PoC-in-GitHub/2021/CVE-2021-28476.json

184 lines
6.3 KiB
JSON
Raw Normal View History

2021-06-01 06:11:32 +09:00
[
2022-08-05 09:16:53 +09:00
{
"id": 372590733,
"name": "CVE-2021-28476",
"full_name": "0vercl0k\/CVE-2021-28476",
"owner": {
"login": "0vercl0k",
"id": 1476421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
"html_url": "https:\/\/github.com\/0vercl0k"
},
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-28476",
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
2023-03-02 21:28:42 +09:00
"updated_at": "2023-03-02T11:36:20Z",
2022-08-05 09:16:53 +09:00
"pushed_at": "2021-06-01T15:08:23Z",
2023-03-02 21:28:42 +09:00
"stargazers_count": 209,
"watchers_count": 209,
2022-11-08 09:17:44 +09:00
"has_discussions": false,
2023-05-11 03:29:06 +09:00
"forks_count": 37,
2022-08-05 09:16:53 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-28476",
"guest-to-host",
"hyper-v",
"network-service-provider",
"nvsp",
"rndis",
"vmswitch"
],
"visibility": "public",
2023-05-11 03:29:06 +09:00
"forks": 37,
2023-03-02 21:28:42 +09:00
"watchers": 209,
2022-08-05 09:16:53 +09:00
"score": 0
},
{
"id": 373204692,
"name": "CVE-2021-28476",
"full_name": "bluefrostsecurity\/CVE-2021-28476",
"owner": {
"login": "bluefrostsecurity",
"id": 4976074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
"html_url": "https:\/\/github.com\/bluefrostsecurity"
},
"html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2021-28476",
"description": null,
"fork": false,
"created_at": "2021-06-02T14:50:56Z",
"updated_at": "2021-11-09T18:21:53Z",
"pushed_at": "2021-06-02T14:54:14Z",
"stargazers_count": 10,
"watchers_count": 10,
2022-11-08 09:17:44 +09:00
"has_discussions": false,
2022-08-05 09:16:53 +09:00
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"score": 0
2023-01-02 21:13:52 +09:00
},
2023-05-25 15:30:32 +09:00
{
"id": 396338187,
"name": "CVE-2021-28476-tools-env",
"full_name": "LaCeeKa\/CVE-2021-28476-tools-env",
"owner": {
"login": "LaCeeKa",
"id": 88970302,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88970302?v=4",
"html_url": "https:\/\/github.com\/LaCeeKa"
},
"html_url": "https:\/\/github.com\/LaCeeKa\/CVE-2021-28476-tools-env",
"description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
"fork": false,
"created_at": "2021-08-15T12:06:44Z",
"updated_at": "2021-10-04T16:45:05Z",
"pushed_at": "2021-08-15T11:44:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
2023-01-07 09:35:14 +09:00
{
"id": 448441625,
"name": "CVE-2021-28476",
"full_name": "australeo\/CVE-2021-28476",
"owner": {
"login": "australeo",
"id": 47684814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47684814?v=4",
"html_url": "https:\/\/github.com\/australeo"
},
"html_url": "https:\/\/github.com\/australeo\/CVE-2021-28476",
"description": "CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM",
"fork": false,
"created_at": "2022-01-16T02:45:26Z",
2023-01-20 21:30:27 +09:00
"updated_at": "2023-01-20T10:49:14Z",
2023-01-07 09:35:14 +09:00
"pushed_at": "2022-01-16T02:46:22Z",
2023-01-20 21:30:27 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2023-01-07 09:35:14 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-01-20 21:30:27 +09:00
"watchers": 2,
2023-01-07 09:35:14 +09:00
"score": 0
},
{
"id": 471563181,
"name": "0vercl0k",
"full_name": "2273852279qqs\/0vercl0k",
"owner": {
"login": "2273852279qqs",
"id": 101910961,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101910961?v=4",
"html_url": "https:\/\/github.com\/2273852279qqs"
},
"html_url": "https:\/\/github.com\/2273852279qqs\/0vercl0k",
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2022-03-19T01:33:04Z",
"updated_at": "2022-03-19T01:33:04Z",
"pushed_at": "2022-03-19T01:33:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 482583152,
"name": "0vercl0k",
"full_name": "dengyang123x\/0vercl0k",
"owner": {
"login": "dengyang123x",
"id": 103896519,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103896519?v=4",
"html_url": "https:\/\/github.com\/dengyang123x"
},
"html_url": "https:\/\/github.com\/dengyang123x\/0vercl0k",
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2022-04-17T17:00:49Z",
"updated_at": "2022-05-31T07:42:57Z",
"pushed_at": "2022-04-17T17:00:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
2021-06-01 06:11:32 +09:00
}
]