PoC-in-GitHub/2016/CVE-2016-0792.json
2020-01-06 06:30:02 +09:00

48 lines
No EOL
1.7 KiB
JSON

[
{
"id": 98817608,
"name": "jenkins-cve-2016-0792",
"full_name": "jpiechowka\/jenkins-cve-2016-0792",
"owner": {
"login": "jpiechowka",
"id": 9040085,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9040085?v=4",
"html_url": "https:\/\/github.com\/jpiechowka"
},
"html_url": "https:\/\/github.com\/jpiechowka\/jenkins-cve-2016-0792",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2017-07-30T18:39:24Z",
"updated_at": "2020-01-05T18:56:01Z",
"pushed_at": "2017-08-02T23:51:34Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 19,
"forks": 19,
"watchers": 39,
"score": 0
},
{
"id": 125023802,
"name": "java-deserialization-exploits",
"full_name": "s0wr0b1ndef\/java-deserialization-exploits",
"owner": {
"login": "s0wr0b1ndef",
"id": 37288034,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
},
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/java-deserialization-exploits",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2018-03-13T09:15:32Z",
"updated_at": "2019-05-10T05:49:44Z",
"pushed_at": "2018-03-13T09:15:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 9,
"forks": 9,
"watchers": 3,
"score": 0
}
]