PoC-in-GitHub/2021/CVE-2021-36260.json

110 lines
3.8 KiB
JSON
Raw Normal View History

2021-10-18 11:13:17 +02:00
[
{
"id": 418375861,
"name": "CVE-2021-36260",
"full_name": "rabbitsafe\/CVE-2021-36260",
"owner": {
"login": "rabbitsafe",
"id": 33046073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
"html_url": "https:\/\/github.com\/rabbitsafe"
},
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-36260",
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-10-18T06:40:48Z",
2022-01-06 13:14:16 +01:00
"updated_at": "2022-01-06T10:35:20Z",
2021-11-23 13:13:15 +01:00
"pushed_at": "2021-11-23T07:26:03Z",
2022-01-06 13:14:16 +01:00
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
2021-10-18 11:13:17 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-06 13:14:16 +01:00
"forks": 5,
"watchers": 11,
2021-10-27 23:14:40 +02:00
"score": 0
},
{
"id": 421880973,
"name": "CVE-2021-36260",
"full_name": "Aiminsun\/CVE-2021-36260",
"owner": {
"login": "Aiminsun",
"id": 58260225,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4",
"html_url": "https:\/\/github.com\/Aiminsun"
},
"html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260",
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
2022-02-07 13:14:11 +01:00
"updated_at": "2022-02-07T10:57:51Z",
2021-10-28 11:15:29 +02:00
"pushed_at": "2021-10-28T06:37:37Z",
2022-02-07 13:14:11 +01:00
"stargazers_count": 86,
"watchers_count": 86,
2022-01-27 13:14:14 +01:00
"forks_count": 40,
2021-10-27 23:14:40 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-27 13:14:14 +01:00
"forks": 40,
2022-02-07 13:14:11 +01:00
"watchers": 86,
2021-10-18 11:13:17 +02:00
"score": 0
2021-11-03 13:14:23 +01:00
},
{
"id": 424140037,
"name": "CVE-2021-36260-metasploit",
"full_name": "TaroballzChen\/CVE-2021-36260-metasploit",
"owner": {
"login": "TaroballzChen",
"id": 27862593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
"html_url": "https:\/\/github.com\/TaroballzChen"
},
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-36260-metasploit",
"description": "the metasploit script(POC) about CVE-2021-36260 ",
"fork": false,
"created_at": "2021-11-03T08:11:49Z",
2022-01-28 07:14:15 +01:00
"updated_at": "2022-01-28T05:27:02Z",
2021-11-03 13:14:23 +01:00
"pushed_at": "2021-11-03T08:26:24Z",
2022-01-28 07:14:15 +01:00
"stargazers_count": 8,
"watchers_count": 8,
2021-12-27 07:13:34 +01:00
"forks_count": 5,
2021-11-03 13:14:23 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-27 07:13:34 +01:00
"forks": 5,
2022-01-28 07:14:15 +01:00
"watchers": 8,
2021-11-03 13:14:23 +01:00
"score": 0
2021-12-13 13:13:34 +01:00
},
{
"id": 437809411,
"name": "CheckHKRCE",
"full_name": "tuntin9x\/CheckHKRCE",
"owner": {
"login": "tuntin9x",
"id": 42837549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42837549?v=4",
"html_url": "https:\/\/github.com\/tuntin9x"
},
"html_url": "https:\/\/github.com\/tuntin9x\/CheckHKRCE",
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-12-13T09:23:36Z",
2022-02-03 01:14:09 +01:00
"updated_at": "2022-02-02T18:44:17Z",
2021-12-13 19:13:40 +01:00
"pushed_at": "2021-12-13T15:12:19Z",
2022-02-03 01:14:09 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2022-01-03 19:14:04 +01:00
"forks_count": 2,
2021-12-13 13:13:34 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-03 19:14:04 +01:00
"forks": 2,
2022-02-03 01:14:09 +01:00
"watchers": 1,
2021-12-13 13:13:34 +01:00
"score": 0
2021-10-18 11:13:17 +02:00
}
]