2021-03-05 12:09:17 +09:00
|
|
|
|
[
|
|
|
|
|
{
|
|
|
|
|
"id": 344667460,
|
|
|
|
|
"name": "CVE-2021-1732-Exploit",
|
|
|
|
|
"full_name": "KaLendsi\/CVE-2021-1732-Exploit",
|
|
|
|
|
"owner": {
|
|
|
|
|
"login": "KaLendsi",
|
|
|
|
|
"id": 68001644,
|
|
|
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
|
|
|
|
|
"html_url": "https:\/\/github.com\/KaLendsi"
|
|
|
|
|
},
|
|
|
|
|
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-1732-Exploit",
|
|
|
|
|
"description": "CVE-2021-1732 Exploit",
|
|
|
|
|
"fork": false,
|
|
|
|
|
"created_at": "2021-03-05T02:11:10Z",
|
2021-03-08 18:09:27 +09:00
|
|
|
|
"updated_at": "2021-03-08T08:37:00Z",
|
2021-03-05 12:09:17 +09:00
|
|
|
|
"pushed_at": "2021-03-05T03:10:26Z",
|
2021-03-08 18:09:27 +09:00
|
|
|
|
"stargazers_count": 17,
|
|
|
|
|
"watchers_count": 17,
|
|
|
|
|
"forks_count": 4,
|
|
|
|
|
"forks": 4,
|
|
|
|
|
"watchers": 17,
|
|
|
|
|
"score": 0
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"id": 345537174,
|
|
|
|
|
"name": "CVE-2021-1732",
|
|
|
|
|
"full_name": "k-k-k-k-k\/CVE-2021-1732",
|
|
|
|
|
"owner": {
|
|
|
|
|
"login": "k-k-k-k-k",
|
|
|
|
|
"id": 36893648,
|
|
|
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36893648?v=4",
|
|
|
|
|
"html_url": "https:\/\/github.com\/k-k-k-k-k"
|
|
|
|
|
},
|
|
|
|
|
"html_url": "https:\/\/github.com\/k-k-k-k-k\/CVE-2021-1732",
|
|
|
|
|
"description": "CVE-2021-1732 Microsoft Windows本地提权漏 研究及Poc\/Exploit开发",
|
|
|
|
|
"fork": false,
|
|
|
|
|
"created_at": "2021-03-08T05:07:15Z",
|
|
|
|
|
"updated_at": "2021-03-08T05:08:10Z",
|
|
|
|
|
"pushed_at": "2021-03-08T05:07:16Z",
|
|
|
|
|
"stargazers_count": 0,
|
|
|
|
|
"watchers_count": 0,
|
|
|
|
|
"forks_count": 0,
|
|
|
|
|
"forks": 0,
|
|
|
|
|
"watchers": 0,
|
2021-03-05 12:09:17 +09:00
|
|
|
|
"score": 0
|
|
|
|
|
}
|
|
|
|
|
]
|