PoC-in-GitHub/2020/CVE-2020-0668.json
2022-11-10 03:18:06 +09:00

147 lines
No EOL
5 KiB
JSON

[
{
"id": 214392452,
"name": "SysTracingPoc",
"full_name": "itm4n\/SysTracingPoc",
"owner": {
"login": "itm4n",
"id": 30777390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30777390?v=4",
"html_url": "https:\/\/github.com\/itm4n"
},
"html_url": "https:\/\/github.com\/itm4n\/SysTracingPoc",
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2022-11-09T18:04:53Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 99,
"score": 0
},
{
"id": 241809572,
"name": "CVE-2020-0668",
"full_name": "RedCursorSecurityConsulting\/CVE-2020-0668",
"owner": {
"login": "RedCursorSecurityConsulting",
"id": 61265565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61265565?v=4",
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting"
},
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668",
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2022-11-09T18:06:22Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 192,
"watchers_count": 192,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 192,
"score": 0
},
{
"id": 243248025,
"name": "CVE-2020-0668",
"full_name": "Nan3r\/CVE-2020-0668",
"owner": {
"login": "Nan3r",
"id": 16438104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16438104?v=4",
"html_url": "https:\/\/github.com\/Nan3r"
},
"html_url": "https:\/\/github.com\/Nan3r\/CVE-2020-0668",
"description": "CVE-2020-0668",
"fork": false,
"created_at": "2020-02-26T11:37:29Z",
"updated_at": "2022-07-23T07:57:24Z",
"pushed_at": "2020-06-02T13:21:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0
},
{
"id": 422076432,
"name": "CVE-2020-0668",
"full_name": "ycdxsb\/CVE-2020-0668",
"owner": {
"login": "ycdxsb",
"id": 32149596,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4",
"html_url": "https:\/\/github.com\/ycdxsb"
},
"html_url": "https:\/\/github.com\/ycdxsb\/CVE-2020-0668",
"description": "Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903",
"fork": false,
"created_at": "2021-10-28T05:30:14Z",
"updated_at": "2022-11-09T18:14:14Z",
"pushed_at": "2021-12-07T03:33:56Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"score": 0
},
{
"id": 422947746,
"name": "CVE-2020-0668",
"full_name": "bypazs\/CVE-2020-0668",
"owner": {
"login": "bypazs",
"id": 5837953,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837953?v=4",
"html_url": "https:\/\/github.com\/bypazs"
},
"html_url": "https:\/\/github.com\/bypazs\/CVE-2020-0668",
"description": null,
"fork": false,
"created_at": "2021-10-30T17:28:54Z",
"updated_at": "2021-10-30T17:30:17Z",
"pushed_at": "2021-10-30T17:30:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]