PoC-in-GitHub/2016/CVE-2016-2569.json

36 lines
1.3 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 120128236,
"name": "CVE-2016-2569",
"full_name": "amit-raut\/CVE-2016-2569",
"owner": {
"login": "amit-raut",
"id": 12902959,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12902959?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/amit-raut"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/amit-raut\/CVE-2016-2569",
"description": "Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.",
"fork": false,
"created_at": "2018-02-03T20:47:08Z",
2020-07-06 05:08:04 +02:00
"updated_at": "2020-07-06T02:34:51Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2018-02-10T02:17:54Z",
2020-07-06 05:08:04 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2020-08-08 05:09:15 +02:00
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"assertion-failure",
"cve-2016-2569",
"dos",
"exploit-development",
"python-requests",
"squid-proxy"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2020-08-08 05:09:15 +02:00
"forks": 1,
2020-07-06 05:08:04 +02:00
"watchers": 2,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
}
]