[ { "id": 241809572, "name": "CVE-2020-0668", "full_name": "RedCursorSecurityConsulting\/CVE-2020-0668", "owner": { "login": "RedCursorSecurityConsulting", "id": 61265565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61265565?v=4", "html_url": "https:\/\/github.com\/RedCursorSecurityConsulting", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668", "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", "updated_at": "2024-11-28T15:21:59Z", "pushed_at": "2020-02-20T11:03:18Z", "stargazers_count": 212, "watchers_count": 212, "has_discussions": false, "forks_count": 53, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 53, "watchers": 212, "score": 0, "subscribers_count": 7 }, { "id": 243248025, "name": "CVE-2020-0668", "full_name": "Nan3r\/CVE-2020-0668", "owner": { "login": "Nan3r", "id": 16438104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16438104?v=4", "html_url": "https:\/\/github.com\/Nan3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nan3r\/CVE-2020-0668", "description": "CVE-2020-0668", "fork": false, "created_at": "2020-02-26T11:37:29Z", "updated_at": "2024-08-12T19:58:08Z", "pushed_at": "2020-06-02T13:21:26Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 3 }, { "id": 243427813, "name": "SysTracingPoc", "full_name": "modulexcite\/SysTracingPoc", "owner": { "login": "modulexcite", "id": 12729391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12729391?v=4", "html_url": "https:\/\/github.com\/modulexcite", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/modulexcite\/SysTracingPoc", "description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2020-02-27T04:09:29Z", "updated_at": "2024-09-25T09:59:05Z", "pushed_at": "2020-02-26T09:24:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 23, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 422076432, "name": "CVE-2020-0668", "full_name": "ycdxsb\/CVE-2020-0668", "owner": { "login": "ycdxsb", "id": 32149596, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4", "html_url": "https:\/\/github.com\/ycdxsb", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ycdxsb\/CVE-2020-0668", "description": "Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903", "fork": false, "created_at": "2021-10-28T05:30:14Z", "updated_at": "2024-12-06T11:54:47Z", "pushed_at": "2021-12-07T03:33:56Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 13, "score": 0, "subscribers_count": 4 }, { "id": 422947746, "name": "CVE-2020-0668.exe", "full_name": "bypazs\/CVE-2020-0668.exe", "owner": { "login": "bypazs", "id": 5837953, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837953?v=4", "html_url": "https:\/\/github.com\/bypazs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bypazs\/CVE-2020-0668.exe", "description": null, "fork": false, "created_at": "2021-10-30T17:28:54Z", "updated_at": "2023-02-16T02:33:14Z", "pushed_at": "2021-10-30T17:30:15Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 810761849, "name": "Windows_Exploit", "full_name": "0xSs0rZ\/Windows_Exploit", "owner": { "login": "0xSs0rZ", "id": 53834222, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53834222?v=4", "html_url": "https:\/\/github.com\/0xSs0rZ", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xSs0rZ\/Windows_Exploit", "description": "CVE-2021-1675\/CVE-2021-34527 PrintNightmare & CVE-2020-0668", "fork": false, "created_at": "2024-06-05T10:01:18Z", "updated_at": "2024-06-05T10:04:29Z", "pushed_at": "2024-06-05T10:04:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]