[ { "id": 303511670, "name": "CVE-2020-16899", "full_name": "advanced-threat-research\/CVE-2020-16899", "owner": { "login": "advanced-threat-research", "id": 27901279, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4", "html_url": "https:\/\/github.com\/advanced-threat-research", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16899", "description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule", "fork": false, "created_at": "2020-10-12T20:59:03Z", "updated_at": "2024-11-04T19:19:38Z", "pushed_at": "2020-10-19T13:58:46Z", "stargazers_count": 21, "watchers_count": 21, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "atr", "buffer-overflow", "buffer-overflow-vulnerability", "cve", "cve-2020-16899", "icmpv6", "lua", "mcafee", "microsoft", "neighbor-discovery", "neighbor-discovery-protocol", "rce", "suricata", "suricata-rule", "tcpip-stack", "vulnerability", "windows-10" ], "visibility": "public", "forks": 9, "watchers": 21, "score": 0, "subscribers_count": 6 } ]