PoC-in-GitHub/2020/CVE-2020-29583.json

29 lines
999 B
JSON
Raw Normal View History

2021-01-04 04:09:39 +01:00
[
{
"id": 326532749,
"name": "scan_CVE-2020-29583",
2021-05-17 05:12:24 +02:00
"full_name": "ruppde\/scan_CVE-2020-29583",
2021-01-04 04:09:39 +01:00
"owner": {
2021-05-17 05:12:24 +02:00
"login": "ruppde",
2021-01-04 04:09:39 +01:00
"id": 46819580,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46819580?v=4",
2021-05-17 05:12:24 +02:00
"html_url": "https:\/\/github.com\/ruppde"
2021-01-04 04:09:39 +01:00
},
2021-05-17 05:12:24 +02:00
"html_url": "https:\/\/github.com\/ruppde\/scan_CVE-2020-29583",
2021-01-04 04:09:39 +01:00
"description": "Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)",
"fork": false,
"created_at": "2021-01-04T00:56:55Z",
2022-02-08 01:14:32 +01:00
"updated_at": "2022-02-07T18:17:11Z",
2021-01-05 04:09:50 +01:00
"pushed_at": "2021-01-04T22:55:37Z",
2022-02-08 01:14:32 +01:00
"stargazers_count": 11,
"watchers_count": 11,
2022-01-11 19:15:08 +01:00
"forks_count": 2,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-01-11 19:15:08 +01:00
"forks": 2,
2022-02-08 01:14:32 +01:00
"watchers": 11,
2021-01-04 04:09:39 +01:00
"score": 0
}
]