mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-02-14 18:25:28 +01:00
31 lines
No EOL
1.3 KiB
JSON
31 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 583055346,
|
|
"name": "CVE-2020-28884",
|
|
"full_name": "Live-Hack-CVE\/CVE-2020-28884",
|
|
"owner": {
|
|
"login": "Live-Hack-CVE",
|
|
"id": 121191732,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-28884",
|
|
"description": "** DISPUTED ** Liferay Portal Server tested on 7.3.5 GA6, 7.2.0 GA1 is affected by OS Command Injection. An administrator user can inject Groovy script to execute any OS command on the Liferay Portal Sever. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to run groovy scrip CVE project by @Sn0wAlice",
|
|
"fork": false,
|
|
"created_at": "2022-12-28T16:21:06Z",
|
|
"updated_at": "2022-12-28T16:21:06Z",
|
|
"pushed_at": "2022-12-28T16:21:08Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |