There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Automate-Telegram
Simple python program to execute terminal commands on telegram chats directly.Your-First-Contribution
You may learn how to make successful pull requests and get your first valid open source contribution by using this repository.30-Days-of-PHP-source-code-analysis
30 Days of PHP source code analysisPassEnum
Enumerate most common password patterns with custom keyword.Udemy-Auto-Enroller
Input list of udemy free courses and let python enroll it for you.OSCP-Like-Machines
https://blog.veshraj.info.np/CVE-2022-1597
The plugin, used as a companion for the Discy and Himer themes, does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacksPort-Scanner
Simple Port Scanner By newbie :)SocialTimeOut
Have a break from social lifeveshraj.github.io
AssignmentsPhpLearning
VeshSite
CVE-2022-1051
WPQA < 5.2 - Subscriber+ Stored Cross-Site Scripting via Profile fieldsCVE-2021-24545
The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.C-Programming-Tutorials
CVE-2022-1598
WPQA < 5.5 - Unauthenticated Private Message DisclosureSATechnicalOnboarding
V35HR4J
Hi, nice to see you here!RandomAPIs
reviewing-a-pull-request
CVE-2021-24563
The plugin does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directlySearchor-2.4.1-RCE
searchor is a โก๏ธ Quick and easy search engine queries. Affected versions of this package are vulnerable to Arbitrary Code Execution due to unsafe implementation of eval method.Love Open Source and this site? Check out how you can help us