PoC-in-GitHub/2017/CVE-2017-10271.json
2020-12-16 18:09:50 +09:00

646 lines
No EOL
24 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 115195951,
"name": "CVE-2017-10271",
"full_name": "1337g\/CVE-2017-10271",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271",
"description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)",
"fork": false,
"created_at": "2017-12-23T13:04:23Z",
"updated_at": "2020-09-01T16:02:59Z",
"pushed_at": "2017-12-23T13:12:06Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 26,
"forks": 26,
"watchers": 38,
"score": 0
},
{
"id": 115311346,
"name": "CVE-2017-10271",
"full_name": "s3xy\/CVE-2017-10271",
"owner": {
"login": "s3xy",
"id": 34327996,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34327996?v=4",
"html_url": "https:\/\/github.com\/s3xy"
},
"html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271",
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
"fork": false,
"created_at": "2017-12-25T06:11:54Z",
"updated_at": "2020-12-11T01:36:14Z",
"pushed_at": "2017-12-25T06:21:23Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 9,
"forks": 9,
"watchers": 24,
"score": 0
},
{
"id": 115339400,
"name": "PoCs-Weblogic_2017_10271",
"full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271",
"owner": {
"login": "ZH3FENG",
"id": 20502660,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20502660?v=4",
"html_url": "https:\/\/github.com\/ZH3FENG"
},
"html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271",
"description": "Simplified PoC for Weblogic-CVE-2017-10271",
"fork": false,
"created_at": "2017-12-25T13:18:45Z",
"updated_at": "2019-03-19T07:31:45Z",
"pushed_at": "2017-12-25T13:23:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 115571903,
"name": "CVE-2017-10271",
"full_name": "c0mmand3rOpSec\/CVE-2017-10271",
"owner": {
"login": "c0mmand3rOpSec",
"id": 17217255,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17217255?v=4",
"html_url": "https:\/\/github.com\/c0mmand3rOpSec"
},
"html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271",
"description": "WebLogic Exploit",
"fork": false,
"created_at": "2017-12-28T01:30:50Z",
"updated_at": "2020-11-07T09:05:16Z",
"pushed_at": "2018-07-13T18:56:53Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 47,
"forks": 47,
"watchers": 128,
"score": 0
},
{
"id": 115596796,
"name": "CVE-2017-10271",
"full_name": "Luffin\/CVE-2017-10271",
"owner": {
"login": "Luffin",
"id": 13807870,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13807870?v=4",
"html_url": "https:\/\/github.com\/Luffin"
},
"html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271",
"description": "CVE-2017-10271 POC",
"fork": false,
"created_at": "2017-12-28T07:19:13Z",
"updated_at": "2020-08-10T02:31:05Z",
"pushed_at": "2018-01-10T02:34:56Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 14,
"forks": 14,
"watchers": 29,
"score": 0
},
{
"id": 116099094,
"name": "weblogic_wls_wsat_rce",
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
"owner": {
"login": "cjjduck",
"id": 23519154,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23519154?v=4",
"html_url": "https:\/\/github.com\/cjjduck"
},
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
"updated_at": "2020-10-09T02:33:00Z",
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 39,
"forks": 39,
"watchers": 3,
"score": 0
},
{
"id": 116430643,
"name": "CVE-2017-10271",
"full_name": "kkirsche\/CVE-2017-10271",
"owner": {
"login": "kkirsche",
"id": 947110,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/947110?v=4",
"html_url": "https:\/\/github.com\/kkirsche"
},
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-01-05T21:57:03Z",
"updated_at": "2020-12-04T14:32:52Z",
"pushed_at": "2018-01-26T14:28:58Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 43,
"forks": 43,
"watchers": 119,
"score": 0
},
{
"id": 117624791,
"name": "CVE-2017-10271",
"full_name": "pssss\/CVE-2017-10271",
"owner": {
"login": "pssss",
"id": 14834109,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14834109?v=4",
"html_url": "https:\/\/github.com\/pssss"
},
"html_url": "https:\/\/github.com\/pssss\/CVE-2017-10271",
"description": "CVE-2017-10271 Weblogic 漏洞验证Poc及补丁",
"fork": false,
"created_at": "2018-01-16T03:10:48Z",
"updated_at": "2020-01-20T06:37:58Z",
"pushed_at": "2020-01-20T06:37:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 117926261,
"name": "cve-2017-10271-poc",
"full_name": "SuperHacker-liuan\/cve-2017-10271-poc",
"owner": {
"login": "SuperHacker-liuan",
"id": 30787037,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30787037?v=4",
"html_url": "https:\/\/github.com\/SuperHacker-liuan"
},
"html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc",
"description": "cve-2017-10271 POC",
"fork": false,
"created_at": "2018-01-18T03:21:15Z",
"updated_at": "2020-01-06T03:15:27Z",
"pushed_at": "2018-02-02T07:47:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 118044092,
"name": "CVE-2017-10271",
"full_name": "bmcculley\/CVE-2017-10271",
"owner": {
"login": "bmcculley",
"id": 6238704,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6238704?v=4",
"html_url": "https:\/\/github.com\/bmcculley"
},
"html_url": "https:\/\/github.com\/bmcculley\/CVE-2017-10271",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-01-18T22:07:33Z",
"updated_at": "2020-12-11T01:14:53Z",
"pushed_at": "2019-10-26T15:31:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 118144871,
"name": "Oracle-WebLogic-CVE-2017-10271",
"full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
"owner": {
"login": "peterpeter228",
"id": 22089258,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22089258?v=4",
"html_url": "https:\/\/github.com\/peterpeter228"
},
"html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
"fork": false,
"created_at": "2018-01-19T15:50:08Z",
"updated_at": "2020-09-24T10:47:12Z",
"pushed_at": "2018-01-19T11:29:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 120462394,
"name": "CVE-2017-10271",
"full_name": "Sch01ar\/CVE-2017-10271",
"owner": {
"login": "Sch01ar",
"id": 28928231,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28928231?v=4",
"html_url": "https:\/\/github.com\/Sch01ar"
},
"html_url": "https:\/\/github.com\/Sch01ar\/CVE-2017-10271",
"description": null,
"fork": false,
"created_at": "2018-02-06T13:38:40Z",
"updated_at": "2018-02-06T13:59:34Z",
"pushed_at": "2018-02-08T09:21:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 120571410,
"name": "weblogic_honeypot",
"full_name": "Cymmetria\/weblogic_honeypot",
"owner": {
"login": "Cymmetria",
"id": 19413345,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19413345?v=4",
"html_url": "https:\/\/github.com\/Cymmetria"
},
"html_url": "https:\/\/github.com\/Cymmetria\/weblogic_honeypot",
"description": "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.",
"fork": false,
"created_at": "2018-02-07T06:11:23Z",
"updated_at": "2020-10-27T03:58:14Z",
"pushed_at": "2020-04-25T20:55:29Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"forks": 6,
"watchers": 17,
"score": 0
},
{
"id": 123384221,
"name": "weblogic_wls_rce_poc-exp",
"full_name": "JackyTsuuuy\/weblogic_wls_rce_poc-exp",
"owner": {
"login": "JackyTsuuuy",
"id": 9449527,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9449527?v=4",
"html_url": "https:\/\/github.com\/JackyTsuuuy"
},
"html_url": "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp",
"description": "cve-2017-10271",
"fork": false,
"created_at": "2018-03-01T04:57:09Z",
"updated_at": "2020-07-31T16:12:20Z",
"pushed_at": "2018-03-01T05:08:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 125456636,
"name": "Oracle-WebLogic-WLS-WSAT",
"full_name": "s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
"owner": {
"login": "s0wr0b1ndef",
"id": 37288034,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
},
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-03-16T03:09:29Z",
"updated_at": "2018-08-05T19:23:02Z",
"pushed_at": "2018-03-16T03:14:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 139956588,
"name": "Oracle-WebLogic-CVE-2017-10271-master",
"full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
"owner": {
"login": "lonehand",
"id": 20275278,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20275278?v=4",
"html_url": "https:\/\/github.com\/lonehand"
},
"html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
"description": null,
"fork": false,
"created_at": "2018-07-06T08:32:28Z",
"updated_at": "2019-06-27T03:08:05Z",
"pushed_at": "2018-07-06T08:42:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 148616806,
"name": "javaserializetools",
"full_name": "shack2\/javaserializetools",
"owner": {
"login": "shack2",
"id": 26374431,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26374431?v=4",
"html_url": "https:\/\/github.com\/shack2"
},
"html_url": "https:\/\/github.com\/shack2\/javaserializetools",
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-12-16T06:47:14Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 91,
"forks": 91,
"watchers": 253,
"score": 0
},
{
"id": 160370962,
"name": "CVE-2017-10271",
"full_name": "nhwuxiaojun\/CVE-2017-10271",
"owner": {
"login": "nhwuxiaojun",
"id": 15905850,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15905850?v=4",
"html_url": "https:\/\/github.com\/nhwuxiaojun"
},
"html_url": "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271",
"description": "Weblogic(CVE-2017-10271)",
"fork": false,
"created_at": "2018-12-04T14:34:10Z",
"updated_at": "2020-06-10T02:53:11Z",
"pushed_at": "2018-12-04T14:45:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 161570094,
"name": "JavaDeserialization",
"full_name": "ETOCheney\/JavaDeserialization",
"owner": {
"login": "ETOCheney",
"id": 28469578,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28469578?v=4",
"html_url": "https:\/\/github.com\/ETOCheney"
},
"html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization",
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
"fork": false,
"created_at": "2018-12-13T02:00:23Z",
"updated_at": "2020-10-28T10:00:45Z",
"pushed_at": "2018-12-13T14:05:28Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 165317811,
"name": "cve-2017-10271",
"full_name": "cved-sources\/cve-2017-10271",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271",
"description": "cve-2017-10271",
"fork": false,
"created_at": "2019-01-11T22:11:16Z",
"updated_at": "2019-01-11T22:11:38Z",
"pushed_at": "2019-01-11T22:11:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 175729381,
"name": "Oracle-WebLogic-CVE-2017-10271",
"full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
"owner": {
"login": "XHSecurity",
"id": 48574583,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48574583?v=4",
"html_url": "https:\/\/github.com\/XHSecurity"
},
"html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
"description": "Oracle-WebLogic-CVE-2017-10271",
"fork": false,
"created_at": "2019-03-15T01:50:01Z",
"updated_at": "2020-12-11T01:36:32Z",
"pushed_at": "2019-03-15T01:51:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 176763123,
"name": "Weblogic_Wsat_RCE",
"full_name": "kbsec\/Weblogic_Wsat_RCE",
"owner": {
"login": "kbsec",
"id": 11823496,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11823496?v=4",
"html_url": "https:\/\/github.com\/kbsec"
},
"html_url": "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE",
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
"fork": false,
"created_at": "2019-03-20T15:26:55Z",
"updated_at": "2019-12-19T13:44:39Z",
"pushed_at": "2019-03-27T17:47:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 183346706,
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"owner": {
"login": "SkyBlueEternal",
"id": 46418185,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4",
"html_url": "https:\/\/github.com\/SkyBlueEternal"
},
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2020-12-15T07:25:50Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 37,
"forks": 37,
"watchers": 104,
"score": 0
},
{
"id": 183428186,
"name": "WebLogic_CNVD_C_2019_48814",
"full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814",
"owner": {
"login": "Yuusuke4",
"id": 26989867,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26989867?v=4",
"html_url": "https:\/\/github.com\/Yuusuke4"
},
"html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814",
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271",
"fork": false,
"created_at": "2019-04-25T12:18:16Z",
"updated_at": "2019-04-25T12:33:00Z",
"pushed_at": "2019-04-25T12:10:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 183430704,
"name": "WebLogic_CNVD_C2019_48814",
"full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814",
"owner": {
"login": "7kbstorm",
"id": 38887063,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38887063?v=4",
"html_url": "https:\/\/github.com\/7kbstorm"
},
"html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814",
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
"fork": false,
"created_at": "2019-04-25T12:33:31Z",
"updated_at": "2020-12-01T09:11:11Z",
"pushed_at": "2019-04-25T12:44:02Z",
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 53,
"forks": 53,
"watchers": 113,
"score": 0
},
{
"id": 219752851,
"name": "-CVE-2017-10271-",
"full_name": "ianxtianxt\/-CVE-2017-10271-",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/-CVE-2017-10271-",
"description": " (CVE-2017-10271)Java反序列化漏洞",
"fork": false,
"created_at": "2019-11-05T13:33:56Z",
"updated_at": "2020-07-03T04:06:16Z",
"pushed_at": "2019-11-05T13:35:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 253372582,
"name": "CVE-2017-10271",
"full_name": "testwc\/CVE-2017-10271",
"owner": {
"login": "testwc",
"id": 7675910,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7675910?v=4",
"html_url": "https:\/\/github.com\/testwc"
},
"html_url": "https:\/\/github.com\/testwc\/CVE-2017-10271",
"description": "CVE-2017-10271",
"fork": false,
"created_at": "2020-04-06T02:01:20Z",
"updated_at": "2020-05-08T06:52:50Z",
"pushed_at": "2020-05-08T06:52:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 313801625,
"name": "CVE-2017-10271",
"full_name": "Al1ex\/CVE-2017-10271",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2017-10271",
"description": "CVE-2017-10271",
"fork": false,
"created_at": "2020-11-18T02:31:18Z",
"updated_at": "2020-11-18T02:31:51Z",
"pushed_at": "2020-11-18T02:31:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]