mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-09-09 19:11:53 +02:00
33 lines
No EOL
1.4 KiB
JSON
33 lines
No EOL
1.4 KiB
JSON
[
|
|
{
|
|
"id": 883778692,
|
|
"name": "Exploitation-de-la-vuln-rabilit-CVE-2015-5254-",
|
|
"full_name": "guigui237\/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-",
|
|
"owner": {
|
|
"login": "guigui237",
|
|
"id": 184559460,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184559460?v=4",
|
|
"html_url": "https:\/\/github.com\/guigui237",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/guigui237\/Exploitation-de-la-vuln-rabilit-CVE-2015-5254-",
|
|
"description": "La vulnérabilité CVE-2015-5254 est une faille de sécurité dans Apache ActiveMQ, un serveur de messages open source largement utilisé pour la communication entre applications. Cette vulnérabilité touche les versions d'ActiveMQ jusqu'à 5.13.0 et réside dans le manque de filtrage sur les données d'entrées JMS ObjectMessage enyoyées ",
|
|
"fork": false,
|
|
"created_at": "2024-11-05T14:58:30Z",
|
|
"updated_at": "2024-11-05T16:14:53Z",
|
|
"pushed_at": "2024-11-05T16:14:49Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |