mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
48 lines
No EOL
1.6 KiB
JSON
48 lines
No EOL
1.6 KiB
JSON
[
|
|
{
|
|
"id": 303511670,
|
|
"name": "CVE-2020-16899",
|
|
"full_name": "advanced-threat-research\/CVE-2020-16899",
|
|
"owner": {
|
|
"login": "advanced-threat-research",
|
|
"id": 27901279,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
|
|
"html_url": "https:\/\/github.com\/advanced-threat-research"
|
|
},
|
|
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16899",
|
|
"description": "CVE-2020-16899 - Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
|
|
"fork": false,
|
|
"created_at": "2020-10-12T20:59:03Z",
|
|
"updated_at": "2020-11-19T21:34:47Z",
|
|
"pushed_at": "2020-10-19T13:58:46Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"forks_count": 6,
|
|
"forks": 6,
|
|
"watchers": 16,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 304597619,
|
|
"name": "CVE-2020-16899",
|
|
"full_name": "bkerler\/CVE-2020-16899",
|
|
"owner": {
|
|
"login": "bkerler",
|
|
"id": 6317772,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6317772?v=4",
|
|
"html_url": "https:\/\/github.com\/bkerler"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bkerler\/CVE-2020-16899",
|
|
"description": "Windows RDNSS RCE",
|
|
"fork": false,
|
|
"created_at": "2020-10-16T10:44:22Z",
|
|
"updated_at": "2020-10-16T18:38:19Z",
|
|
"pushed_at": "2020-10-16T00:15:14Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |