PoC-in-GitHub/2014/CVE-2014-0114.json
2019-12-27 14:17:04 +09:00

71 lines
No EOL
2.4 KiB
JSON

[
{
"id": 20073700,
"name": "struts1filter",
"full_name": "rgielen\/struts1filter",
"owner": {
"login": "rgielen",
"id": 64990,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/64990?v=4",
"html_url": "https:\/\/github.com\/rgielen"
},
"html_url": "https:\/\/github.com\/rgielen\/struts1filter",
"description": "A request parameter filter solution for Struts 1 CVE-2014-0114 based on the work of Alvaro Munoz and the HP Fortify team",
"fork": false,
"created_at": "2014-05-22T19:14:54Z",
"updated_at": "2019-07-16T16:26:56Z",
"pushed_at": "2017-01-23T20:14:14Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 7,
"forks": 7,
"watchers": 7,
"score": 0
},
{
"id": 20677917,
"name": "struts1-patch",
"full_name": "ricedu\/struts1-patch",
"owner": {
"login": "ricedu",
"id": 7359760,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7359760?v=4",
"html_url": "https:\/\/github.com\/ricedu"
},
"html_url": "https:\/\/github.com\/ricedu\/struts1-patch",
"description": "struts1 CVE-2014-0114 classLoader manipulation vulnerability patch",
"fork": false,
"created_at": "2014-06-10T08:27:10Z",
"updated_at": "2014-06-10T10:12:02Z",
"pushed_at": "2014-06-10T08:58:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 188789502,
"name": "strutt-cve-2014-0114",
"full_name": "anob3it\/strutt-cve-2014-0114",
"owner": {
"login": "anob3it",
"id": 33195524,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33195524?v=4",
"html_url": "https:\/\/github.com\/anob3it"
},
"html_url": "https:\/\/github.com\/anob3it\/strutt-cve-2014-0114",
"description": null,
"fork": false,
"created_at": "2019-05-27T07:04:54Z",
"updated_at": "2019-06-28T12:45:12Z",
"pushed_at": "2019-06-15T20:57:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]