PoC-in-GitHub/2016/CVE-2016-0792.json
2021-01-12 06:10:10 +09:00

48 lines
No EOL
1.7 KiB
JSON

[
{
"id": 98817608,
"name": "jenkins-cve-2016-0792",
"full_name": "jpiechowka\/jenkins-cve-2016-0792",
"owner": {
"login": "jpiechowka",
"id": 9040085,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9040085?v=4",
"html_url": "https:\/\/github.com\/jpiechowka"
},
"html_url": "https:\/\/github.com\/jpiechowka\/jenkins-cve-2016-0792",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2017-07-30T18:39:24Z",
"updated_at": "2020-10-12T22:02:49Z",
"pushed_at": "2017-08-02T23:51:34Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 23,
"forks": 23,
"watchers": 45,
"score": 0
},
{
"id": 125023802,
"name": "java-deserialization-exploits",
"full_name": "s0wr0b1ndef\/java-deserialization-exploits",
"owner": {
"login": "s0wr0b1ndef",
"id": 37288034,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
},
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/java-deserialization-exploits",
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
"fork": false,
"created_at": "2018-03-13T09:15:32Z",
"updated_at": "2020-09-01T10:41:23Z",
"pushed_at": "2018-03-13T09:15:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 11,
"forks": 11,
"watchers": 7,
"score": 0
}
]