mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-27 06:35:33 +01:00
33 lines
No EOL
1.3 KiB
JSON
33 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 1108120583,
|
|
"name": "CVE-2025-65321",
|
|
"full_name": "Smarttfoxx\/CVE-2025-65321",
|
|
"owner": {
|
|
"login": "Smarttfoxx",
|
|
"id": 140526026,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140526026?v=4",
|
|
"html_url": "https:\/\/github.com\/Smarttfoxx",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Smarttfoxx\/CVE-2025-65321",
|
|
"description": "Language Sloth Sloth Bot 1.0 is vulnerable to Directory Traversal in the gif() and png() functions. The functions build file paths using unsanitized user input for the 'name' parameter, allowing attackers to reference files outside the intended resource directories.",
|
|
"fork": false,
|
|
"created_at": "2025-12-02T03:43:21Z",
|
|
"updated_at": "2025-12-02T20:56:56Z",
|
|
"pushed_at": "2025-12-02T03:55:36Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |