PoC-in-GitHub/2020/CVE-2020-3153.json

100 lines
3.3 KiB
JSON
Raw Normal View History

2021-04-05 12:11:01 +09:00
[
{
"id": 261266121,
"name": "CVE-2020-3153",
"full_name": "shubham0d\/CVE-2020-3153",
"owner": {
"login": "shubham0d",
"id": 12750163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/shubham0d",
"user_view_type": "public"
2021-04-05 12:11:01 +09:00
},
"html_url": "https:\/\/github.com\/shubham0d\/CVE-2020-3153",
"description": "POC code for CVE-2020-3153 - Cisco anyconnect path traversal vulnerability",
"fork": false,
"created_at": "2020-05-04T18:36:22Z",
2024-08-13 09:29:46 +09:00
"updated_at": "2024-08-12T20:01:06Z",
2021-04-05 12:11:01 +09:00
"pushed_at": "2020-05-04T19:34:15Z",
2024-08-13 09:29:46 +09:00
"stargazers_count": 5,
"watchers_count": 5,
2022-11-08 15:19:29 +09:00
"has_discussions": false,
2021-11-07 09:12:54 +09:00
"forks_count": 2,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [
"anyconnect",
"cve-2020-3153",
"exploit",
"path-transversal"
],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-11-07 09:12:54 +09:00
"forks": 2,
2024-08-13 09:29:46 +09:00
"watchers": 5,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2021-04-05 12:11:01 +09:00
},
{
"id": 264178303,
"name": "CVE-2020-3153",
"full_name": "raspberry-pie\/CVE-2020-3153",
"owner": {
"login": "raspberry-pie",
"id": 20641947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20641947?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/raspberry-pie",
"user_view_type": "public"
2021-04-05 12:11:01 +09:00
},
"html_url": "https:\/\/github.com\/raspberry-pie\/CVE-2020-3153",
"description": "PoC for CVE-2020-3153 Cisco AnyConnect Secure Mobility Client EoP",
"fork": false,
"created_at": "2020-05-15T11:40:02Z",
"updated_at": "2020-05-15T11:42:14Z",
"pushed_at": "2020-05-15T11:42:12Z",
"stargazers_count": 0,
"watchers_count": 0,
2022-11-08 09:17:44 +09:00
"has_discussions": false,
2021-04-05 12:11:01 +09:00
"forks_count": 0,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-04-05 12:11:01 +09:00
"forks": 0,
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2021-04-05 12:11:01 +09:00
},
{
"id": 265337436,
"name": "CVE-2020-3153",
"full_name": "goichot\/CVE-2020-3153",
"owner": {
"login": "goichot",
"id": 8002862,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8002862?v=4",
2024-10-18 09:30:24 +09:00
"html_url": "https:\/\/github.com\/goichot",
"user_view_type": "public"
2021-04-05 12:11:01 +09:00
},
"html_url": "https:\/\/github.com\/goichot\/CVE-2020-3153",
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false,
"created_at": "2020-05-19T18:59:26Z",
2024-02-29 21:27:06 +09:00
"updated_at": "2024-02-29T10:32:54Z",
2021-04-05 12:11:01 +09:00
"pushed_at": "2020-05-25T08:33:24Z",
2024-02-29 21:27:06 +09:00
"stargazers_count": 104,
"watchers_count": 104,
2022-11-08 09:17:44 +09:00
"has_discussions": false,
2024-05-21 15:28:54 +09:00
"forks_count": 18,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2021-10-07 06:13:51 +09:00
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2024-05-21 15:28:54 +09:00
"forks": 18,
2024-02-29 21:27:06 +09:00
"watchers": 104,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 2
2021-04-05 12:11:01 +09:00
}
]