PoC-in-GitHub/2021/CVE-2021-31800.json
2023-01-27 21:30:32 +09:00

68 lines
No EOL
2.3 KiB
JSON

[
{
"id": 529954227,
"name": "CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
"full_name": "p0dalirius\/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
"owner": {
"login": "p0dalirius",
"id": 79218792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
"html_url": "https:\/\/github.com\/p0dalirius"
},
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2021-31800-Impacket-SMB-Server-Arbitrary-file-read-write",
"description": "A path traversal in smbserver.py allows an attacker to read\/write arbitrary files on the server.",
"fork": false,
"created_at": "2022-08-28T19:04:46Z",
"updated_at": "2023-01-27T08:53:37Z",
"pushed_at": "2023-01-19T11:06:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"arbitrary",
"cve-2021-31800",
"file",
"impacket",
"read",
"smbserver",
"write"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 531854393,
"name": "CVE-2021-31800",
"full_name": "Louzogh\/CVE-2021-31800",
"owner": {
"login": "Louzogh",
"id": 38815386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38815386?v=4",
"html_url": "https:\/\/github.com\/Louzogh"
},
"html_url": "https:\/\/github.com\/Louzogh\/CVE-2021-31800",
"description": "CVE-2021-31800 POC",
"fork": false,
"created_at": "2022-09-02T09:02:19Z",
"updated_at": "2022-11-10T01:00:33Z",
"pushed_at": "2022-09-02T10:27:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]