[ { "id": 255764753, "name": "CVE-2020-3952", "full_name": "commandermoon\/CVE-2020-3952", "owner": { "login": "commandermoon", "id": 46551775, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/46551775?v=4", "html_url": "https:\/\/github.com\/commandermoon" }, "html_url": "https:\/\/github.com\/commandermoon\/CVE-2020-3952", "description": "Vuln Check", "fork": false, "created_at": "2020-04-15T00:51:21Z", "updated_at": "2020-04-16T01:41:31Z", "pushed_at": "2020-04-15T22:23:57Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 256080140, "name": "CVE-2020-3952", "full_name": "frustreated\/CVE-2020-3952", "owner": { "login": "frustreated", "id": 5463104, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5463104?v=4", "html_url": "https:\/\/github.com\/frustreated" }, "html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952", "description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell", "fork": false, "created_at": "2020-04-16T01:39:33Z", "updated_at": "2020-04-22T03:40:03Z", "pushed_at": "2020-04-15T00:13:59Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 3, "forks": 3, "watchers": 1, "score": 0 }, { "id": 256143992, "name": "vmware_vcenter_cve_2020_3952", "full_name": "guardicore\/vmware_vcenter_cve_2020_3952", "owner": { "login": "guardicore", "id": 5675395, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5675395?v=4", "html_url": "https:\/\/github.com\/guardicore" }, "html_url": "https:\/\/github.com\/guardicore\/vmware_vcenter_cve_2020_3952", "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", "updated_at": "2020-05-14T07:49:48Z", "pushed_at": "2020-04-16T08:38:42Z", "stargazers_count": 182, "watchers_count": 182, "forks_count": 37, "forks": 37, "watchers": 182, "score": 0 }, { "id": 256499271, "name": "CVE-2020-3952", "full_name": "gelim\/CVE-2020-3952", "owner": { "login": "gelim", "id": 179122, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/179122?v=4", "html_url": "https:\/\/github.com\/gelim" }, "html_url": "https:\/\/github.com\/gelim\/CVE-2020-3952", "description": "VMWare vmdir missing access control exploit checker", "fork": false, "created_at": "2020-04-17T12:39:31Z", "updated_at": "2020-04-17T17:09:08Z", "pushed_at": "2020-04-17T17:09:06Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 257074392, "name": "vmware_vcenter_cve_2020_3952", "full_name": "Fa1c0n35\/vmware_vcenter_cve_2020_3952", "owner": { "login": "Fa1c0n35", "id": 33335488, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33335488?v=4", "html_url": "https:\/\/github.com\/Fa1c0n35" }, "html_url": "https:\/\/github.com\/Fa1c0n35\/vmware_vcenter_cve_2020_3952", "description": "Exploit for CVE-2020-3952 in vCenter 6.7 https:\/\/www.guardicore.com\/2020\/04\/pwning-vmware-vcenter-cve-2020-3952\/", "fork": false, "created_at": "2020-04-19T18:35:13Z", "updated_at": "2020-04-19T18:57:16Z", "pushed_at": "2020-04-19T18:35:22Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 } ]