PoC-in-GitHub/2020/CVE-2020-3952.json
2020-08-20 12:08:33 +09:00

117 lines
No EOL
4.1 KiB
JSON

[
{
"id": 255764753,
"name": "CVE-2020-3952",
"full_name": "commandermoon\/CVE-2020-3952",
"owner": {
"login": "commandermoon",
"id": 46551775,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/46551775?v=4",
"html_url": "https:\/\/github.com\/commandermoon"
},
"html_url": "https:\/\/github.com\/commandermoon\/CVE-2020-3952",
"description": "Vuln Check",
"fork": false,
"created_at": "2020-04-15T00:51:21Z",
"updated_at": "2020-04-16T01:41:31Z",
"pushed_at": "2020-04-15T22:23:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 256080140,
"name": "CVE-2020-3952",
"full_name": "frustreated\/CVE-2020-3952",
"owner": {
"login": "frustreated",
"id": 5463104,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5463104?v=4",
"html_url": "https:\/\/github.com\/frustreated"
},
"html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952",
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
"fork": false,
"created_at": "2020-04-16T01:39:33Z",
"updated_at": "2020-05-22T15:50:01Z",
"pushed_at": "2020-04-15T00:13:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
},
{
"id": 256143992,
"name": "vmware_vcenter_cve_2020_3952",
"full_name": "guardicore\/vmware_vcenter_cve_2020_3952",
"owner": {
"login": "guardicore",
"id": 5675395,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5675395?v=4",
"html_url": "https:\/\/github.com\/guardicore"
},
"html_url": "https:\/\/github.com\/guardicore\/vmware_vcenter_cve_2020_3952",
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-08-12T16:23:10Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 193,
"watchers_count": 193,
"forks_count": 43,
"forks": 43,
"watchers": 193,
"score": 0
},
{
"id": 256499271,
"name": "CVE-2020-3952",
"full_name": "gelim\/CVE-2020-3952",
"owner": {
"login": "gelim",
"id": 179122,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/179122?v=4",
"html_url": "https:\/\/github.com\/gelim"
},
"html_url": "https:\/\/github.com\/gelim\/CVE-2020-3952",
"description": "VMWare vmdir missing access control exploit checker",
"fork": false,
"created_at": "2020-04-17T12:39:31Z",
"updated_at": "2020-04-17T17:09:08Z",
"pushed_at": "2020-04-17T17:09:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 257074392,
"name": "vmware_vcenter_cve_2020_3952",
"full_name": "Fa1c0n35\/vmware_vcenter_cve_2020_3952",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/vmware_vcenter_cve_2020_3952",
"description": "Exploit for CVE-2020-3952 in vCenter 6.7 https:\/\/www.guardicore.com\/2020\/04\/pwning-vmware-vcenter-cve-2020-3952\/",
"fork": false,
"created_at": "2020-04-19T18:35:13Z",
"updated_at": "2020-04-19T18:57:16Z",
"pushed_at": "2020-04-19T18:35:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]