PoC-in-GitHub/2020/CVE-2020-1048.json
2025-01-11 21:32:17 +09:00

133 lines
No EOL
4.5 KiB
JSON

[
{
"id": 264008888,
"name": "CVE-2009-0229-PoC",
"full_name": "zveriu\/CVE-2009-0229-PoC",
"owner": {
"login": "zveriu",
"id": 3428446,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3428446?v=4",
"html_url": "https:\/\/github.com\/zveriu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zveriu\/CVE-2009-0229-PoC",
"description": "PoC for CVE-2009-0229 \"Print Spooler Read File Vulnerability\" LPE AFR (related to CVE-2020-1048)",
"fork": false,
"created_at": "2020-05-14T19:40:50Z",
"updated_at": "2024-09-14T22:12:59Z",
"pushed_at": "2020-05-15T11:32:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cybersecurity",
"exploits",
"poc",
"printer",
"windows"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 274483148,
"name": "CVE-2020-1048",
"full_name": "shubham0d\/CVE-2020-1048",
"owner": {
"login": "shubham0d",
"id": 12750163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
"html_url": "https:\/\/github.com\/shubham0d",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shubham0d\/CVE-2020-1048",
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
"fork": false,
"created_at": "2020-06-23T18:45:24Z",
"updated_at": "2024-08-12T20:03:01Z",
"pushed_at": "2020-06-25T12:22:06Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
{
"id": 297202950,
"name": "CVE-2020-1048",
"full_name": "Ken-Abruzzi\/CVE-2020-1048",
"owner": {
"login": "Ken-Abruzzi",
"id": 68931768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
"html_url": "https:\/\/github.com\/Ken-Abruzzi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/CVE-2020-1048",
"description": "An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'.",
"fork": false,
"created_at": "2020-09-21T01:59:38Z",
"updated_at": "2024-05-23T16:06:48Z",
"pushed_at": "2020-09-21T03:26:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 660602769,
"name": "cve-2020-1048",
"full_name": "Y3A\/cve-2020-1048",
"owner": {
"login": "Y3A",
"id": 62646606,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
"html_url": "https:\/\/github.com\/Y3A",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Y3A\/cve-2020-1048",
"description": "spoolsv.exe arb file write poc",
"fork": false,
"created_at": "2023-06-30T11:36:10Z",
"updated_at": "2023-06-30T11:36:30Z",
"pushed_at": "2023-06-30T11:36:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]