PoC-in-GitHub/2016/CVE-2016-0792.json

96 lines
3.2 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 98817608,
"name": "jenkins-cve-2016-0792",
"full_name": "jpiechowka\/jenkins-cve-2016-0792",
"owner": {
"login": "jpiechowka",
"id": 9040085,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9040085?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/jpiechowka"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/jpiechowka\/jenkins-cve-2016-0792",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2017-07-30T18:39:24Z",
2022-06-25 08:16:26 +02:00
"updated_at": "2022-06-25T01:31:15Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2017-08-02T23:51:34Z",
2022-06-25 08:16:26 +02:00
"stargazers_count": 50,
"watchers_count": 50,
2022-04-24 20:15:49 +02:00
"forks_count": 22,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [
"cve",
"cve-2016-0792",
"deserialization",
"exploit",
"jenkins-serialization-vulnerability",
"python",
"serialization",
"vulnerability",
"vulnerability-detection"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-04-24 20:15:49 +02:00
"forks": 22,
2022-06-25 08:16:26 +02:00
"watchers": 50,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 125023802,
"name": "java-deserialization-exploits",
2022-01-03 07:13:34 +01:00
"full_name": "R0B1NL1N\/java-deserialization-exploits",
2019-12-08 14:19:20 +01:00
"owner": {
2022-01-03 07:13:34 +01:00
"login": "R0B1NL1N",
2019-12-08 14:19:20 +01:00
"id": 37288034,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37288034?v=4",
2022-01-03 07:13:34 +01:00
"html_url": "https:\/\/github.com\/R0B1NL1N"
2019-12-08 14:19:20 +01:00
},
2022-01-03 07:13:34 +01:00
"html_url": "https:\/\/github.com\/R0B1NL1N\/java-deserialization-exploits",
2019-12-08 14:19:20 +01:00
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2018-03-13T09:15:32Z",
2022-08-26 02:18:16 +02:00
"updated_at": "2022-08-25T21:33:41Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2018-03-13T09:15:59Z",
2022-08-26 02:18:16 +02:00
"stargazers_count": 10,
"watchers_count": 10,
2021-05-19 17:11:55 +02:00
"forks_count": 12,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-05-19 17:11:55 +02:00
"forks": 12,
2022-08-26 02:18:16 +02:00
"watchers": 10,
2019-12-09 16:05:38 +01:00
"score": 0
2021-09-07 17:13:16 +02:00
},
{
"id": 403984253,
"name": "CVE-2016-0792",
"full_name": "Aviksaikat\/CVE-2016-0792",
"owner": {
"login": "Aviksaikat",
"id": 31238298,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4",
"html_url": "https:\/\/github.com\/Aviksaikat"
},
"html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2016-0792",
"description": "Modified Verion of CVE-2016-0792",
"fork": false,
"created_at": "2021-09-07T13:14:16Z",
"updated_at": "2021-09-07T13:57:10Z",
"pushed_at": "2021-09-07T13:57:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-07 17:13:16 +02:00
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 14:19:20 +01:00
}
]