PoC-in-GitHub/2020/CVE-2020-16899.json
2024-11-29 03:31:51 +09:00

51 lines
No EOL
1.6 KiB
JSON

[
{
"id": 303511670,
"name": "CVE-2020-16899",
"full_name": "advanced-threat-research\/CVE-2020-16899",
"owner": {
"login": "advanced-threat-research",
"id": 27901279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
"html_url": "https:\/\/github.com\/advanced-threat-research",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16899",
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-12T20:59:03Z",
"updated_at": "2024-11-04T19:19:38Z",
"pushed_at": "2020-10-19T13:58:46Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"atr",
"buffer-overflow",
"buffer-overflow-vulnerability",
"cve",
"cve-2020-16899",
"icmpv6",
"lua",
"mcafee",
"microsoft",
"neighbor-discovery",
"neighbor-discovery-protocol",
"rce",
"suricata",
"suricata-rule",
"tcpip-stack",
"vulnerability",
"windows-10"
],
"visibility": "public",
"forks": 9,
"watchers": 21,
"score": 0,
"subscribers_count": 6
}
]