PoC-in-GitHub/2013/CVE-2013-225.json

32 lines
1.1 KiB
JSON
Raw Normal View History

2023-01-07 09:35:14 +09:00
[
{
2023-03-25 15:28:16 +09:00
"id": 96312550,
2023-01-07 09:35:14 +09:00
"name": "ShellEvil",
2023-03-25 15:28:16 +09:00
"full_name": "PentestinGxRoot\/ShellEvil",
2023-01-07 09:35:14 +09:00
"owner": {
2023-03-25 15:28:16 +09:00
"login": "PentestinGxRoot",
"id": 22859215,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22859215?v=4",
"html_url": "https:\/\/github.com\/PentestinGxRoot"
2023-01-07 09:35:14 +09:00
},
2023-03-25 15:28:16 +09:00
"html_url": "https:\/\/github.com\/PentestinGxRoot\/ShellEvil",
2023-01-07 09:35:14 +09:00
"description": "Struts 2 DefaultActionMapper Interactive Shell Exploit for CVE-2013-225 [S2-016]",
"fork": false,
2023-03-25 15:28:16 +09:00
"created_at": "2017-07-05T11:36:06Z",
"updated_at": "2017-07-05T11:36:08Z",
"pushed_at": "2017-07-05T06:50:08Z",
"stargazers_count": 0,
"watchers_count": 0,
2023-01-07 09:35:14 +09:00
"has_discussions": false,
2023-06-06 09:34:36 +09:00
"forks_count": 10,
2023-01-07 09:35:14 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-06-06 09:34:36 +09:00
"forks": 10,
2023-03-25 15:28:16 +09:00
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-01-07 09:35:14 +09:00
}
]