[ { "id": 380672428, "name": "pyyaml-CVE-2020-14343", "full_name": "raul23\/pyyaml-CVE-2020-14343", "owner": { "login": "raul23", "id": 9953156, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9953156?v=4", "html_url": "https:\/\/github.com\/raul23" }, "html_url": "https:\/\/github.com\/raul23\/pyyaml-CVE-2020-14343", "description": "Experimenting with the CVE-2020-14343 PyYAML vulnerability", "fork": false, "created_at": "2021-06-27T06:56:15Z", "updated_at": "2021-09-19T03:47:38Z", "pushed_at": "2021-09-19T03:47:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "poc", "proof-of-concept", "pyyaml", "vulnerability" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 483062171, "name": "loader-CVE-2020-14343", "full_name": "j4k0m\/loader-CVE-2020-14343", "owner": { "login": "j4k0m", "id": 48088579, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4", "html_url": "https:\/\/github.com\/j4k0m" }, "html_url": "https:\/\/github.com\/j4k0m\/loader-CVE-2020-14343", "description": "A web application vulnerable to CVE-2020-14343 insecure deserialization leading to command execution in PyYAML package.", "fork": false, "created_at": "2022-04-19T02:06:41Z", "updated_at": "2022-04-19T15:07:12Z", "pushed_at": "2022-04-19T02:09:57Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 } ]