mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
48 lines
No EOL
1.7 KiB
JSON
48 lines
No EOL
1.7 KiB
JSON
[
|
|
{
|
|
"id": 98817608,
|
|
"name": "jenkins-cve-2016-0792",
|
|
"full_name": "jpiechowka\/jenkins-cve-2016-0792",
|
|
"owner": {
|
|
"login": "jpiechowka",
|
|
"id": 9040085,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9040085?v=4",
|
|
"html_url": "https:\/\/github.com\/jpiechowka"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jpiechowka\/jenkins-cve-2016-0792",
|
|
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
|
|
"fork": false,
|
|
"created_at": "2017-07-30T18:39:24Z",
|
|
"updated_at": "2020-05-26T09:40:47Z",
|
|
"pushed_at": "2017-08-02T23:51:34Z",
|
|
"stargazers_count": 43,
|
|
"watchers_count": 43,
|
|
"forks_count": 20,
|
|
"forks": 20,
|
|
"watchers": 43,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 125023802,
|
|
"name": "java-deserialization-exploits",
|
|
"full_name": "s0wr0b1ndef\/java-deserialization-exploits",
|
|
"owner": {
|
|
"login": "s0wr0b1ndef",
|
|
"id": 37288034,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
|
|
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
|
|
},
|
|
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/java-deserialization-exploits",
|
|
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
|
|
"fork": false,
|
|
"created_at": "2018-03-13T09:15:32Z",
|
|
"updated_at": "2020-03-19T09:03:08Z",
|
|
"pushed_at": "2018-03-13T09:15:59Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 11,
|
|
"forks": 11,
|
|
"watchers": 6,
|
|
"score": 0
|
|
}
|
|
] |