PoC-in-GitHub/2020/CVE-2020-6308.json
2024-11-29 03:31:51 +09:00

126 lines
No EOL
4.5 KiB
JSON

[
{
"id": 324738399,
"name": "CVE-2020-6308-PoC",
"full_name": "InitRoot\/CVE-2020-6308-PoC",
"owner": {
"login": "InitRoot",
"id": 954507,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/954507?v=4",
"html_url": "https:\/\/github.com\/InitRoot",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/InitRoot\/CVE-2020-6308-PoC",
"description": "PoC CVE-2020-6308",
"fork": false,
"created_at": "2020-12-27T10:37:11Z",
"updated_at": "2024-10-22T02:10:32Z",
"pushed_at": "2020-12-29T10:49:49Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 34,
"score": 0,
"subscribers_count": 3
},
{
"id": 325441552,
"name": "CVE-2020-6308-mass-exploiter",
"full_name": "freeFV\/CVE-2020-6308-mass-exploiter",
"owner": {
"login": "freeFV",
"id": 32540878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32540878?v=4",
"html_url": "https:\/\/github.com\/freeFV",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/freeFV\/CVE-2020-6308-mass-exploiter",
"description": "CVE-2020-6308 mass exploiter\/fuzzer.",
"fork": false,
"created_at": "2020-12-30T03:08:17Z",
"updated_at": "2021-02-08T13:43:16Z",
"pushed_at": "2020-11-24T23:13:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 399392671,
"name": "CVE-2020-6308",
"full_name": "TheMMMdev\/CVE-2020-6308",
"owner": {
"login": "TheMMMdev",
"id": 63477464,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63477464?v=4",
"html_url": "https:\/\/github.com\/TheMMMdev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TheMMMdev\/CVE-2020-6308",
"description": "Exploit script for SAP Business Objects SSRF",
"fork": false,
"created_at": "2021-08-24T08:36:11Z",
"updated_at": "2022-11-09T18:13:24Z",
"pushed_at": "2021-08-24T08:44:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 841517177,
"name": "sap_bo_launchpad-ssrf-timing_attack",
"full_name": "MachadoOtto\/sap_bo_launchpad-ssrf-timing_attack",
"owner": {
"login": "MachadoOtto",
"id": 93268441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93268441?v=4",
"html_url": "https:\/\/github.com\/MachadoOtto",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MachadoOtto\/sap_bo_launchpad-ssrf-timing_attack",
"description": "This script exploits and performs an SSRF (Server-Side Request Forgery) and Timing Attack against the SAP BusinessObjects Launchpad (CVE-2020-6308). It attempts to determine the status of various ports on a target IP address by measuring the response time of the application when attempting to authenticate against it.",
"fork": false,
"created_at": "2024-08-12T15:05:13Z",
"updated_at": "2024-08-12T15:14:35Z",
"pushed_at": "2024-08-12T15:14:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]