There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Automate-Telegram
Simple python program to execute terminal commands on telegram chats directly.Your-First-Contribution
You may learn how to make successful pull requests and get your first valid open source contribution by using this repository.Dutch-Government-Scopes
https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd30-Days-of-PHP-source-code-analysis
30 Days of PHP source code analysisPassEnum
Enumerate most common password patterns with custom keyword.Udemy-Auto-Enroller
Input list of udemy free courses and let python enroll it for you.OSCP-Like-Machines
https://blog.veshraj.info.np/Port-Scanner
Simple Port Scanner By newbie :)CVE-2022-1597
The plugin, used as a companion for the Discy and Himer themes, does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacksveshraj.github.io
AssignmentsPhpLearning
SocialTimeOut
Have a break from social lifeVeshSite
CVE-2022-1051
WPQA < 5.2 - Subscriber+ Stored Cross-Site Scripting via Profile fieldsCVE-2021-24545
The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.C-Programming-Tutorials
CVE-2022-1598
WPQA < 5.5 - Unauthenticated Private Message DisclosureSATechnicalOnboarding
V35HR4J
Hi, nice to see you here!reviewing-a-pull-request
RandomAPIs
CVE-2021-24563
The plugin does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directlyLove Open Source and this site? Check out how you can help us