JSON
[
|
||
{
|
||
"id": 471389764,
|
||
"name": "CVE-2021-45010-TinyFileManager-Exploit",
|
||
"full_name": "febinrev\/CVE-2021-45010-TinyFileManager-Exploit",
|
||
"owner": {
|
||
"login": "febinrev",
|
||
"id": 52229330,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
|
||
"html_url": "https:\/\/github.com\/febinrev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/febinrev\/CVE-2021-45010-TinyFileManager-Exploit",
|
||
"description": "A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project’s Tiny File Manager <= 2.4.3 allows remote attackers with valid user accounts to upload malicious PHP files to the webroot and achieve code execution on the target server.",
|
||
"fork": false,
|
||
"created_at": "2022-03-18T14:00:03Z",
|
||
"updated_at": "2022-03-18T18:35:40Z",
|
||
"pushed_at": "2022-03-18T18:35:38Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |