mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
117 lines
No EOL
4.1 KiB
JSON
117 lines
No EOL
4.1 KiB
JSON
[
|
|
{
|
|
"id": 255764753,
|
|
"name": "CVE-2020-3952",
|
|
"full_name": "commandermoon\/CVE-2020-3952",
|
|
"owner": {
|
|
"login": "commandermoon",
|
|
"id": 46551775,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/46551775?v=4",
|
|
"html_url": "https:\/\/github.com\/commandermoon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/commandermoon\/CVE-2020-3952",
|
|
"description": "Vuln Check",
|
|
"fork": false,
|
|
"created_at": "2020-04-15T00:51:21Z",
|
|
"updated_at": "2020-04-16T01:41:31Z",
|
|
"pushed_at": "2020-04-15T22:23:57Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 256080140,
|
|
"name": "CVE-2020-3952",
|
|
"full_name": "frustreated\/CVE-2020-3952",
|
|
"owner": {
|
|
"login": "frustreated",
|
|
"id": 5463104,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5463104?v=4",
|
|
"html_url": "https:\/\/github.com\/frustreated"
|
|
},
|
|
"html_url": "https:\/\/github.com\/frustreated\/CVE-2020-3952",
|
|
"description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell",
|
|
"fork": false,
|
|
"created_at": "2020-04-16T01:39:33Z",
|
|
"updated_at": "2020-05-22T15:50:01Z",
|
|
"pushed_at": "2020-04-15T00:13:59Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 256143992,
|
|
"name": "vmware_vcenter_cve_2020_3952",
|
|
"full_name": "guardicore\/vmware_vcenter_cve_2020_3952",
|
|
"owner": {
|
|
"login": "guardicore",
|
|
"id": 5675395,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5675395?v=4",
|
|
"html_url": "https:\/\/github.com\/guardicore"
|
|
},
|
|
"html_url": "https:\/\/github.com\/guardicore\/vmware_vcenter_cve_2020_3952",
|
|
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
|
"fork": false,
|
|
"created_at": "2020-04-16T07:40:51Z",
|
|
"updated_at": "2020-08-12T16:23:10Z",
|
|
"pushed_at": "2020-04-16T08:38:42Z",
|
|
"stargazers_count": 193,
|
|
"watchers_count": 193,
|
|
"forks_count": 43,
|
|
"forks": 43,
|
|
"watchers": 193,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 256499271,
|
|
"name": "CVE-2020-3952",
|
|
"full_name": "gelim\/CVE-2020-3952",
|
|
"owner": {
|
|
"login": "gelim",
|
|
"id": 179122,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/179122?v=4",
|
|
"html_url": "https:\/\/github.com\/gelim"
|
|
},
|
|
"html_url": "https:\/\/github.com\/gelim\/CVE-2020-3952",
|
|
"description": "VMWare vmdir missing access control exploit checker",
|
|
"fork": false,
|
|
"created_at": "2020-04-17T12:39:31Z",
|
|
"updated_at": "2020-04-17T17:09:08Z",
|
|
"pushed_at": "2020-04-17T17:09:06Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 257074392,
|
|
"name": "vmware_vcenter_cve_2020_3952",
|
|
"full_name": "Fa1c0n35\/vmware_vcenter_cve_2020_3952",
|
|
"owner": {
|
|
"login": "Fa1c0n35",
|
|
"id": 33335488,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33335488?v=4",
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35\/vmware_vcenter_cve_2020_3952",
|
|
"description": "Exploit for CVE-2020-3952 in vCenter 6.7 https:\/\/www.guardicore.com\/2020\/04\/pwning-vmware-vcenter-cve-2020-3952\/",
|
|
"fork": false,
|
|
"created_at": "2020-04-19T18:35:13Z",
|
|
"updated_at": "2020-04-19T18:57:16Z",
|
|
"pushed_at": "2020-04-19T18:35:22Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |