[ { "id": 163585014, "name": "CVE-2009-1330", "full_name": "adenkiewicz\/CVE-2009-1330", "owner": { "login": "adenkiewicz", "id": 1060275, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", "html_url": "https:\/\/github.com\/adenkiewicz" }, "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2009-1330", "description": "Simple exploit for Easy RM to MP3 Converter 2.7.3.700 on Windows 7 32b.", "fork": false, "created_at": "2018-12-30T12:17:08Z", "updated_at": "2018-12-31T10:09:34Z", "pushed_at": "2018-12-31T09:59:17Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 164236833, "name": "CVE-2009-1330", "full_name": "war4uthor\/CVE-2009-1330", "owner": { "login": "war4uthor", "id": 45926018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4", "html_url": "https:\/\/github.com\/war4uthor" }, "html_url": "https:\/\/github.com\/war4uthor\/CVE-2009-1330", "description": "CVE-2009-1330 - Easy RM to MP3 Converter Local Buffer Overflow. Tested on Windows XP Professional SP3", "fork": false, "created_at": "2019-01-05T17:32:00Z", "updated_at": "2019-01-06T12:29:19Z", "pushed_at": "2019-01-06T12:29:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 171340357, "name": "CVE-2009-1330_EasyRMToMp3Converter", "full_name": "exploitwritter\/CVE-2009-1330_EasyRMToMp3Converter", "owner": { "login": "exploitwritter", "id": 47488127, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47488127?v=4", "html_url": "https:\/\/github.com\/exploitwritter" }, "html_url": "https:\/\/github.com\/exploitwritter\/CVE-2009-1330_EasyRMToMp3Converter", "description": "Easy RM to MP3 Converter es un software que sufre de una vulnerabiliad de desbordamiento de buffer basada en la pila o StackBufferOverflow lo cual puede permite a los atacantes remotos ejecutar código arbitrario a través de un nombre de archivo largo en un archivo de lista de reproducción (.pls)", "fork": false, "created_at": "2019-02-18T19:07:02Z", "updated_at": "2019-02-28T20:19:32Z", "pushed_at": "2019-02-28T20:19:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]