[
    {
        "id": 734620925,
        "name": "deepin-linux_reader_RCE-exploit",
        "full_name": "febinrev\/deepin-linux_reader_RCE-exploit",
        "owner": {
            "login": "febinrev",
            "id": 52229330,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
            "html_url": "https:\/\/github.com\/febinrev",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/febinrev\/deepin-linux_reader_RCE-exploit",
        "description": "CVE-2023-50254: PoC Exploit for Deepin-reader RCE that affects unpatched Deepin Linux Desktops. Deepin Linux's default document reader \"deepin-reader\" software suffers from a serious vulnerability due to a design flaw that leads to Remote Command Execution via crafted docx document.",
        "fork": false,
        "created_at": "2023-12-22T06:50:28Z",
        "updated_at": "2024-11-15T17:03:30Z",
        "pushed_at": "2023-12-22T06:59:34Z",
        "stargazers_count": 14,
        "watchers_count": 14,
        "has_discussions": false,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 3,
        "watchers": 14,
        "score": 0,
        "subscribers_count": 4
    }
]