PoC-in-GitHub/2020/CVE-2020-35489.json
2022-04-02 15:14:39 +09:00

62 lines
No EOL
2 KiB
JSON

[
{
"id": 324114493,
"name": "Check-WP-CVE-2020-35489",
"full_name": "dn9uy3n\/Check-WP-CVE-2020-35489",
"owner": {
"login": "dn9uy3n",
"id": 21336403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21336403?v=4",
"html_url": "https:\/\/github.com\/dn9uy3n"
},
"html_url": "https:\/\/github.com\/dn9uy3n\/Check-WP-CVE-2020-35489",
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
"fork": false,
"created_at": "2020-12-24T09:10:17Z",
"updated_at": "2022-03-17T18:17:46Z",
"pushed_at": "2020-12-25T09:51:37Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
"contact-form-7",
"cve-2020-35489",
"unrestricted-file-upload",
"vulnerability-detection",
"wordpress-plugin"
],
"visibility": "public",
"forks": 10,
"watchers": 10,
"score": 0
},
{
"id": 360400196,
"name": "Check-WP-CVE-2020-35489",
"full_name": "X0UCYB3R\/Check-WP-CVE-2020-35489",
"owner": {
"login": "X0UCYB3R",
"id": 82994877,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82994877?v=4",
"html_url": "https:\/\/github.com\/X0UCYB3R"
},
"html_url": "https:\/\/github.com\/X0UCYB3R\/Check-WP-CVE-2020-35489",
"description": null,
"fork": false,
"created_at": "2021-04-22T05:17:16Z",
"updated_at": "2021-10-23T19:26:26Z",
"pushed_at": "2021-04-22T05:17:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]