[ { "id": 241809572, "name": "CVE-2020-0668", "full_name": "RedCursorSecurityConsulting\/CVE-2020-0668", "owner": { "login": "RedCursorSecurityConsulting", "id": 61265565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61265565?v=4", "html_url": "https:\/\/github.com\/RedCursorSecurityConsulting" }, "html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668", "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", "updated_at": "2023-12-30T21:40:01Z", "pushed_at": "2020-02-20T11:03:18Z", "stargazers_count": 197, "watchers_count": 197, "has_discussions": false, "forks_count": 56, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 56, "watchers": 197, "score": 0, "subscribers_count": 8 }, { "id": 243248025, "name": "CVE-2020-0668", "full_name": "Nan3r\/CVE-2020-0668", "owner": { "login": "Nan3r", "id": 16438104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16438104?v=4", "html_url": "https:\/\/github.com\/Nan3r" }, "html_url": "https:\/\/github.com\/Nan3r\/CVE-2020-0668", "description": "CVE-2020-0668", "fork": false, "created_at": "2020-02-26T11:37:29Z", "updated_at": "2023-09-28T11:11:45Z", "pushed_at": "2020-06-02T13:21:26Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 3 }, { "id": 243427813, "name": "SysTracingPoc", "full_name": "modulexcite\/SysTracingPoc", "owner": { "login": "modulexcite", "id": 12729391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12729391?v=4", "html_url": "https:\/\/github.com\/modulexcite" }, "html_url": "https:\/\/github.com\/modulexcite\/SysTracingPoc", "description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2020-02-27T04:09:29Z", "updated_at": "2023-07-24T16:19:26Z", "pushed_at": "2020-02-26T09:24:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 422076432, "name": "CVE-2020-0668", "full_name": "ycdxsb\/CVE-2020-0668", "owner": { "login": "ycdxsb", "id": 32149596, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4", "html_url": "https:\/\/github.com\/ycdxsb" }, "html_url": "https:\/\/github.com\/ycdxsb\/CVE-2020-0668", "description": "Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903", "fork": false, "created_at": "2021-10-28T05:30:14Z", "updated_at": "2023-05-06T22:06:15Z", "pushed_at": "2021-12-07T03:33:56Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 13, "score": 0, "subscribers_count": 4 }, { "id": 422947746, "name": "CVE-2020-0668.exe", "full_name": "bypazs\/CVE-2020-0668.exe", "owner": { "login": "bypazs", "id": 5837953, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837953?v=4", "html_url": "https:\/\/github.com\/bypazs" }, "html_url": "https:\/\/github.com\/bypazs\/CVE-2020-0668.exe", "description": null, "fork": false, "created_at": "2021-10-30T17:28:54Z", "updated_at": "2023-02-16T02:33:14Z", "pushed_at": "2021-10-30T17:30:15Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 } ]