2022-01-16 09:13:45 +09:00
[
2022-01-26 21:14:28 +09:00
{
"id" : 446683592 ,
"name" : "cve-2022-21907" ,
"full_name" : "corelight\/cve-2022-21907" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/cve-2022-21907" ,
"description" : "cve-2022-21907" ,
"fork" : false ,
"created_at" : "2022-01-11T05:00:55Z" ,
2022-03-21 21:15:11 +09:00
"updated_at" : "2022-03-21T07:03:34Z" ,
2022-01-27 09:14:03 +09:00
"pushed_at" : "2022-01-26T20:31:22Z" ,
2022-03-21 21:15:11 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2022-01-26 21:14:28 +09:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-03-21 21:15:11 +09:00
"watchers" : 4 ,
2022-01-26 21:14:28 +09:00
"score" : 0
} ,
2022-01-16 09:13:45 +09:00
{
"id" : 448387955 ,
"name" : "CVE-2022-21907" ,
"full_name" : "mauricelambert\/CVE-2022-21907" ,
"owner" : {
"login" : "mauricelambert" ,
"id" : 50479118 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4" ,
"html_url" : "https:\/\/github.com\/mauricelambert"
} ,
"html_url" : "https:\/\/github.com\/mauricelambert\/CVE-2022-21907" ,
2022-03-05 21:14:08 +09:00
"description" : "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube." ,
2022-01-16 09:13:45 +09:00
"fork" : false ,
"created_at" : "2022-01-15T20:50:25Z" ,
2022-04-05 09:16:08 +09:00
"updated_at" : "2022-04-04T23:37:37Z" ,
2022-03-08 09:14:24 +09:00
"pushed_at" : "2022-03-07T19:45:22Z" ,
2022-04-05 09:16:08 +09:00
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
2022-03-12 15:14:20 +09:00
"forks_count" : 7 ,
2022-01-16 09:13:45 +09:00
"allow_forking" : true ,
"is_template" : false ,
2022-01-28 21:14:22 +09:00
"topics" : [
"bluescreen" ,
"crash" ,
"cve" ,
2022-03-05 21:14:08 +09:00
"cve-2022-21907" ,
2022-01-28 21:14:22 +09:00
"denial-of-service" ,
"detection" ,
"dos" ,
"exploit" ,
"iis" ,
2022-03-05 21:14:08 +09:00
"metasploit" ,
"microsoft" ,
"nmap" ,
"payload" ,
2022-01-28 21:14:22 +09:00
"powershell" ,
"protection" ,
"python3" ,
2022-03-05 21:14:08 +09:00
"ruby" ,
"vulnerability" ,
2022-01-28 21:14:22 +09:00
"webserver"
] ,
2022-01-16 09:13:45 +09:00
"visibility" : "public" ,
2022-03-12 15:14:20 +09:00
"forks" : 7 ,
2022-04-05 09:16:08 +09:00
"watchers" : 19 ,
2022-01-17 15:13:58 +09:00
"score" : 0
} ,
{
"id" : 448729790 ,
"name" : "CVE-2022-21907" ,
2022-02-11 21:14:37 +09:00
"full_name" : "ZZ-SOCMAP\/CVE-2022-21907" ,
2022-01-17 15:13:58 +09:00
"owner" : {
2022-02-11 21:14:37 +09:00
"login" : "ZZ-SOCMAP" ,
"id" : 98105412 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4" ,
"html_url" : "https:\/\/github.com\/ZZ-SOCMAP"
2022-01-17 15:13:58 +09:00
} ,
2022-02-11 21:14:37 +09:00
"html_url" : "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907" ,
2022-01-20 15:14:17 +09:00
"description" : "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907" ,
2022-01-17 15:13:58 +09:00
"fork" : false ,
"created_at" : "2022-01-17T02:28:50Z" ,
2022-04-12 21:15:32 +09:00
"updated_at" : "2022-04-12T09:00:54Z" ,
2022-01-20 15:14:17 +09:00
"pushed_at" : "2022-01-20T02:07:59Z" ,
2022-04-12 21:15:32 +09:00
"stargazers_count" : 358 ,
"watchers_count" : 358 ,
"forks_count" : 98 ,
2022-01-17 15:13:58 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-04-12 21:15:32 +09:00
"forks" : 98 ,
"watchers" : 358 ,
2022-01-18 03:14:15 +09:00
"score" : 0
} ,
{
"id" : 448909871 ,
"name" : "CVE-2022-21907" ,
"full_name" : "xiska62314\/CVE-2022-21907" ,
"owner" : {
"login" : "xiska62314" ,
"id" : 97891523 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4" ,
"html_url" : "https:\/\/github.com\/xiska62314"
} ,
"html_url" : "https:\/\/github.com\/xiska62314\/CVE-2022-21907" ,
"description" : "CVE-2022-21907" ,
"fork" : false ,
"created_at" : "2022-01-17T13:42:44Z" ,
"updated_at" : "2022-01-17T13:42:44Z" ,
"pushed_at" : "2022-01-17T13:42:45Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2022-01-16 09:13:45 +09:00
"score" : 0
2022-01-18 21:14:27 +09:00
} ,
{
"id" : 448952968 ,
"name" : "CVE-2022-21907-http.sys" ,
"full_name" : "p0dalirius\/CVE-2022-21907-http.sys" ,
"owner" : {
"login" : "p0dalirius" ,
"id" : 79218792 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4" ,
"html_url" : "https:\/\/github.com\/p0dalirius"
} ,
"html_url" : "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys" ,
"description" : "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers" ,
"fork" : false ,
"created_at" : "2022-01-17T15:42:37Z" ,
2022-04-07 15:15:06 +09:00
"updated_at" : "2022-04-07T01:11:43Z" ,
2022-02-25 21:14:31 +09:00
"pushed_at" : "2022-02-25T11:05:11Z" ,
2022-04-07 15:15:06 +09:00
"stargazers_count" : 60 ,
"watchers_count" : 60 ,
2022-03-10 03:17:31 +09:00
"forks_count" : 10 ,
2022-01-18 21:14:27 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [
"crash" ,
"cve-2022-21907" ,
"iis-server" ,
"poc" ,
"python" ,
"rce"
] ,
"visibility" : "public" ,
2022-03-10 03:17:31 +09:00
"forks" : 10 ,
2022-04-07 15:15:06 +09:00
"watchers" : 60 ,
2022-01-18 21:14:27 +09:00
"score" : 0
2022-01-24 03:14:01 +09:00
} ,
{
"id" : 451128086 ,
"name" : "CVE-2022-21907-Vulnerability-PoC" ,
"full_name" : "michelep\/CVE-2022-21907-Vulnerability-PoC" ,
"owner" : {
"login" : "michelep" ,
"id" : 1425559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4" ,
"html_url" : "https:\/\/github.com\/michelep"
} ,
"html_url" : "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC" ,
"description" : "CVE-2022-21907 Vulnerability PoC" ,
"fork" : false ,
"created_at" : "2022-01-23T14:25:12Z" ,
2022-03-21 21:15:11 +09:00
"updated_at" : "2022-03-21T07:03:05Z" ,
2022-01-24 03:14:01 +09:00
"pushed_at" : "2022-01-23T14:28:54Z" ,
2022-03-21 21:15:11 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2022-03-05 21:14:08 +09:00
"forks_count" : 2 ,
2022-01-24 03:14:01 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-03-05 21:14:08 +09:00
"forks" : 2 ,
2022-03-21 21:15:11 +09:00
"watchers" : 4 ,
2022-01-24 03:14:01 +09:00
"score" : 0
2022-02-22 03:14:14 +09:00
} ,
{
"id" : 461942989 ,
"name" : "CVE-2022-21907-RCE-POC" ,
"full_name" : "coconut20\/CVE-2022-21907-RCE-POC" ,
"owner" : {
"login" : "coconut20" ,
"id" : 97525284 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/97525284?v=4" ,
"html_url" : "https:\/\/github.com\/coconut20"
} ,
"html_url" : "https:\/\/github.com\/coconut20\/CVE-2022-21907-RCE-POC" ,
"description" : "CVE-2022-21907 Mass Exploitation tool written in Python 3 compatible with lists of URL\/IPs. For a large number of targets you can increase the number of threads, we don't recommend more than 1024. This tool is NOT free to prevent abuse and do not expect to find a fix-it-all proof of concept for exploitation for free. Only for those knowledgeable." ,
"fork" : false ,
"created_at" : "2022-02-21T16:28:39Z" ,
2022-04-05 09:16:08 +09:00
"updated_at" : "2022-04-04T23:51:56Z" ,
2022-02-22 03:14:14 +09:00
"pushed_at" : "2022-02-21T16:38:50Z" ,
2022-02-25 15:14:15 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 1 ,
2022-02-22 03:14:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2022-02-25 15:14:15 +09:00
"forks" : 1 ,
"watchers" : 4 ,
2022-02-22 03:14:14 +09:00
"score" : 0
2022-04-09 03:15:42 +09:00
} ,
{
"id" : 477659433 ,
"name" : "CVE-2022-21907" ,
"full_name" : "polakow\/CVE-2022-21907" ,
"owner" : {
"login" : "polakow" ,
"id" : 53662773 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53662773?v=4" ,
"html_url" : "https:\/\/github.com\/polakow"
} ,
"html_url" : "https:\/\/github.com\/polakow\/CVE-2022-21907" ,
"description" : "A DoS exploit for CVE-2022-21907" ,
"fork" : false ,
"created_at" : "2022-04-04T10:53:28Z" ,
"updated_at" : "2022-04-08T17:47:41Z" ,
"pushed_at" : "2022-04-08T04:19:52Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-01-16 09:13:45 +09:00
}
]