PoC-in-GitHub/2021/CVE-2021-31166.json

299 lines
9.9 KiB
JSON
Raw Normal View History

2021-05-17 06:11:26 +09:00
[
{
"id": 367930039,
"name": "CVE-2021-31166",
"full_name": "0vercl0k\/CVE-2021-31166",
"owner": {
"login": "0vercl0k",
"id": 1476421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
"html_url": "https:\/\/github.com\/0vercl0k"
},
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166",
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
2022-03-03 03:15:56 +09:00
"updated_at": "2022-03-02T14:57:55Z",
2021-06-12 18:11:10 +09:00
"pushed_at": "2021-06-12T08:27:09Z",
2022-03-03 03:15:56 +09:00
"stargazers_count": 810,
"watchers_count": 810,
"forks_count": 134,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [
"accept-encoding",
"cve-2021-31166",
"http",
"ulpparsecontentcoding"
],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-03-03 03:15:56 +09:00
"forks": 134,
"watchers": 810,
2021-05-18 00:12:54 +09:00
"score": 0
},
{
"id": 368156601,
"name": "CVE-2021-31166",
2021-09-25 06:13:21 +09:00
"full_name": "zha0gongz1\/CVE-2021-31166",
2021-05-18 00:12:54 +09:00
"owner": {
2021-09-25 06:13:21 +09:00
"login": "zha0gongz1",
2021-05-18 00:12:54 +09:00
"id": 41460798,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4",
2021-09-25 06:13:21 +09:00
"html_url": "https:\/\/github.com\/zha0gongz1"
2021-05-18 00:12:54 +09:00
},
2021-09-25 06:13:21 +09:00
"html_url": "https:\/\/github.com\/zha0gongz1\/CVE-2021-31166",
2021-05-18 00:12:54 +09:00
"description": "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.",
"fork": false,
"created_at": "2021-05-17T11:12:45Z",
2022-02-22 15:15:01 +09:00
"updated_at": "2022-02-22T01:47:50Z",
2021-05-18 00:12:54 +09:00
"pushed_at": "2021-05-17T11:30:26Z",
2022-02-22 15:15:01 +09:00
"stargazers_count": 8,
"watchers_count": 8,
2021-08-05 12:11:45 +09:00
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [
"accept-encoding",
"cve-2021-31166",
"rce"
],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-08-05 12:11:45 +09:00
"forks": 1,
2022-02-22 15:15:01 +09:00
"watchers": 8,
2021-05-17 06:11:26 +09:00
"score": 0
2021-05-18 06:11:34 +09:00
},
{
"id": 368306577,
"name": "CVE-2021-31166-detection-rules",
2022-02-27 03:14:01 +09:00
"full_name": "mvlnetdev\/CVE-2021-31166-detection-rules",
2021-05-18 06:11:34 +09:00
"owner": {
2022-02-27 03:14:01 +09:00
"login": "mvlnetdev",
2021-05-18 06:11:34 +09:00
"id": 41307333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4",
2022-02-27 03:14:01 +09:00
"html_url": "https:\/\/github.com\/mvlnetdev"
2021-05-18 06:11:34 +09:00
},
2022-02-27 03:14:01 +09:00
"html_url": "https:\/\/github.com\/mvlnetdev\/CVE-2021-31166-detection-rules",
2021-05-18 06:11:34 +09:00
"description": "Different rules to detect if CVE-2021-31166 is being exploited",
"fork": false,
"created_at": "2021-05-17T19:55:41Z",
2022-02-27 03:14:01 +09:00
"updated_at": "2022-02-26T12:52:41Z",
"pushed_at": "2022-02-26T12:52:37Z",
2022-01-29 21:13:57 +09:00
"stargazers_count": 4,
"watchers_count": 4,
2021-07-06 18:11:47 +09:00
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-07-06 18:11:47 +09:00
"forks": 1,
2022-01-29 21:13:57 +09:00
"watchers": 4,
2021-05-19 18:12:00 +09:00
"score": 0
},
{
"id": 368350830,
"name": "CVE-2021-31166",
"full_name": "corelight\/CVE-2021-31166",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-31166",
"description": "HTTP Protocol Stack CVE-2021-31166",
"fork": false,
"created_at": "2021-05-17T23:54:12Z",
2021-10-24 18:12:45 +09:00
"updated_at": "2021-10-24T07:14:11Z",
2021-05-28 12:11:33 +09:00
"pushed_at": "2021-05-28T00:41:52Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 5,
"watchers": 15,
2021-05-19 18:12:00 +09:00
"score": 0
},
{
"id": 368786720,
"name": "CVE-2021-31166",
"full_name": "zecopro\/CVE-2021-31166",
"owner": {
"login": "zecopro",
"id": 23106986,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4",
"html_url": "https:\/\/github.com\/zecopro"
},
"html_url": "https:\/\/github.com\/zecopro\/CVE-2021-31166",
"description": "simple bash script for exploit CVE-2021-31166",
"fork": false,
"created_at": "2021-05-19T07:50:40Z",
2021-10-11 12:12:44 +09:00
"updated_at": "2021-10-11T02:23:12Z",
2021-05-19 18:12:00 +09:00
"pushed_at": "2021-05-19T08:18:56Z",
2021-10-11 12:12:44 +09:00
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-10-11 12:12:44 +09:00
"forks": 1,
"watchers": 3,
2021-05-18 06:11:34 +09:00
"score": 0
2021-05-24 06:12:07 +09:00
},
{
"id": 370131263,
"name": "WIn-CVE-2021-31166",
"full_name": "bgsilvait\/WIn-CVE-2021-31166",
"owner": {
"login": "bgsilvait",
"id": 38823062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4",
"html_url": "https:\/\/github.com\/bgsilvait"
},
"html_url": "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166",
"description": null,
"fork": false,
"created_at": "2021-05-23T18:41:48Z",
"updated_at": "2021-05-23T19:32:43Z",
"pushed_at": "2021-05-23T19:32:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-05-24 06:12:07 +09:00
"forks": 0,
"watchers": 0,
"score": 0
2021-05-24 18:11:38 +09:00
},
{
"id": 370268982,
"name": "CVE-2021-31166",
"full_name": "Udyz\/CVE-2021-31166",
"owner": {
"login": "Udyz",
"id": 39673284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
"html_url": "https:\/\/github.com\/Udyz"
},
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-31166",
"description": "http.sys remote UAF to Leak Credential",
"fork": false,
"created_at": "2021-05-24T07:42:18Z",
2021-09-14 12:12:42 +09:00
"updated_at": "2021-09-13T21:22:31Z",
2021-05-25 18:11:47 +09:00
"pushed_at": "2021-05-25T04:03:31Z",
2021-09-14 12:12:42 +09:00
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-09-14 12:12:42 +09:00
"forks": 1,
"watchers": 3,
2021-05-24 18:11:38 +09:00
"score": 0
2021-07-04 00:11:25 +09:00
},
2021-09-27 18:14:49 +09:00
{
"id": 410758909,
"name": "CVE-2021-31166",
"full_name": "antx-code\/CVE-2021-31166",
"owner": {
"login": "antx-code",
"id": 7877940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
"html_url": "https:\/\/github.com\/antx-code"
},
"html_url": "https:\/\/github.com\/antx-code\/CVE-2021-31166",
"description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166",
"fork": false,
"created_at": "2021-09-27T05:56:45Z",
2022-02-15 15:18:59 +09:00
"updated_at": "2022-02-15T04:18:47Z",
2021-11-04 15:13:00 +09:00
"pushed_at": "2021-11-04T02:23:11Z",
2022-02-15 15:18:59 +09:00
"stargazers_count": 16,
"watchers_count": 16,
2022-01-26 15:14:08 +09:00
"forks_count": 7,
2021-09-27 18:14:49 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-01-26 15:14:08 +09:00
"forks": 7,
2022-02-15 15:18:59 +09:00
"watchers": 16,
2021-09-27 18:14:49 +09:00
"score": 0
2021-10-20 18:13:01 +09:00
},
{
"id": 419230261,
"name": "CVE-2021-31166-exploit",
"full_name": "ConMiko\/CVE-2021-31166-exploit",
"owner": {
"login": "ConMiko",
"id": 92157170,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92157170?v=4",
"html_url": "https:\/\/github.com\/ConMiko"
},
"html_url": "https:\/\/github.com\/ConMiko\/CVE-2021-31166-exploit",
"description": "Just a simple CVE-2021-31166 exploit tool",
"fork": false,
"created_at": "2021-10-20T07:37:46Z",
2021-10-21 00:14:45 +09:00
"updated_at": "2021-10-20T10:00:18Z",
2021-10-20 18:13:01 +09:00
"pushed_at": "2021-10-20T07:50:52Z",
2021-10-21 00:14:45 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-10-20 18:13:01 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-10-21 00:14:45 +09:00
"watchers": 1,
2021-10-20 18:13:01 +09:00
"score": 0
2022-03-08 09:14:24 +09:00
},
{
"id": 467221883,
"name": "CVE-2021-31166",
"full_name": "mauricelambert\/CVE-2021-31166",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-31166",
"description": "CVE-2022-21907: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
"fork": false,
"created_at": "2022-03-07T18:56:52Z",
"updated_at": "2022-03-07T19:01:49Z",
"pushed_at": "2022-03-07T19:47:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"bluescreen",
"crash",
"cve",
"cve-2021-31166",
"denial-of-service",
"dos",
"exploit",
"iis",
"metasploit",
"microsoft",
"nmap",
"payload",
"powershell",
"python3",
"ruby",
"vulnerability",
"webserver"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-05-17 06:11:26 +09:00
}
]