PoC-in-GitHub/2020/CVE-2020-1350.json

115 lines
3.9 KiB
JSON
Raw Normal View History

2024-11-29 03:31:51 +09:00
[
2024-12-24 03:31:43 +09:00
{
"id": 246641886,
"name": "NSE-scripts",
"full_name": "psc4re\/NSE-scripts",
"owner": {
"login": "psc4re",
"id": 4672886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4",
"html_url": "https:\/\/github.com\/psc4re",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/psc4re\/NSE-scripts",
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2024-11-06T12:30:06Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-1350",
"cve-2021-21972",
"cve-2021-34473",
"nmap",
"nmap-scan-script",
"nmap-scripts",
"nse-script",
"poc",
"proxyshell",
"scanner",
"sigred",
"smbghost",
"smbv3",
"vcenter",
"vulnerability",
"vulnerability-detection"
],
"visibility": "public",
"forks": 29,
"watchers": 161,
"score": 0,
"subscribers_count": 10
},
2024-11-29 03:31:51 +09:00
{
"id": 279670211,
"name": "CVE-2020-1350_HoneyPoC",
"full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC",
"description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
"fork": false,
"created_at": "2020-07-14T19:02:25Z",
"updated_at": "2024-11-10T12:13:04Z",
"pushed_at": "2021-06-10T02:46:52Z",
"stargazers_count": 281,
"watchers_count": 281,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-1350",
"sigred"
],
"visibility": "public",
"forks": 72,
"watchers": 281,
"score": 0,
"subscribers_count": 11
},
{
"id": 279776271,
"name": "CVE-2020-1350",
"full_name": "T13nn3s\/CVE-2020-1350",
"owner": {
"login": "T13nn3s",
"id": 29333776,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4",
"html_url": "https:\/\/github.com\/T13nn3s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
"fork": false,
"created_at": "2020-07-15T05:46:31Z",
"updated_at": "2023-04-01T11:46:35Z",
"pushed_at": "2023-04-01T11:46:03Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 14,
"score": 0,
"subscribers_count": 5
}
]