2022-01-16 09:13:45 +09:00
[
2022-08-05 09:16:53 +09:00
{
"id" : 448387955 ,
"name" : "CVE-2022-21907" ,
"full_name" : "mauricelambert\/CVE-2022-21907" ,
"owner" : {
"login" : "mauricelambert" ,
"id" : 50479118 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4" ,
"html_url" : "https:\/\/github.com\/mauricelambert"
} ,
"html_url" : "https:\/\/github.com\/mauricelambert\/CVE-2022-21907" ,
"description" : "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube." ,
"fork" : false ,
"created_at" : "2022-01-15T20:50:25Z" ,
2022-12-26 21:22:03 +09:00
"updated_at" : "2022-12-26T10:37:36Z" ,
2022-08-05 09:16:53 +09:00
"pushed_at" : "2022-03-07T19:45:22Z" ,
2022-12-26 21:22:03 +09:00
"stargazers_count" : 26 ,
"watchers_count" : 26 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2023-05-11 03:29:06 +09:00
"forks_count" : 11 ,
2022-08-05 09:16:53 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"bluescreen" ,
"crash" ,
"cve" ,
"cve-2022-21907" ,
"denial-of-service" ,
"detection" ,
"dos" ,
"exploit" ,
"iis" ,
"metasploit" ,
"microsoft" ,
"nmap" ,
"payload" ,
"powershell" ,
"protection" ,
"python3" ,
"ruby" ,
"vulnerability" ,
"webserver"
] ,
"visibility" : "public" ,
2023-05-11 03:29:06 +09:00
"forks" : 11 ,
2022-12-26 21:22:03 +09:00
"watchers" : 26 ,
2022-08-05 09:16:53 +09:00
"score" : 0
} ,
2022-06-24 15:18:06 +09:00
{
"id" : 448952968 ,
"name" : "CVE-2022-21907-http.sys" ,
"full_name" : "p0dalirius\/CVE-2022-21907-http.sys" ,
"owner" : {
"login" : "p0dalirius" ,
"id" : 79218792 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4" ,
"html_url" : "https:\/\/github.com\/p0dalirius"
} ,
"html_url" : "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys" ,
"description" : "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers" ,
"fork" : false ,
"created_at" : "2022-01-17T15:42:37Z" ,
2023-06-03 15:29:15 +09:00
"updated_at" : "2023-06-03T03:44:48Z" ,
2022-06-24 15:18:06 +09:00
"pushed_at" : "2022-05-03T10:40:31Z" ,
2023-06-03 15:29:15 +09:00
"stargazers_count" : 76 ,
"watchers_count" : 76 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2023-04-03 21:30:10 +09:00
"forks_count" : 17 ,
2022-06-24 15:18:06 +09:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-06-24 15:18:06 +09:00
"topics" : [
"crash" ,
"cve-2022-21907" ,
"iis-server" ,
"poc" ,
"python" ,
"rce"
] ,
"visibility" : "public" ,
2023-04-03 21:30:10 +09:00
"forks" : 17 ,
2023-06-03 15:29:15 +09:00
"watchers" : 76 ,
2022-06-24 15:18:06 +09:00
"score" : 0
} ,
2022-08-05 09:16:53 +09:00
{
"id" : 477659433 ,
"name" : "CVE-2022-21907" ,
"full_name" : "polakow\/CVE-2022-21907" ,
"owner" : {
"login" : "polakow" ,
"id" : 53662773 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53662773?v=4" ,
"html_url" : "https:\/\/github.com\/polakow"
} ,
"html_url" : "https:\/\/github.com\/polakow\/CVE-2022-21907" ,
"description" : "A REAL DoS exploit for CVE-2022-21907" ,
"fork" : false ,
"created_at" : "2022-04-04T10:53:28Z" ,
2023-06-03 03:32:02 +09:00
"updated_at" : "2023-06-02T15:24:52Z" ,
2022-08-05 09:16:53 +09:00
"pushed_at" : "2022-04-13T05:48:04Z" ,
2023-06-03 03:32:02 +09:00
"stargazers_count" : 129 ,
"watchers_count" : 129 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2023-04-03 03:29:40 +09:00
"forks_count" : 32 ,
2022-08-05 09:16:53 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-04-03 03:29:40 +09:00
"forks" : 32 ,
2023-06-03 03:32:02 +09:00
"watchers" : 129 ,
2022-08-05 09:16:53 +09:00
"score" : 0
} ,
{
"id" : 482340383 ,
"name" : "nmap-CVE-2022-21907" ,
"full_name" : "gpiechnik2\/nmap-CVE-2022-21907" ,
"owner" : {
"login" : "gpiechnik2" ,
"id" : 48253270 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4" ,
"html_url" : "https:\/\/github.com\/gpiechnik2"
} ,
"html_url" : "https:\/\/github.com\/gpiechnik2\/nmap-CVE-2022-21907" ,
"description" : "Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations." ,
"fork" : false ,
"created_at" : "2022-04-16T19:13:27Z" ,
2022-08-30 21:17:08 +09:00
"updated_at" : "2022-08-30T10:49:35Z" ,
2022-08-05 09:16:53 +09:00
"pushed_at" : "2022-04-16T20:31:51Z" ,
2022-08-30 21:17:08 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2022-08-05 09:16:53 +09:00
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2022-21907" ,
"nmap" ,
"nse" ,
"script" ,
"vuln" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 1 ,
2022-08-30 21:17:08 +09:00
"watchers" : 1 ,
2022-08-05 09:16:53 +09:00
"score" : 0
} ,
2022-05-11 03:18:46 +09:00
{
"id" : 490768227 ,
"name" : "cve-2022-21907-http.sys" ,
"full_name" : "iveresk\/cve-2022-21907-http.sys" ,
"owner" : {
"login" : "iveresk" ,
"id" : 28754633 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4" ,
"html_url" : "https:\/\/github.com\/iveresk"
} ,
"html_url" : "https:\/\/github.com\/iveresk\/cve-2022-21907-http.sys" ,
"description" : "An unauthenticated attacker can send an HTTP request with an \"Accept-Encoding\" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash." ,
"fork" : false ,
"created_at" : "2022-05-10T16:00:50Z" ,
2022-05-22 21:15:05 +09:00
"updated_at" : "2022-05-22T07:39:33Z" ,
2022-05-25 03:17:49 +09:00
"pushed_at" : "2022-05-24T12:40:16Z" ,
2022-05-22 21:15:05 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2022-05-11 03:18:46 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-05-11 03:18:46 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-05-22 21:15:05 +09:00
"watchers" : 1 ,
2022-05-11 03:18:46 +09:00
"score" : 0
2022-05-17 03:15:39 +09:00
} ,
{
"id" : 492939533 ,
"name" : "cve-2022-21907" ,
"full_name" : "iveresk\/cve-2022-21907" ,
"owner" : {
"login" : "iveresk" ,
"id" : 28754633 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4" ,
"html_url" : "https:\/\/github.com\/iveresk"
} ,
"html_url" : "https:\/\/github.com\/iveresk\/cve-2022-21907" ,
"description" : "Multithread Golang application" ,
"fork" : false ,
"created_at" : "2022-05-16T17:42:45Z" ,
2022-07-04 03:16:08 +09:00
"updated_at" : "2022-07-03T17:01:53Z" ,
2022-06-10 21:17:39 +09:00
"pushed_at" : "2022-06-10T10:02:42Z" ,
2022-07-04 03:16:08 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2022-05-17 03:15:39 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-05-17 03:15:39 +09:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-07-04 03:16:08 +09:00
"watchers" : 1 ,
2022-05-17 03:15:39 +09:00
"score" : 0
2023-01-02 21:13:52 +09:00
} ,
{
"id" : 559316245 ,
"name" : "CVE-2022-21907" ,
"full_name" : "Malwareman007\/CVE-2022-21907" ,
"owner" : {
"login" : "Malwareman007" ,
"id" : 86009160 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4" ,
"html_url" : "https:\/\/github.com\/Malwareman007"
} ,
"html_url" : "https:\/\/github.com\/Malwareman007\/CVE-2022-21907" ,
"description" : "POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability." ,
"fork" : false ,
"created_at" : "2022-10-29T18:25:26Z" ,
2023-05-06 21:28:28 +09:00
"updated_at" : "2023-05-06T12:14:50Z" ,
2023-05-23 15:32:37 +09:00
"pushed_at" : "2023-05-23T04:06:51Z" ,
2023-05-06 21:28:28 +09:00
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
2023-01-02 21:13:52 +09:00
"has_discussions" : false ,
2023-02-10 21:31:15 +09:00
"forks_count" : 4 ,
2023-01-02 21:13:52 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2022-21907" ,
"exploit" ,
"http" ,
"http-protocol" ,
"poc" ,
"remote-code-execution" ,
"security" ,
"security-tools" ,
"vulnerability" ,
"vulnerability-scanners"
] ,
"visibility" : "public" ,
2023-02-10 21:31:15 +09:00
"forks" : 4 ,
2023-05-06 21:28:28 +09:00
"watchers" : 17 ,
2023-01-02 21:13:52 +09:00
"score" : 0
} ,
{
"id" : 569183785 ,
"name" : "Home-Demolisher" ,
"full_name" : "0xmaximus\/Home-Demolisher" ,
"owner" : {
"login" : "0xmaximus" ,
"id" : 63053441 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4" ,
"html_url" : "https:\/\/github.com\/0xmaximus"
} ,
"html_url" : "https:\/\/github.com\/0xmaximus\/Home-Demolisher" ,
"description" : "PoC for CVE-2021-31166 and CVE-2022-21907" ,
"fork" : false ,
"created_at" : "2022-11-22T09:10:36Z" ,
2023-04-05 09:28:23 +09:00
"updated_at" : "2023-04-04T20:32:49Z" ,
2023-01-02 21:13:52 +09:00
"pushed_at" : "2022-12-08T11:05:50Z" ,
2023-04-05 09:28:23 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-01-02 21:13:52 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-04-05 09:28:23 +09:00
"watchers" : 3 ,
2023-01-02 21:13:52 +09:00
"score" : 0
2023-05-06 21:28:28 +09:00
} ,
2023-05-17 21:30:09 +09:00
{
"id" : 632224259 ,
"name" : "CVE-2022-21907" ,
"full_name" : "cassie0206\/CVE-2022-21907" ,
"owner" : {
"login" : "cassie0206" ,
"id" : 90564331 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/90564331?v=4" ,
"html_url" : "https:\/\/github.com\/cassie0206"
} ,
"html_url" : "https:\/\/github.com\/cassie0206\/CVE-2022-21907" ,
"description" : "2022 Spring Prof. 謝續平" ,
"fork" : false ,
"created_at" : "2023-04-25T01:13:51Z" ,
"updated_at" : "2023-05-17T08:52:27Z" ,
"pushed_at" : "2023-04-25T10:36:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2023-05-06 21:28:28 +09:00
{
"id" : 637001964 ,
"name" : "CVE-2022-21907-RCE" ,
"full_name" : "EzoomE\/CVE-2022-21907-RCE" ,
"owner" : {
"login" : "EzoomE" ,
"id" : 99851303 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/99851303?v=4" ,
"html_url" : "https:\/\/github.com\/EzoomE"
} ,
"html_url" : "https:\/\/github.com\/EzoomE\/CVE-2022-21907-RCE" ,
"description" : "CVE-2022-21907漏洞RCE PoC" ,
"fork" : false ,
"created_at" : "2023-05-06T07:50:08Z" ,
"updated_at" : "2023-05-06T07:50:53Z" ,
2023-05-22 15:29:20 +09:00
"pushed_at" : "2023-05-22T03:14:17Z" ,
2023-05-06 21:28:28 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-01-16 09:13:45 +09:00
}
]