PoC-in-GitHub/2016/CVE-2016-0792.json

48 lines
1.7 KiB
JSON
Raw Normal View History

2019-12-08 22:19:20 +09:00
[
{
"id": 98817608,
"name": "jenkins-cve-2016-0792",
"full_name": "jpiechowka\/jenkins-cve-2016-0792",
"owner": {
"login": "jpiechowka",
"id": 9040085,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9040085?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/jpiechowka"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/jpiechowka\/jenkins-cve-2016-0792",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2017-07-30T18:39:24Z",
2020-06-06 12:07:51 +09:00
"updated_at": "2020-06-06T02:39:35Z",
2019-12-08 22:19:20 +09:00
"pushed_at": "2017-08-02T23:51:34Z",
2020-06-06 12:07:51 +09:00
"stargazers_count": 42,
"watchers_count": 42,
2020-07-03 12:08:02 +09:00
"forks_count": 21,
"forks": 21,
2020-06-06 12:07:51 +09:00
"watchers": 42,
2019-12-10 00:05:38 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
},
{
"id": 125023802,
"name": "java-deserialization-exploits",
"full_name": "s0wr0b1ndef\/java-deserialization-exploits",
"owner": {
"login": "s0wr0b1ndef",
"id": 37288034,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
2019-12-08 22:19:20 +09:00
},
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/java-deserialization-exploits",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2018-03-13T09:15:32Z",
2020-03-19 18:07:18 +09:00
"updated_at": "2020-03-19T09:03:08Z",
2019-12-08 22:19:20 +09:00
"pushed_at": "2018-03-13T09:15:59Z",
2020-03-19 18:07:18 +09:00
"stargazers_count": 6,
"watchers_count": 6,
2020-03-11 00:07:54 +09:00
"forks_count": 11,
"forks": 11,
2020-03-19 18:07:18 +09:00
"watchers": 6,
2019-12-10 00:05:38 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
}
]