PoC-in-GitHub/2021/CVE-2021-28476.json

196 lines
6.7 KiB
JSON
Raw Normal View History

2024-11-28 19:31:51 +01:00
[
{
"id": 372590733,
"name": "CVE-2021-28476",
"full_name": "0vercl0k\/CVE-2021-28476",
"owner": {
"login": "0vercl0k",
"id": 1476421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
"html_url": "https:\/\/github.com\/0vercl0k",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-28476",
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2024-10-26T16:47:30Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 218,
"watchers_count": 218,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-28476",
"guest-to-host",
"hyper-v",
"network-service-provider",
"nvsp",
"rndis",
"vmswitch"
],
"visibility": "public",
"forks": 37,
"watchers": 218,
"score": 0,
"subscribers_count": 4
},
{
"id": 373204692,
"name": "CVE-2021-28476",
"full_name": "bluefrostsecurity\/CVE-2021-28476",
"owner": {
"login": "bluefrostsecurity",
"id": 4976074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
"html_url": "https:\/\/github.com\/bluefrostsecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2021-28476",
"description": null,
"fork": false,
"created_at": "2021-06-02T14:50:56Z",
2024-11-30 13:31:42 +01:00
"updated_at": "2024-11-30T08:01:38Z",
2024-11-28 19:31:51 +01:00
"pushed_at": "2021-06-02T14:54:14Z",
2024-11-30 13:31:42 +01:00
"stargazers_count": 10,
"watchers_count": 10,
2024-11-28 19:31:51 +01:00
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
2024-11-30 13:31:42 +01:00
"watchers": 10,
2024-11-28 19:31:51 +01:00
"score": 0,
"subscribers_count": 2
},
{
"id": 396338187,
"name": "CVE-2021-28476-tools-env",
"full_name": "LaCeeKa\/CVE-2021-28476-tools-env",
"owner": {
"login": "LaCeeKa",
"id": 88970302,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88970302?v=4",
"html_url": "https:\/\/github.com\/LaCeeKa",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LaCeeKa\/CVE-2021-28476-tools-env",
"description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
"fork": false,
"created_at": "2021-08-15T12:06:44Z",
"updated_at": "2024-10-26T16:43:59Z",
"pushed_at": "2021-08-15T11:44:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 448441625,
"name": "CVE-2021-28476",
"full_name": "australeo\/CVE-2021-28476",
"owner": {
"login": "australeo",
"id": 47684814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47684814?v=4",
"html_url": "https:\/\/github.com\/australeo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/australeo\/CVE-2021-28476",
"description": "CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM",
"fork": false,
"created_at": "2022-01-16T02:45:26Z",
2024-12-26 19:31:45 +01:00
"updated_at": "2024-12-26T13:58:06Z",
2024-11-28 19:31:51 +01:00
"pushed_at": "2022-01-16T02:46:22Z",
2024-12-26 19:31:45 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2024-11-28 19:31:51 +01:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2024-12-26 19:31:45 +01:00
"watchers": 3,
2024-11-28 19:31:51 +01:00
"score": 0,
"subscribers_count": 1
},
{
"id": 471563181,
"name": "0vercl0k",
"full_name": "2273852279qqs\/0vercl0k",
"owner": {
"login": "2273852279qqs",
"id": 101910961,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101910961?v=4",
"html_url": "https:\/\/github.com\/2273852279qqs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/2273852279qqs\/0vercl0k",
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2022-03-19T01:33:04Z",
"updated_at": "2022-03-19T01:33:04Z",
"pushed_at": "2022-03-19T01:33:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 482583152,
"name": "0vercl0k",
"full_name": "dengyang123x\/0vercl0k",
"owner": {
"login": "dengyang123x",
"id": 103896519,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103896519?v=4",
"html_url": "https:\/\/github.com\/dengyang123x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dengyang123x\/0vercl0k",
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2022-04-17T17:00:49Z",
"updated_at": "2022-05-31T07:42:57Z",
"pushed_at": "2022-04-17T17:00:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]