38 lines
No EOL
1.2 KiB
JSON
38 lines
No EOL
1.2 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2020-1066-EXP",
|
|
"full_name": "cbwang505/CVE-2020-1066-EXP",
|
|
"html_url": "https://github.com/cbwang505/CVE-2020-1066-EXP",
|
|
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
|
"stargazers_count": 185,
|
|
"forks_count": 44,
|
|
"created_at": "2020-06-01T04:44:05Z"
|
|
},
|
|
{
|
|
"name": "CVE-2020-10665",
|
|
"full_name": "spaceraccoon/CVE-2020-10665",
|
|
"html_url": "https://github.com/spaceraccoon/CVE-2020-10665",
|
|
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
|
|
"stargazers_count": 53,
|
|
"forks_count": 17,
|
|
"created_at": "2020-06-25T07:35:29Z"
|
|
},
|
|
{
|
|
"name": "json_cve_2020_10663",
|
|
"full_name": "rails-lts/json_cve_2020_10663",
|
|
"html_url": "https://github.com/rails-lts/json_cve_2020_10663",
|
|
"description": "Workaround for CVE-2020-10663 (vulnerability in json gem)",
|
|
"stargazers_count": 3,
|
|
"forks_count": 2,
|
|
"created_at": "2020-03-24T09:53:23Z"
|
|
},
|
|
{
|
|
"name": "cve-2020-1066",
|
|
"full_name": "xyddnljydd/cve-2020-1066",
|
|
"html_url": "https://github.com/xyddnljydd/cve-2020-1066",
|
|
"description": null,
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2021-03-07T06:55:26Z"
|
|
}
|
|
] |