mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-31 11:51:36 +01:00
25 lines
1.1 KiB
JSON
25 lines
1.1 KiB
JSON
|
[
|
|||
|
{
|
|||
|
"id": 241136874,
|
|||
|
"name": "CVE-2018-20250-WinRAR",
|
|||
|
"full_name": "eastmountyxz\/CVE-2018-20250-WinRAR",
|
|||
|
"owner": {
|
|||
|
"login": "eastmountyxz",
|
|||
|
"id": 53172375,
|
|||
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/eastmountyxz"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR",
|
|||
|
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者,自己确实很菜,但希望坚持下去,一起加油!",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2020-02-17T15:08:22Z",
|
|||
|
"updated_at": "2020-05-19T07:55:33Z",
|
|||
|
"pushed_at": "2020-05-19T07:55:32Z",
|
|||
|
"stargazers_count": 0,
|
|||
|
"watchers_count": 0,
|
|||
|
"forks_count": 0,
|
|||
|
"forks": 0,
|
|||
|
"watchers": 0,
|
|||
|
"score": 0
|
|||
|
}
|
|||
|
]
|