mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
102 lines
No EOL
3.4 KiB
JSON
102 lines
No EOL
3.4 KiB
JSON
[
|
|
{
|
|
"id": 324114493,
|
|
"name": "Check-WP-CVE-2020-35489",
|
|
"full_name": "dn9uy3n\/Check-WP-CVE-2020-35489",
|
|
"owner": {
|
|
"login": "dn9uy3n",
|
|
"id": 21336403,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21336403?v=4",
|
|
"html_url": "https:\/\/github.com\/dn9uy3n"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dn9uy3n\/Check-WP-CVE-2020-35489",
|
|
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
|
|
"fork": false,
|
|
"created_at": "2020-12-24T09:10:17Z",
|
|
"updated_at": "2023-09-16T21:40:41Z",
|
|
"pushed_at": "2020-12-25T09:51:37Z",
|
|
"stargazers_count": 23,
|
|
"watchers_count": 23,
|
|
"has_discussions": false,
|
|
"forks_count": 16,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"contact-form-7",
|
|
"cve-2020-35489",
|
|
"unrestricted-file-upload",
|
|
"vulnerability-detection",
|
|
"wordpress-plugin"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 16,
|
|
"watchers": 23,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 360400196,
|
|
"name": "Check-WP-CVE-2020-35489",
|
|
"full_name": "X0UCYB3R\/Check-WP-CVE-2020-35489",
|
|
"owner": {
|
|
"login": "X0UCYB3R",
|
|
"id": 82994877,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82994877?v=4",
|
|
"html_url": "https:\/\/github.com\/X0UCYB3R"
|
|
},
|
|
"html_url": "https:\/\/github.com\/X0UCYB3R\/Check-WP-CVE-2020-35489",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-04-22T05:17:16Z",
|
|
"updated_at": "2023-09-16T21:43:50Z",
|
|
"pushed_at": "2021-04-22T05:17:26Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 647539288,
|
|
"name": "wp_CVE-2020-35489_checker",
|
|
"full_name": "reneoliveirajr\/wp_CVE-2020-35489_checker",
|
|
"owner": {
|
|
"login": "reneoliveirajr",
|
|
"id": 74079397,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74079397?v=4",
|
|
"html_url": "https:\/\/github.com\/reneoliveirajr"
|
|
},
|
|
"html_url": "https:\/\/github.com\/reneoliveirajr\/wp_CVE-2020-35489_checker",
|
|
"description": "WordPress Sites Vulnerability Checker for CVE-2020-35489",
|
|
"fork": false,
|
|
"created_at": "2023-05-31T02:12:26Z",
|
|
"updated_at": "2023-07-30T15:56:56Z",
|
|
"pushed_at": "2023-07-28T11:04:41Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"has_discussions": true,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-35489",
|
|
"python",
|
|
"wordpress"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 8,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |