PoC-in-GitHub/2020/CVE-2020-0668.json
2022-04-08 03:15:15 +09:00

137 lines
No EOL
4.6 KiB
JSON

[
{
"id": 214392452,
"name": "SysTracingPoc",
"full_name": "itm4n\/SysTracingPoc",
"owner": {
"login": "itm4n",
"id": 30777390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30777390?v=4",
"html_url": "https:\/\/github.com\/itm4n"
},
"html_url": "https:\/\/github.com\/itm4n\/SysTracingPoc",
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2022-04-07T15:20:33Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 89,
"score": 0
},
{
"id": 241809572,
"name": "CVE-2020-0668",
"full_name": "RedCursorSecurityConsulting\/CVE-2020-0668",
"owner": {
"login": "RedCursorSecurityConsulting",
"id": 61265565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61265565?v=4",
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting"
},
"html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668",
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2022-01-13T11:57:23Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 191,
"score": 0
},
{
"id": 243248025,
"name": "CVE-2020-0668",
"full_name": "Nan3r\/CVE-2020-0668",
"owner": {
"login": "Nan3r",
"id": 16438104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16438104?v=4",
"html_url": "https:\/\/github.com\/Nan3r"
},
"html_url": "https:\/\/github.com\/Nan3r\/CVE-2020-0668",
"description": "CVE-2020-0668",
"fork": false,
"created_at": "2020-02-26T11:37:29Z",
"updated_at": "2021-12-05T20:35:06Z",
"pushed_at": "2020-06-02T13:21:26Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"score": 0
},
{
"id": 422076432,
"name": "CVE-2020-0668",
"full_name": "ycdxsb\/CVE-2020-0668",
"owner": {
"login": "ycdxsb",
"id": 32149596,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4",
"html_url": "https:\/\/github.com\/ycdxsb"
},
"html_url": "https:\/\/github.com\/ycdxsb\/CVE-2020-0668",
"description": "Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903",
"fork": false,
"created_at": "2021-10-28T05:30:14Z",
"updated_at": "2021-12-15T14:43:17Z",
"pushed_at": "2021-12-07T03:33:56Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 13,
"score": 0
},
{
"id": 422947746,
"name": "CVE-2020-0668",
"full_name": "bypazs\/CVE-2020-0668",
"owner": {
"login": "bypazs",
"id": 5837953,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837953?v=4",
"html_url": "https:\/\/github.com\/bypazs"
},
"html_url": "https:\/\/github.com\/bypazs\/CVE-2020-0668",
"description": null,
"fork": false,
"created_at": "2021-10-30T17:28:54Z",
"updated_at": "2021-10-30T17:30:17Z",
"pushed_at": "2021-10-30T17:30:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]