PoC-in-GitHub/2012/CVE-2012-5519.json

38 lines
1.1 KiB
JSON
Raw Normal View History

2022-01-12 03:15:08 +09:00
[
{
"id": 445570015,
"name": "CVE-2012-5519",
2022-06-30 21:25:04 +09:00
"full_name": "p1ckzi\/CVE-2012-5519",
2022-01-12 03:15:08 +09:00
"owner": {
2022-06-30 21:25:04 +09:00
"login": "p1ckzi",
2022-01-12 03:15:08 +09:00
"id": 44880203,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44880203?v=4",
2022-06-30 21:25:04 +09:00
"html_url": "https:\/\/github.com\/p1ckzi"
2022-01-12 03:15:08 +09:00
},
2022-06-30 21:25:04 +09:00
"html_url": "https:\/\/github.com\/p1ckzi\/CVE-2012-5519",
2022-01-12 03:15:08 +09:00
"description": "cups-root-file-read.sh | CVE-2012-5519",
"fork": false,
"created_at": "2022-01-07T15:39:47Z",
2022-02-22 15:15:01 +09:00
"updated_at": "2022-02-22T03:01:29Z",
2022-06-30 21:25:04 +09:00
"pushed_at": "2022-06-30T10:54:51Z",
2022-02-22 15:15:01 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2022-08-13 15:16:45 +09:00
"forks_count": 1,
2022-01-12 03:15:08 +09:00
"allow_forking": true,
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2022-01-12 03:15:08 +09:00
"topics": [
"cups-root-file-read",
"cve",
"cve-2012-5519",
"cves",
"exploit",
"hacking",
"pentesting-tools"
],
"visibility": "public",
2022-08-13 15:16:45 +09:00
"forks": 1,
2022-02-22 15:15:01 +09:00
"watchers": 2,
2022-01-12 03:15:08 +09:00
"score": 0
}
]