[ { "id": 734620925, "name": "deepin-linux_reader_RCE-exploit", "full_name": "febinrev\/deepin-linux_reader_RCE-exploit", "owner": { "login": "febinrev", "id": 52229330, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4", "html_url": "https:\/\/github.com\/febinrev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/febinrev\/deepin-linux_reader_RCE-exploit", "description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.", "fork": false, "created_at": "2023-12-22T06:50:28Z", "updated_at": "2024-11-15T17:03:30Z", "pushed_at": "2023-12-22T06:59:34Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 14, "score": 0, "subscribers_count": 4 } ]