2023-01-02 21:13:52 +09:00
|
|
|
[
|
|
|
|
{
|
|
|
|
"id": 226651675,
|
|
|
|
"name": "CVE-2019-19634",
|
|
|
|
"full_name": "jra89\/CVE-2019-19634",
|
|
|
|
"owner": {
|
|
|
|
"login": "jra89",
|
|
|
|
"id": 2511696,
|
|
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4",
|
2024-10-18 09:30:24 +09:00
|
|
|
"html_url": "https:\/\/github.com\/jra89",
|
|
|
|
"user_view_type": "public"
|
2023-01-02 21:13:52 +09:00
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/jra89\/CVE-2019-19634",
|
|
|
|
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2019-12-08T10:44:51Z",
|
2024-08-13 09:29:46 +09:00
|
|
|
"updated_at": "2024-08-12T19:55:33Z",
|
2023-01-02 21:13:52 +09:00
|
|
|
"pushed_at": "2019-12-08T17:55:01Z",
|
2024-08-13 09:29:46 +09:00
|
|
|
"stargazers_count": 36,
|
|
|
|
"watchers_count": 36,
|
2023-01-02 21:13:52 +09:00
|
|
|
"has_discussions": false,
|
|
|
|
"forks_count": 10,
|
|
|
|
"allow_forking": true,
|
|
|
|
"is_template": false,
|
|
|
|
"web_commit_signoff_required": false,
|
|
|
|
"topics": [],
|
|
|
|
"visibility": "public",
|
|
|
|
"forks": 10,
|
2024-08-13 09:29:46 +09:00
|
|
|
"watchers": 36,
|
2023-06-19 22:46:37 +09:00
|
|
|
"score": 0,
|
|
|
|
"subscribers_count": 1
|
2023-01-02 21:13:52 +09:00
|
|
|
}
|
|
|
|
]
|