PoC-in-GitHub/2020/CVE-2020-3952.json
2020-04-17 06:08:48 +09:00

71 lines
No EOL
2.4 KiB
JSON

[
{
"id": 255758745,
"name": "CVE-2020-3952",
"full_name": "curtbraz\/CVE-2020-3952",
"owner": {
"login": "curtbraz",
"id": 17833760,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17833760?v=4",
"html_url": "https:\/\/github.com\/curtbraz"
},
"html_url": "https:\/\/github.com\/curtbraz\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"fork": false,
"created_at": "2020-04-15T00:13:35Z",
"updated_at": "2020-04-16T13:28:59Z",
"pushed_at": "2020-04-15T00:13:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 255764753,
"name": "CVE-2020-3952",
"full_name": "commandermoon\/CVE-2020-3952",
"owner": {
"login": "commandermoon",
"id": 46551775,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/46551775?v=4",
"html_url": "https:\/\/github.com\/commandermoon"
},
"html_url": "https:\/\/github.com\/commandermoon\/CVE-2020-3952",
"description": "Vuln Check",
"fork": false,
"created_at": "2020-04-15T00:51:21Z",
"updated_at": "2020-04-16T01:41:31Z",
"pushed_at": "2020-04-15T22:23:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 256143992,
"name": "vmware_vcenter_cve_2020_3952",
"full_name": "guardicore\/vmware_vcenter_cve_2020_3952",
"owner": {
"login": "guardicore",
"id": 5675395,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5675395?v=4",
"html_url": "https:\/\/github.com\/guardicore"
},
"html_url": "https:\/\/github.com\/guardicore\/vmware_vcenter_cve_2020_3952",
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-04-16T20:46:04Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 8,
"forks": 8,
"watchers": 22,
"score": 0
}
]