PoC-in-GitHub/2022/CVE-2022-21971.json

97 lines
3.1 KiB
JSON
Raw Normal View History

2022-02-27 09:14:20 +09:00
[
{
"id": 463960612,
"name": "CVE-2022-21971",
"full_name": "0vercl0k\/CVE-2022-21971",
"owner": {
"login": "0vercl0k",
"id": 1476421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
"html_url": "https:\/\/github.com\/0vercl0k"
},
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2022-21971",
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
2022-06-23 21:16:59 +09:00
"updated_at": "2022-06-23T11:33:45Z",
2022-02-27 09:14:20 +09:00
"pushed_at": "2022-02-26T20:45:19Z",
2022-06-23 21:16:59 +09:00
"stargazers_count": 273,
"watchers_count": 273,
2022-06-21 21:16:32 +09:00
"forks_count": 61,
2022-02-27 09:14:20 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"com",
"cve-2022-21971",
"memory-corruption",
"office",
"oleload",
"rtf"
],
"visibility": "public",
2022-06-21 21:16:32 +09:00
"forks": 61,
2022-06-23 21:16:59 +09:00
"watchers": 273,
2022-02-27 09:14:20 +09:00
"score": 0
2022-04-15 21:15:40 +09:00
},
{
"id": 481903403,
"name": "CVE-2022-21971-Windows-Runtime-RCE",
"full_name": "tufanturhan\/CVE-2022-21971-Windows-Runtime-RCE",
"owner": {
"login": "tufanturhan",
"id": 49189594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49189594?v=4",
"html_url": "https:\/\/github.com\/tufanturhan"
},
"html_url": "https:\/\/github.com\/tufanturhan\/CVE-2022-21971-Windows-Runtime-RCE",
"description": null,
"fork": false,
"created_at": "2022-04-15T09:14:22Z",
2022-04-19 21:18:45 +09:00
"updated_at": "2022-04-19T10:23:00Z",
2022-04-15 21:15:40 +09:00
"pushed_at": "2022-04-15T09:14:30Z",
2022-04-19 21:18:45 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2022-04-16 21:14:52 +09:00
"forks_count": 1,
2022-04-15 21:15:40 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-04-16 21:14:52 +09:00
"forks": 1,
2022-04-19 21:18:45 +09:00
"watchers": 1,
2022-04-15 21:15:40 +09:00
"score": 0
2022-05-23 03:15:14 +09:00
},
{
"id": 495065838,
"name": "CVE-2022-21971",
"full_name": "XmasSnowISBACK\/CVE-2022-21971",
"owner": {
"login": "XmasSnowISBACK",
"id": 105931778,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
},
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-21971",
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\" ",
"fork": false,
"created_at": "2022-05-22T13:20:39Z",
"updated_at": "2022-05-22T13:29:20Z",
"pushed_at": "2022-05-22T13:21:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"com",
"cve-2022-21971",
"memory-corruption",
"office",
"oleload",
"rtf"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-02-27 09:14:20 +09:00
}
]