mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
94 lines
No EOL
3.3 KiB
JSON
94 lines
No EOL
3.3 KiB
JSON
[
|
|
{
|
|
"id": 153072697,
|
|
"name": "PIL-RCE-Ghostscript-CVE-2018-16509",
|
|
"full_name": "farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
|
"owner": {
|
|
"login": "farisv",
|
|
"id": 44131180,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44131180?v=4",
|
|
"html_url": "https:\/\/github.com\/farisv"
|
|
},
|
|
"html_url": "https:\/\/github.com\/farisv\/PIL-RCE-Ghostscript-CVE-2018-16509",
|
|
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
|
|
"fork": false,
|
|
"created_at": "2018-10-15T07:44:43Z",
|
|
"updated_at": "2020-11-07T05:36:37Z",
|
|
"pushed_at": "2021-01-06T01:11:32Z",
|
|
"stargazers_count": 19,
|
|
"watchers_count": 19,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 19,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 157982249,
|
|
"name": "CVE-2018-16509",
|
|
"full_name": "knqyf263\/CVE-2018-16509",
|
|
"owner": {
|
|
"login": "knqyf263",
|
|
"id": 2253692,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
|
"html_url": "https:\/\/github.com\/knqyf263"
|
|
},
|
|
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-16509",
|
|
"description": "CVE-2018-16509 (Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities)",
|
|
"fork": false,
|
|
"created_at": "2018-11-17T12:26:38Z",
|
|
"updated_at": "2020-05-07T13:31:56Z",
|
|
"pushed_at": "2019-02-01T05:14:34Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 165319040,
|
|
"name": "cve-2018-16509",
|
|
"full_name": "cved-sources\/cve-2018-16509",
|
|
"owner": {
|
|
"login": "cved-sources",
|
|
"id": 46423677,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
|
|
"html_url": "https:\/\/github.com\/cved-sources"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cved-sources\/cve-2018-16509",
|
|
"description": "cve-2018-16509",
|
|
"fork": false,
|
|
"created_at": "2019-01-11T22:19:46Z",
|
|
"updated_at": "2019-01-11T22:20:11Z",
|
|
"pushed_at": "2019-01-11T22:20:10Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 200477390,
|
|
"name": "CVE-2018-16509",
|
|
"full_name": "rhpco\/CVE-2018-16509",
|
|
"owner": {
|
|
"login": "rhpco",
|
|
"id": 6824466,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6824466?v=4",
|
|
"html_url": "https:\/\/github.com\/rhpco"
|
|
},
|
|
"html_url": "https:\/\/github.com\/rhpco\/CVE-2018-16509",
|
|
"description": "CVE-2018-16509 Docker Playground - Ghostscript command execution",
|
|
"fork": false,
|
|
"created_at": "2019-08-04T10:09:31Z",
|
|
"updated_at": "2019-08-04T10:16:52Z",
|
|
"pushed_at": "2019-08-04T10:14:27Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |