PoC-in-GitHub/2018/CVE-2018-20250.json

48 lines
1.8 KiB
JSON
Raw Normal View History

2019-12-08 22:19:20 +09:00
[
2020-02-18 06:07:25 +09:00
{
"id": 241136874,
"name": "CVE-2018-20250-WinRAR",
"full_name": "eastmountyxz\/CVE-2018-20250-WinRAR",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
2021-01-22 00:10:20 +09:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53172375?v=4",
2020-02-18 06:07:25 +09:00
"html_url": "https:\/\/github.com\/eastmountyxz"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR",
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601结合相关资源及文章实现。推荐大家结合作者博客复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者自己确实很菜但希望坚持下去一起加油",
"fork": false,
"created_at": "2020-02-17T15:08:22Z",
2021-03-14 18:10:43 +09:00
"updated_at": "2021-03-14T04:44:31Z",
2020-05-19 18:10:37 +09:00
"pushed_at": "2020-05-19T07:55:32Z",
2021-03-14 18:10:43 +09:00
"stargazers_count": 0,
"watchers_count": 0,
2020-02-18 06:07:25 +09:00
"forks_count": 0,
"forks": 0,
2021-03-14 18:10:43 +09:00
"watchers": 0,
2020-02-18 06:07:25 +09:00
"score": 0
2020-05-13 18:09:18 +09:00
},
{
"id": 263515438,
"name": "cve-2018-20250",
"full_name": "lxg5763\/cve-2018-20250",
"owner": {
"login": "lxg5763",
"id": 36142720,
2021-01-22 00:10:20 +09:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36142720?v=4",
2020-05-13 18:09:18 +09:00
"html_url": "https:\/\/github.com\/lxg5763"
},
"html_url": "https:\/\/github.com\/lxg5763\/cve-2018-20250",
"description": "CVE-2018-20250漏洞利用",
"fork": false,
"created_at": "2020-05-13T03:28:04Z",
"updated_at": "2020-05-13T03:28:16Z",
"pushed_at": "2020-05-13T03:28:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 22:19:20 +09:00
}
]