PoC-in-GitHub/2020/CVE-2020-15778.json
2025-11-26 09:43:12 +09:00

126 lines
No EOL
4.4 KiB
JSON

[
{
"id": 280587151,
"name": "CVE-2020-15778",
"full_name": "cpandya2909\/CVE-2020-15778",
"owner": {
"login": "cpandya2909",
"id": 22931812,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22931812?v=4",
"html_url": "https:\/\/github.com\/cpandya2909",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cpandya2909\/CVE-2020-15778",
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
"updated_at": "2025-11-25T20:09:28Z",
"pushed_at": "2023-03-27T14:08:14Z",
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 143,
"score": 0,
"subscribers_count": 5
},
{
"id": 386119933,
"name": "CVE-2020-15778-Exploit",
"full_name": "Neko-chanQwQ\/CVE-2020-15778-Exploit",
"owner": {
"login": "Neko-chanQwQ",
"id": 83222283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4",
"html_url": "https:\/\/github.com\/Neko-chanQwQ",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Neko-chanQwQ\/CVE-2020-15778-Exploit",
"description": "Exploit for CVE-2020-15778(OpenSSH vul)",
"fork": false,
"created_at": "2021-07-15T01:04:24Z",
"updated_at": "2025-10-22T20:20:05Z",
"pushed_at": "2022-02-18T08:04:46Z",
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},
{
"id": 697473781,
"name": "CVE-2020-15778",
"full_name": "Evan-Zhangyf\/CVE-2020-15778",
"owner": {
"login": "Evan-Zhangyf",
"id": 53845683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53845683?v=4",
"html_url": "https:\/\/github.com\/Evan-Zhangyf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Evan-Zhangyf\/CVE-2020-15778",
"description": null,
"fork": false,
"created_at": "2023-09-27T19:58:18Z",
"updated_at": "2025-08-10T13:08:12Z",
"pushed_at": "2023-09-27T20:34:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 1027939821,
"name": "CVE-2020-15778-SCP-Command-Injection-Check",
"full_name": "drackyjr\/CVE-2020-15778-SCP-Command-Injection-Check",
"owner": {
"login": "drackyjr",
"id": 146464209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146464209?v=4",
"html_url": "https:\/\/github.com\/drackyjr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/drackyjr\/CVE-2020-15778-SCP-Command-Injection-Check",
"description": "This script is a safe and simple tool that helps system users, students, and administrators check if their SCP (Secure Copy) client is vulnerable to CVE-2020-15778, a command injection vulnerability in OpenSSH SCP (versions ≤ 8.3p1).",
"fork": false,
"created_at": "2025-07-28T19:06:31Z",
"updated_at": "2025-08-19T14:17:06Z",
"pushed_at": "2025-07-28T19:17:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]