PoC-in-GitHub/2020/CVE-2020-3153.json
2020-11-07 06:09:06 +09:00

71 lines
No EOL
2.5 KiB
JSON

[
{
"id": 261266121,
"name": "CVE-2020-3153",
"full_name": "shubham0d\/CVE-2020-3153",
"owner": {
"login": "shubham0d",
"id": 12750163,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12750163?v=4",
"html_url": "https:\/\/github.com\/shubham0d"
},
"html_url": "https:\/\/github.com\/shubham0d\/CVE-2020-3153",
"description": "POC code for CVE-2020-3153 - Cisco anyconnect path traversal vulnerability",
"fork": false,
"created_at": "2020-05-04T18:36:22Z",
"updated_at": "2020-05-15T06:51:12Z",
"pushed_at": "2020-05-04T19:34:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 264178303,
"name": "CVE-2020-3153",
"full_name": "raspberry-pie\/CVE-2020-3153",
"owner": {
"login": "raspberry-pie",
"id": 20641947,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20641947?v=4",
"html_url": "https:\/\/github.com\/raspberry-pie"
},
"html_url": "https:\/\/github.com\/raspberry-pie\/CVE-2020-3153",
"description": "PoC for CVE-2020-3153 Cisco AnyConnect Secure Mobility Client EoP",
"fork": false,
"created_at": "2020-05-15T11:40:02Z",
"updated_at": "2020-05-15T11:42:14Z",
"pushed_at": "2020-05-15T11:42:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 265337436,
"name": "CVE-2020-3153",
"full_name": "goichot\/CVE-2020-3153",
"owner": {
"login": "goichot",
"id": 8002862,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8002862?v=4",
"html_url": "https:\/\/github.com\/goichot"
},
"html_url": "https:\/\/github.com\/goichot\/CVE-2020-3153",
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false,
"created_at": "2020-05-19T18:59:26Z",
"updated_at": "2020-11-06T17:44:10Z",
"pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 18,
"forks": 18,
"watchers": 88,
"score": 0
}
]