PoC-in-GitHub/2020/CVE-2020-0668.json
2024-12-31 03:32:02 +09:00

188 lines
No EOL
6.4 KiB
JSON

[
{
"id": 241809572,
"name": "CVE-2020-0668",
"full_name": "RedCursorSecurityConsulting\/CVE-2020-0668",
"owner": {
"login": "RedCursorSecurityConsulting",
"id": 61265565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61265565?v=4",
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668",
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2024-12-10T09:41:30Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 213,
"score": 0,
"subscribers_count": 7
},
{
"id": 243248025,
"name": "CVE-2020-0668",
"full_name": "Nan3r\/CVE-2020-0668",
"owner": {
"login": "Nan3r",
"id": 16438104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16438104?v=4",
"html_url": "https:\/\/github.com\/Nan3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nan3r\/CVE-2020-0668",
"description": "CVE-2020-0668",
"fork": false,
"created_at": "2020-02-26T11:37:29Z",
"updated_at": "2024-08-12T19:58:08Z",
"pushed_at": "2020-06-02T13:21:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 3
},
{
"id": 243427813,
"name": "SysTracingPoc",
"full_name": "modulexcite\/SysTracingPoc",
"owner": {
"login": "modulexcite",
"id": 12729391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12729391?v=4",
"html_url": "https:\/\/github.com\/modulexcite",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/modulexcite\/SysTracingPoc",
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2020-02-27T04:09:29Z",
"updated_at": "2024-12-30T14:35:51Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 422076432,
"name": "CVE-2020-0668",
"full_name": "ycdxsb\/CVE-2020-0668",
"owner": {
"login": "ycdxsb",
"id": 32149596,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4",
"html_url": "https:\/\/github.com\/ycdxsb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ycdxsb\/CVE-2020-0668",
"description": "Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903",
"fork": false,
"created_at": "2021-10-28T05:30:14Z",
"updated_at": "2024-12-06T11:54:47Z",
"pushed_at": "2021-12-07T03:33:56Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"score": 0,
"subscribers_count": 4
},
{
"id": 422947746,
"name": "CVE-2020-0668.exe",
"full_name": "bypazs\/CVE-2020-0668.exe",
"owner": {
"login": "bypazs",
"id": 5837953,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837953?v=4",
"html_url": "https:\/\/github.com\/bypazs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bypazs\/CVE-2020-0668.exe",
"description": null,
"fork": false,
"created_at": "2021-10-30T17:28:54Z",
"updated_at": "2023-02-16T02:33:14Z",
"pushed_at": "2021-10-30T17:30:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 810761849,
"name": "Windows_Exploit",
"full_name": "0xSs0rZ\/Windows_Exploit",
"owner": {
"login": "0xSs0rZ",
"id": 53834222,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53834222?v=4",
"html_url": "https:\/\/github.com\/0xSs0rZ",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xSs0rZ\/Windows_Exploit",
"description": "CVE-2021-1675\/CVE-2021-34527 PrintNightmare & CVE-2020-0668",
"fork": false,
"created_at": "2024-06-05T10:01:18Z",
"updated_at": "2024-06-05T10:04:29Z",
"pushed_at": "2024-06-05T10:04:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]