PoC-in-GitHub/2021/CVE-2021-31800.json
2024-10-30 03:31:51 +09:00

72 lines
No EOL
2.4 KiB
JSON

[
{
"id": 529954227,
"name": "CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
"full_name": "p0dalirius\/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
"owner": {
"login": "p0dalirius",
"id": 79218792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
"html_url": "https:\/\/github.com\/p0dalirius",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
"description": "A path traversal in smbserver.py allows an attacker to read\/write arbitrary files on the server.",
"fork": false,
"created_at": "2022-08-28T19:04:46Z",
"updated_at": "2024-07-05T16:19:36Z",
"pushed_at": "2023-01-19T11:06:33Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"arbitrary",
"cve-2021-31800",
"file",
"impacket",
"read",
"smbserver",
"write"
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 531854393,
"name": "CVE-2021-31800",
"full_name": "Louzogh\/CVE-2021-31800",
"owner": {
"login": "Louzogh",
"id": 38815386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38815386?v=4",
"html_url": "https:\/\/github.com\/Louzogh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Louzogh\/CVE-2021-31800",
"description": "CVE-2021-31800 POC",
"fork": false,
"created_at": "2022-09-02T09:02:19Z",
"updated_at": "2022-11-10T01:00:33Z",
"pushed_at": "2022-09-02T10:27:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]