mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-19 06:12:22 +01:00
25 lines
No EOL
1.1 KiB
JSON
25 lines
No EOL
1.1 KiB
JSON
[
|
||
{
|
||
"id": 313538484,
|
||
"name": "CVE-2020-8209",
|
||
"full_name": "B1anda0\/CVE-2020-8209",
|
||
"owner": {
|
||
"login": "B1anda0",
|
||
"id": 74232513,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/74232513?v=4",
|
||
"html_url": "https:\/\/github.com\/B1anda0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2020-8209",
|
||
"description": "RP2之前的Citrix XenMobile Server 10.12,RP4之前的Citrix XenMobile Server 10.11,RP6之前的Citrix XenMobile Server 10.10和Citrix XenMobile Server 10.9 RP5之前的访问控制不当,从而导致能够读取任意文件。该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。",
|
||
"fork": false,
|
||
"created_at": "2020-11-17T07:20:46Z",
|
||
"updated_at": "2020-11-17T08:33:44Z",
|
||
"pushed_at": "2020-11-17T07:41:42Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
}
|
||
] |