PoC-in-GitHub/2021/CVE-2021-21551.json

94 lines
3.3 KiB
JSON
Raw Normal View History

2021-05-13 17:11:40 +02:00
[
{
"id": 367056155,
"name": "CVE-2021-21551",
"full_name": "waldo-irc\/CVE-2021-21551",
"owner": {
"login": "waldo-irc",
"id": 10516272,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10516272?v=4",
"html_url": "https:\/\/github.com\/waldo-irc"
},
"html_url": "https:\/\/github.com\/waldo-irc\/CVE-2021-21551",
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
2021-05-27 17:12:26 +02:00
"updated_at": "2021-05-27T12:41:47Z",
2021-05-20 23:11:37 +02:00
"pushed_at": "2021-05-20T20:33:09Z",
2021-05-27 17:12:26 +02:00
"stargazers_count": 199,
"watchers_count": 199,
2021-05-26 23:11:43 +02:00
"forks_count": 33,
"forks": 33,
2021-05-27 17:12:26 +02:00
"watchers": 199,
2021-05-21 11:11:51 +02:00
"score": 0
},
{
"id": 369400184,
"name": "CVE-2021-21551",
"full_name": "ch3rn0byl\/CVE-2021-21551",
"owner": {
"login": "ch3rn0byl",
"id": 13082307,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13082307?v=4",
"html_url": "https:\/\/github.com\/ch3rn0byl"
},
"html_url": "https:\/\/github.com\/ch3rn0byl\/CVE-2021-21551",
"description": null,
"fork": false,
"created_at": "2021-05-21T03:13:58Z",
2021-05-22 11:12:15 +02:00
"updated_at": "2021-05-22T07:35:14Z",
2021-05-21 11:11:51 +02:00
"pushed_at": "2021-05-21T03:24:25Z",
2021-05-22 11:12:15 +02:00
"stargazers_count": 6,
"watchers_count": 6,
2021-05-21 11:11:51 +02:00
"forks_count": 0,
"forks": 0,
2021-05-22 11:12:15 +02:00
"watchers": 6,
2021-05-13 17:11:40 +02:00
"score": 0
2021-05-28 11:11:58 +02:00
},
{
"id": 371617838,
"name": "PS-CVE-2021-21551",
"full_name": "arnaudluti\/PS-CVE-2021-21551",
"owner": {
"login": "arnaudluti",
"id": 41639163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41639163?v=4",
"html_url": "https:\/\/github.com\/arnaudluti"
},
"html_url": "https:\/\/github.com\/arnaudluti\/PS-CVE-2021-21551",
"description": "Script to patch your domain computers about the CVE-2021-21551. Privesc on machines that have the driver dbutil_2_3.sys, installed by some DELL tools (BIOS updater, SupportAssist...)",
"fork": false,
"created_at": "2021-05-28T07:29:40Z",
"updated_at": "2021-05-28T08:37:46Z",
"pushed_at": "2021-05-28T07:46:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
2021-05-30 17:11:34 +02:00
},
{
"id": 372182222,
"name": "CVE-2021-21551",
"full_name": "mathisvickie\/CVE-2021-21551",
"owner": {
"login": "mathisvickie",
"id": 60326914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60326914?v=4",
"html_url": "https:\/\/github.com\/mathisvickie"
},
"html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-21551",
2021-06-03 17:12:05 +02:00
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
2021-05-30 17:11:34 +02:00
"fork": false,
"created_at": "2021-05-30T10:15:10Z",
2021-06-03 23:13:13 +02:00
"updated_at": "2021-06-03T17:32:02Z",
2021-06-03 17:12:05 +02:00
"pushed_at": "2021-06-03T14:47:05Z",
2021-06-01 23:11:55 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-05-30 17:11:34 +02:00
"forks_count": 0,
"forks": 0,
2021-06-01 23:11:55 +02:00
"watchers": 0,
2021-05-30 17:11:34 +02:00
"score": 0
2021-05-13 17:11:40 +02:00
}
]