PoC-in-GitHub/2020/CVE-2020-15368.json

35 lines
1.1 KiB
JSON
Raw Normal View History

2021-06-29 18:12:46 +09:00
[
{
"id": 381240187,
"name": "CVE-2020-15368",
"full_name": "stong\/CVE-2020-15368",
"owner": {
"login": "stong",
"id": 14918218,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14918218?v=4",
"html_url": "https:\/\/github.com\/stong"
},
"html_url": "https:\/\/github.com\/stong\/CVE-2020-15368",
2021-10-29 18:15:04 +09:00
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
2021-06-29 18:12:46 +09:00
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
2022-06-30 03:20:34 +09:00
"updated_at": "2022-06-29T15:56:35Z",
2022-04-14 15:17:49 +09:00
"pushed_at": "2022-04-14T03:17:44Z",
2022-06-30 03:20:34 +09:00
"stargazers_count": 332,
"watchers_count": 332,
2022-06-26 21:15:36 +09:00
"forks_count": 34,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [
"exploit",
"kernel",
2021-10-29 18:15:04 +09:00
"tutorial",
2021-10-07 06:13:51 +09:00
"windows"
],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-06-26 21:15:36 +09:00
"forks": 34,
2022-06-30 03:20:34 +09:00
"watchers": 332,
2021-06-29 18:12:46 +09:00
"score": 0
}
]