2021-05-17 06:11:26 +09:00
[
2022-08-05 09:16:53 +09:00
{
"id" : 367930039 ,
"name" : "CVE-2021-31166" ,
"full_name" : "0vercl0k\/CVE-2021-31166" ,
"owner" : {
"login" : "0vercl0k" ,
"id" : 1476421 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4" ,
"html_url" : "https:\/\/github.com\/0vercl0k"
} ,
"html_url" : "https:\/\/github.com\/0vercl0k\/CVE-2021-31166" ,
"description" : "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely." ,
"fork" : false ,
"created_at" : "2021-05-16T16:15:56Z" ,
"updated_at" : "2022-08-03T15:29:52Z" ,
"pushed_at" : "2021-06-12T08:27:09Z" ,
"stargazers_count" : 814 ,
"watchers_count" : 814 ,
2022-08-05 21:16:58 +09:00
"forks_count" : 137 ,
2022-08-05 09:16:53 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"accept-encoding" ,
"cve-2021-31166" ,
"http" ,
"ulpparsecontentcoding"
] ,
"visibility" : "public" ,
2022-08-05 21:16:58 +09:00
"forks" : 137 ,
2022-08-05 09:16:53 +09:00
"watchers" : 814 ,
"score" : 0
} ,
{
"id" : 368156601 ,
"name" : "CVE-2021-31166" ,
"full_name" : "zha0gongz1\/CVE-2021-31166" ,
"owner" : {
"login" : "zha0gongz1" ,
"id" : 41460798 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4" ,
"html_url" : "https:\/\/github.com\/zha0gongz1"
} ,
"html_url" : "https:\/\/github.com\/zha0gongz1\/CVE-2021-31166" ,
"description" : "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash." ,
"fork" : false ,
"created_at" : "2021-05-17T11:12:45Z" ,
"updated_at" : "2022-06-24T03:05:37Z" ,
"pushed_at" : "2021-05-17T11:30:26Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"accept-encoding" ,
"cve-2021-31166" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 8 ,
"score" : 0
} ,
2021-05-18 06:11:34 +09:00
{
"id" : 368306577 ,
"name" : "CVE-2021-31166-detection-rules" ,
2022-02-27 03:14:01 +09:00
"full_name" : "mvlnetdev\/CVE-2021-31166-detection-rules" ,
2021-05-18 06:11:34 +09:00
"owner" : {
2022-02-27 03:14:01 +09:00
"login" : "mvlnetdev" ,
2021-05-18 06:11:34 +09:00
"id" : 41307333 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4" ,
2022-02-27 03:14:01 +09:00
"html_url" : "https:\/\/github.com\/mvlnetdev"
2021-05-18 06:11:34 +09:00
} ,
2022-02-27 03:14:01 +09:00
"html_url" : "https:\/\/github.com\/mvlnetdev\/CVE-2021-31166-detection-rules" ,
2021-05-18 06:11:34 +09:00
"description" : "Different rules to detect if CVE-2021-31166 is being exploited" ,
"fork" : false ,
"created_at" : "2021-05-17T19:55:41Z" ,
2022-07-21 15:17:21 +09:00
"updated_at" : "2022-07-21T02:50:56Z" ,
2022-02-27 03:14:01 +09:00
"pushed_at" : "2022-02-26T12:52:37Z" ,
2022-07-21 15:17:21 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-07-06 18:11:47 +09:00
"forks_count" : 1 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-07-06 18:11:47 +09:00
"forks" : 1 ,
2022-07-21 15:17:21 +09:00
"watchers" : 3 ,
2021-05-19 18:12:00 +09:00
"score" : 0
} ,
2022-08-05 09:16:53 +09:00
{
"id" : 368350830 ,
"name" : "CVE-2021-31166" ,
"full_name" : "corelight\/CVE-2021-31166" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/CVE-2021-31166" ,
"description" : "HTTP Protocol Stack CVE-2021-31166" ,
"fork" : false ,
"created_at" : "2021-05-17T23:54:12Z" ,
"updated_at" : "2022-07-07T11:06:23Z" ,
"pushed_at" : "2021-05-28T00:41:52Z" ,
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
"watchers" : 14 ,
"score" : 0
} ,
{
"id" : 368786720 ,
"name" : "CVE-2021-31166" ,
"full_name" : "zecopro\/CVE-2021-31166" ,
"owner" : {
"login" : "zecopro" ,
"id" : 23106986 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4" ,
"html_url" : "https:\/\/github.com\/zecopro"
} ,
"html_url" : "https:\/\/github.com\/zecopro\/CVE-2021-31166" ,
"description" : "simple bash script for exploit CVE-2021-31166" ,
"fork" : false ,
"created_at" : "2021-05-19T07:50:40Z" ,
"updated_at" : "2022-05-11T01:47:48Z" ,
"pushed_at" : "2021-05-19T08:18:56Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0
} ,
{
"id" : 370131263 ,
"name" : "WIn-CVE-2021-31166" ,
"full_name" : "bgsilvait\/WIn-CVE-2021-31166" ,
"owner" : {
"login" : "bgsilvait" ,
"id" : 38823062 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4" ,
"html_url" : "https:\/\/github.com\/bgsilvait"
} ,
"html_url" : "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-05-23T18:41:48Z" ,
"updated_at" : "2021-05-23T19:32:43Z" ,
"pushed_at" : "2021-05-23T19:32:41Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 370268982 ,
"name" : "CVE-2021-31166" ,
"full_name" : "Udyz\/CVE-2021-31166" ,
"owner" : {
"login" : "Udyz" ,
"id" : 39673284 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4" ,
"html_url" : "https:\/\/github.com\/Udyz"
} ,
"html_url" : "https:\/\/github.com\/Udyz\/CVE-2021-31166" ,
"description" : "http.sys remote UAF to Leak Credential" ,
"fork" : false ,
"created_at" : "2021-05-24T07:42:18Z" ,
"updated_at" : "2022-07-29T01:32:04Z" ,
"pushed_at" : "2021-05-25T04:03:31Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0
} ,
2022-03-08 09:14:24 +09:00
{
"id" : 467221883 ,
"name" : "CVE-2021-31166" ,
"full_name" : "mauricelambert\/CVE-2021-31166" ,
"owner" : {
"login" : "mauricelambert" ,
"id" : 50479118 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4" ,
"html_url" : "https:\/\/github.com\/mauricelambert"
} ,
"html_url" : "https:\/\/github.com\/mauricelambert\/CVE-2021-31166" ,
2022-05-06 09:15:09 +09:00
"description" : "CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit." ,
2022-03-08 09:14:24 +09:00
"fork" : false ,
"created_at" : "2022-03-07T18:56:52Z" ,
2022-06-12 09:15:37 +09:00
"updated_at" : "2022-06-11T23:34:22Z" ,
2022-03-17 09:15:33 +09:00
"pushed_at" : "2022-03-16T21:21:14Z" ,
2022-06-12 09:15:37 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2022-03-08 09:14:24 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-03-08 09:14:24 +09:00
"topics" : [
"bluescreen" ,
"crash" ,
"cve" ,
"cve-2021-31166" ,
"denial-of-service" ,
"dos" ,
"exploit" ,
"iis" ,
"metasploit" ,
"microsoft" ,
"nmap" ,
"payload" ,
"powershell" ,
"python3" ,
"ruby" ,
"vulnerability" ,
"webserver"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-06-12 09:15:37 +09:00
"watchers" : 4 ,
2022-03-08 09:14:24 +09:00
"score" : 0
2021-05-17 06:11:26 +09:00
}
]