2020-10-29 04:09:01 +01:00
[
2020-11-07 10:09:13 +01:00
{
"id" : 252131233 ,
"name" : "exphub" ,
"full_name" : "zhzyker\/exphub" ,
"owner" : {
"login" : "zhzyker" ,
"id" : 32918050 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/32918050?v=4" ,
"html_url" : "https:\/\/github.com\/zhzyker"
} ,
"html_url" : "https:\/\/github.com\/zhzyker\/exphub" ,
"description" : "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本, 最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340" ,
"fork" : false ,
"created_at" : "2020-04-01T09:33:35Z" ,
2020-12-29 10:09:40 +01:00
"updated_at" : "2020-12-29T07:27:44Z" ,
2020-11-07 10:09:13 +01:00
"pushed_at" : "2020-11-07T05:55:00Z" ,
2020-12-29 10:09:40 +01:00
"stargazers_count" : 2210 ,
"watchers_count" : 2210 ,
"forks_count" : 626 ,
"forks" : 626 ,
"watchers" : 2210 ,
2020-11-07 10:09:13 +01:00
"score" : 0
} ,
2020-11-07 16:08:57 +01:00
{
"id" : 302553989 ,
"name" : "vulmap" ,
"full_name" : "zhzyker\/vulmap" ,
"owner" : {
"login" : "zhzyker" ,
"id" : 32918050 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/32918050?v=4" ,
"html_url" : "https:\/\/github.com\/zhzyker"
} ,
"html_url" : "https:\/\/github.com\/zhzyker\/vulmap" ,
2020-12-14 16:11:44 +01:00
"description" : "Vulmap - Web漏洞扫描和验证工具, 可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描, 并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞, 并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530" ,
2020-11-07 16:08:57 +01:00
"fork" : false ,
"created_at" : "2020-10-09T06:34:36Z" ,
2020-12-29 10:09:40 +01:00
"updated_at" : "2020-12-29T09:03:46Z" ,
2020-12-15 04:09:52 +01:00
"pushed_at" : "2020-12-15T02:33:45Z" ,
2020-12-29 10:09:40 +01:00
"stargazers_count" : 643 ,
"watchers_count" : 643 ,
2020-12-28 16:09:42 +01:00
"forks_count" : 116 ,
"forks" : 116 ,
2020-12-29 10:09:40 +01:00
"watchers" : 643 ,
2020-11-07 16:08:57 +01:00
"score" : 0
} ,
2020-10-29 10:08:56 +01:00
{
"id" : 307998445 ,
"name" : "CVE-2020-14882" ,
"full_name" : "jas502n\/CVE-2020-14882" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2020-14882" ,
"description" : "CVE-2020– 14882、CVE-2020– 14883" ,
"fork" : false ,
"created_at" : "2020-10-28T11:43:37Z" ,
2020-12-28 22:10:15 +01:00
"updated_at" : "2020-12-28T16:46:55Z" ,
2020-11-16 10:09:23 +01:00
"pushed_at" : "2020-11-16T04:23:09Z" ,
2020-12-28 22:10:15 +01:00
"stargazers_count" : 203 ,
"watchers_count" : 203 ,
2020-12-09 10:09:23 +01:00
"forks_count" : 38 ,
"forks" : 38 ,
2020-12-28 22:10:15 +01:00
"watchers" : 203 ,
2020-10-29 10:08:56 +01:00
"score" : 0
} ,
2020-10-29 04:09:01 +01:00
{
"id" : 308145197 ,
"name" : "CVE-2020-14882" ,
"full_name" : "s1kr10s\/CVE-2020-14882" ,
"owner" : {
"login" : "s1kr10s" ,
"id" : 5374475 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/5374475?v=4" ,
"html_url" : "https:\/\/github.com\/s1kr10s"
} ,
"html_url" : "https:\/\/github.com\/s1kr10s\/CVE-2020-14882" ,
"description" : "CVE-2020– 14882 by Jang" ,
"fork" : false ,
"created_at" : "2020-10-28T21:28:12Z" ,
2020-12-28 22:10:15 +01:00
"updated_at" : "2020-12-28T17:28:26Z" ,
2020-10-29 10:08:56 +01:00
"pushed_at" : "2020-10-29T03:57:09Z" ,
2020-12-28 22:10:15 +01:00
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
2020-12-01 10:11:00 +01:00
"forks_count" : 19 ,
"forks" : 19 ,
2020-12-28 22:10:15 +01:00
"watchers" : 26 ,
2020-10-29 04:09:01 +01:00
"score" : 0
} ,
{
"id" : 308184758 ,
2020-11-26 04:09:16 +01:00
"name" : "-Patched-McMaster-University-Blind-Command-Injection" ,
"full_name" : "Umarovm\/-Patched-McMaster-University-Blind-Command-Injection" ,
2020-10-29 04:09:01 +01:00
"owner" : {
"login" : "Umarovm" ,
"id" : 25722145 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/25722145?v=4" ,
"html_url" : "https:\/\/github.com\/Umarovm"
} ,
2020-11-26 04:09:16 +01:00
"html_url" : "https:\/\/github.com\/Umarovm\/-Patched-McMaster-University-Blind-Command-Injection" ,
2020-10-31 04:08:58 +01:00
"description" : "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca." ,
2020-10-29 04:09:01 +01:00
"fork" : false ,
"created_at" : "2020-10-29T01:28:41Z" ,
2020-12-04 04:09:26 +01:00
"updated_at" : "2020-12-04T02:16:03Z" ,
"pushed_at" : "2020-12-04T02:16:01Z" ,
2020-10-29 04:09:01 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-29 10:08:56 +01:00
} ,
{
"id" : 308238126 ,
"name" : "CVE-2020-14882" ,
"full_name" : "RedTeamWing\/CVE-2020-14882" ,
"owner" : {
"login" : "RedTeamWing" ,
"id" : 25416365 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/25416365?v=4" ,
"html_url" : "https:\/\/github.com\/RedTeamWing"
} ,
"html_url" : "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882" ,
"description" : "CVE-2020-14882 Weblogic-Exp" ,
"fork" : false ,
"created_at" : "2020-10-29T06:30:30Z" ,
2020-12-22 16:09:37 +01:00
"updated_at" : "2020-12-22T09:47:47Z" ,
2020-10-29 10:08:56 +01:00
"pushed_at" : "2020-10-29T06:36:01Z" ,
2020-12-22 16:09:37 +01:00
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
2020-11-28 10:09:09 +01:00
"forks_count" : 8 ,
"forks" : 8 ,
2020-12-22 16:09:37 +01:00
"watchers" : 14 ,
2020-10-29 16:09:17 +01:00
"score" : 0
} ,
{
"id" : 308343789 ,
"name" : "cve-2020-14882" ,
"full_name" : "0thm4n3\/cve-2020-14882" ,
"owner" : {
"login" : "0thm4n3" ,
"id" : 12746014 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/12746014?v=4" ,
"html_url" : "https:\/\/github.com\/0thm4n3"
} ,
"html_url" : "https:\/\/github.com\/0thm4n3\/cve-2020-14882" ,
2020-10-31 16:08:57 +01:00
"description" : "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882" ,
2020-10-29 16:09:17 +01:00
"fork" : false ,
"created_at" : "2020-10-29T13:53:31Z" ,
2020-10-31 16:08:57 +01:00
"updated_at" : "2020-10-31T13:03:28Z" ,
"pushed_at" : "2020-10-31T13:03:26Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-10-30 22:08:54 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-10-31 16:08:57 +01:00
"watchers" : 1 ,
2020-10-29 10:08:56 +01:00
"score" : 0
2020-10-29 22:09:02 +01:00
} ,
{
"id" : 308374913 ,
"name" : "cve-2020-14882" ,
"full_name" : "wsfengfan\/cve-2020-14882" ,
"owner" : {
"login" : "wsfengfan" ,
"id" : 33821840 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4" ,
"html_url" : "https:\/\/github.com\/wsfengfan"
} ,
"html_url" : "https:\/\/github.com\/wsfengfan\/cve-2020-14882" ,
2020-11-09 16:09:17 +01:00
"description" : "CVE-2020-14882 EXP 回显" ,
2020-10-29 22:09:02 +01:00
"fork" : false ,
"created_at" : "2020-10-29T15:44:23Z" ,
2020-12-06 22:10:56 +01:00
"updated_at" : "2020-12-06T17:09:24Z" ,
2020-11-09 16:09:17 +01:00
"pushed_at" : "2020-11-09T09:55:10Z" ,
2020-12-06 22:10:56 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 3 ,
2020-10-29 22:09:02 +01:00
"score" : 0
2020-10-30 16:09:05 +01:00
} ,
{
"id" : 308605927 ,
"name" : "CVE-2020-14882" ,
"full_name" : "alexfrancow\/CVE-2020-14882" ,
"owner" : {
"login" : "alexfrancow" ,
"id" : 23419929 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4" ,
"html_url" : "https:\/\/github.com\/alexfrancow"
} ,
"html_url" : "https:\/\/github.com\/alexfrancow\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-10-30T11:07:11Z" ,
2020-10-31 22:08:55 +01:00
"updated_at" : "2020-10-31T15:57:21Z" ,
"pushed_at" : "2020-10-31T15:57:19Z" ,
2020-10-30 16:09:05 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-11-03 22:09:07 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-10-30 16:09:05 +01:00
"watchers" : 0 ,
"score" : 0
2020-10-30 22:08:54 +01:00
} ,
{
"id" : 308716809 ,
"name" : "CVE-2020-14882" ,
"full_name" : "sickwell\/CVE-2020-14882" ,
"owner" : {
"login" : "sickwell" ,
"id" : 32671944 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/32671944?v=4" ,
"html_url" : "https:\/\/github.com\/sickwell"
} ,
"html_url" : "https:\/\/github.com\/sickwell\/CVE-2020-14882" ,
"description" : "PoC for CVE-2020-14882" ,
"fork" : false ,
"created_at" : "2020-10-30T18:46:34Z" ,
"updated_at" : "2020-10-30T18:46:34Z" ,
"pushed_at" : "2020-10-30T18:46:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-31 04:08:58 +01:00
} ,
{
"id" : 308782228 ,
2020-11-03 16:09:09 +01:00
"name" : "CVE-2020-14882_POC" ,
"full_name" : "GGyao\/CVE-2020-14882_POC" ,
2020-10-31 04:08:58 +01:00
"owner" : {
"login" : "GGyao" ,
"id" : 38530938 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4" ,
"html_url" : "https:\/\/github.com\/GGyao"
} ,
2020-11-03 16:09:09 +01:00
"html_url" : "https:\/\/github.com\/GGyao\/CVE-2020-14882_POC" ,
2020-10-31 04:08:58 +01:00
"description" : "CVE-2020-14882批量验证工具。" ,
"fork" : false ,
"created_at" : "2020-10-31T01:43:54Z" ,
2020-12-01 10:11:00 +01:00
"updated_at" : "2020-12-01T05:05:26Z" ,
"pushed_at" : "2020-12-01T05:05:24Z" ,
2020-11-03 16:09:09 +01:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2020-11-02 16:09:16 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-11-03 16:09:09 +01:00
"watchers" : 11 ,
2020-11-01 16:08:54 +01:00
"score" : 0
} ,
{
"id" : 309098912 ,
"name" : "Weblogic_Unauthorized-bypass-RCE" ,
"full_name" : "ludy-dev\/Weblogic_Unauthorized-bypass-RCE" ,
"owner" : {
"login" : "ludy-dev" ,
"id" : 70466565 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4" ,
"html_url" : "https:\/\/github.com\/ludy-dev"
} ,
"html_url" : "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE" ,
"description" : "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script" ,
"fork" : false ,
"created_at" : "2020-11-01T13:12:27Z" ,
2020-11-24 22:09:19 +01:00
"updated_at" : "2020-11-24T16:16:12Z" ,
2020-11-01 16:08:54 +01:00
"pushed_at" : "2020-11-01T13:56:48Z" ,
2020-11-24 22:09:19 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2020-11-02 10:09:15 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-11-24 22:09:19 +01:00
"watchers" : 2 ,
2020-10-31 04:08:58 +01:00
"score" : 0
2020-11-03 16:09:09 +01:00
} ,
{
"id" : 309655403 ,
"name" : "CVE-2020-14882_ALL" ,
"full_name" : "GGyao\/CVE-2020-14882_ALL" ,
"owner" : {
"login" : "GGyao" ,
"id" : 38530938 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4" ,
"html_url" : "https:\/\/github.com\/GGyao"
} ,
"html_url" : "https:\/\/github.com\/GGyao\/CVE-2020-14882_ALL" ,
"description" : "CVE-2020-14882_ALL综合利用工具, 支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。" ,
"fork" : false ,
"created_at" : "2020-11-03T10:49:35Z" ,
2020-12-28 22:10:15 +01:00
"updated_at" : "2020-12-28T17:31:33Z" ,
2020-12-01 10:11:00 +01:00
"pushed_at" : "2020-12-01T05:08:41Z" ,
2020-12-28 22:10:15 +01:00
"stargazers_count" : 70 ,
"watchers_count" : 70 ,
2020-11-30 04:09:41 +01:00
"forks_count" : 15 ,
"forks" : 15 ,
2020-12-28 22:10:15 +01:00
"watchers" : 70 ,
2020-11-03 16:09:09 +01:00
"score" : 0
} ,
{
"id" : 309666360 ,
"name" : "CVE-2020-14882-checker" ,
"full_name" : "ovProphet\/CVE-2020-14882-checker" ,
"owner" : {
"login" : "ovProphet" ,
"id" : 12277617 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/12277617?v=4" ,
"html_url" : "https:\/\/github.com\/ovProphet"
} ,
"html_url" : "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker" ,
"description" : "CVE-2020-14882 detection script" ,
"fork" : false ,
"created_at" : "2020-11-03T11:34:38Z" ,
"updated_at" : "2020-11-03T11:42:04Z" ,
"pushed_at" : "2020-11-03T11:34:47Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-11-04 04:09:04 +01:00
} ,
{
"id" : 309868259 ,
"name" : "CVE-2020-14882" ,
"full_name" : "NS-Sp4ce\/CVE-2020-14882" ,
"owner" : {
"login" : "NS-Sp4ce" ,
"id" : 33349032 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/33349032?v=4" ,
"html_url" : "https:\/\/github.com\/NS-Sp4ce"
} ,
"html_url" : "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882" ,
"description" : "CVE-2020-14882\/14883\/14750" ,
"fork" : false ,
"created_at" : "2020-11-04T03:09:13Z" ,
2020-11-14 04:08:10 +01:00
"updated_at" : "2020-11-14T00:16:44Z" ,
2020-11-04 10:09:17 +01:00
"pushed_at" : "2020-11-04T03:15:33Z" ,
2020-11-14 04:08:10 +01:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2020-11-04 16:09:10 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-11-14 04:08:10 +01:00
"watchers" : 10 ,
2020-11-05 16:09:18 +01:00
"score" : 0
} ,
{
"id" : 310303375 ,
"name" : "cve-2020-14882" ,
"full_name" : "mmioimm\/cve-2020-14882" ,
"owner" : {
"login" : "mmioimm" ,
"id" : 19258899 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/19258899?v=4" ,
"html_url" : "https:\/\/github.com\/mmioimm"
} ,
"html_url" : "https:\/\/github.com\/mmioimm\/cve-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-05T13:12:28Z" ,
2020-11-06 16:09:13 +01:00
"updated_at" : "2020-11-06T09:22:23Z" ,
2020-11-05 16:09:18 +01:00
"pushed_at" : "2020-11-05T13:14:57Z" ,
2020-11-06 16:09:13 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-11-05 16:09:18 +01:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-11-06 16:09:13 +01:00
"watchers" : 1 ,
2020-11-04 04:09:04 +01:00
"score" : 0
2020-11-09 10:09:17 +01:00
} ,
{
"id" : 311265070 ,
"name" : "CVE-2020-14882" ,
"full_name" : "QmF0c3UK\/CVE-2020-14882" ,
"owner" : {
"login" : "QmF0c3UK" ,
"id" : 29447678 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/29447678?v=4" ,
"html_url" : "https:\/\/github.com\/QmF0c3UK"
} ,
"html_url" : "https:\/\/github.com\/QmF0c3UK\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-09T08:03:44Z" ,
2020-12-22 10:09:42 +01:00
"updated_at" : "2020-12-22T08:58:41Z" ,
2020-11-12 10:09:24 +01:00
"pushed_at" : "2020-11-12T06:23:23Z" ,
2020-12-22 10:09:42 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2020-11-14 16:09:08 +01:00
"forks_count" : 2 ,
"forks" : 2 ,
2020-12-22 10:09:42 +01:00
"watchers" : 5 ,
2020-11-09 10:09:17 +01:00
"score" : 0
2020-11-09 16:09:17 +01:00
} ,
{
"id" : 311340226 ,
"name" : "CVE-2020-14882" ,
"full_name" : "murataydemir\/CVE-2020-14882" ,
"owner" : {
"login" : "murataydemir" ,
"id" : 16391655 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4" ,
"html_url" : "https:\/\/github.com\/murataydemir"
} ,
"html_url" : "https:\/\/github.com\/murataydemir\/CVE-2020-14882" ,
"description" : "[CVE-2020-14882] Oracle WebLogic Server Authentication Bypass" ,
"fork" : false ,
"created_at" : "2020-11-09T13:02:43Z" ,
2020-11-09 22:09:54 +01:00
"updated_at" : "2020-11-09T16:35:41Z" ,
"pushed_at" : "2020-11-09T16:35:39Z" ,
2020-11-09 16:09:17 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-11-11 10:09:20 +01:00
} ,
{
"id" : 311887487 ,
"name" : "CVE-2020-14882-GUI-Test" ,
"full_name" : "AirEvan\/CVE-2020-14882-GUI-Test" ,
"owner" : {
"login" : "AirEvan" ,
"id" : 26640179 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/26640179?v=4" ,
"html_url" : "https:\/\/github.com\/AirEvan"
} ,
"html_url" : "https:\/\/github.com\/AirEvan\/CVE-2020-14882-GUI-Test" ,
"description" : "基于qt的图形化CVE-2020-14882漏洞回显测试工具." ,
"fork" : false ,
"created_at" : "2020-11-11T06:52:32Z" ,
"updated_at" : "2020-11-11T07:22:06Z" ,
"pushed_at" : "2020-11-11T07:19:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-11-13 04:09:19 +01:00
} ,
{
"id" : 312193698 ,
"name" : "CVE-2020-14882-weblogicRCE" ,
"full_name" : "corelight\/CVE-2020-14882-weblogicRCE" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/CVE-2020-14882-weblogicRCE" ,
"description" : "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750" ,
"fork" : false ,
"created_at" : "2020-11-12T06:59:54Z" ,
2020-12-03 04:09:26 +01:00
"updated_at" : "2020-12-02T21:43:55Z" ,
"pushed_at" : "2020-12-02T21:43:52Z" ,
2020-11-13 04:09:19 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-12-23 16:09:37 +01:00
"forks_count" : 2 ,
"forks" : 2 ,
2020-11-13 04:09:19 +01:00
"watchers" : 0 ,
"score" : 0
2020-11-13 10:09:23 +01:00
} ,
{
"id" : 312256179 ,
"name" : "CVE-2020-14882" ,
"full_name" : "x51\/CVE-2020-14882" ,
"owner" : {
"login" : "x51" ,
"id" : 45651912 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/45651912?v=4" ,
"html_url" : "https:\/\/github.com\/x51"
} ,
"html_url" : "https:\/\/github.com\/x51\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-12T11:27:39Z" ,
2020-11-16 16:09:21 +01:00
"updated_at" : "2020-11-16T14:43:25Z" ,
2020-11-13 10:09:23 +01:00
"pushed_at" : "2020-11-13T03:35:44Z" ,
2020-11-16 16:09:21 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2020-11-13 10:09:23 +01:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-11-16 16:09:21 +01:00
"watchers" : 2 ,
2020-11-13 10:09:23 +01:00
"score" : 0
2020-11-17 16:09:23 +01:00
} ,
{
"id" : 313643357 ,
"name" : "CVE-2020-14882" ,
"full_name" : "BabyTeam1024\/CVE-2020-14882" ,
"owner" : {
"login" : "BabyTeam1024" ,
"id" : 74447452 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/74447452?v=4" ,
"html_url" : "https:\/\/github.com\/BabyTeam1024"
} ,
"html_url" : "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-17T14:23:23Z" ,
"updated_at" : "2020-11-17T14:23:23Z" ,
"pushed_at" : "2020-11-17T14:23:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-29 04:09:01 +01:00
}
]