mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-27 14:45:33 +01:00
33 lines
No EOL
1.3 KiB
JSON
33 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 974750424,
|
|
"name": "CVE-2025-26014",
|
|
"full_name": "vigilante-1337\/CVE-2025-26014",
|
|
"owner": {
|
|
"login": "vigilante-1337",
|
|
"id": 208334620,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208334620?v=4",
|
|
"html_url": "https:\/\/github.com\/vigilante-1337",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/vigilante-1337\/CVE-2025-26014",
|
|
"description": "A Remote Code Execution (RCE) vulnerability in Loggrove v.1.0 allows a remote attacker to execute arbitrary code via the path parameter. The manipulation of the argument path from read.py file leads to os command injection. The attack can be launched remotely. ",
|
|
"fork": false,
|
|
"created_at": "2025-04-29T08:50:56Z",
|
|
"updated_at": "2025-04-29T09:19:22Z",
|
|
"pushed_at": "2025-04-29T09:19:19Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |