PoC-in-GitHub/2022/CVE-2022-21971.json

100 lines
3.3 KiB
JSON
Raw Normal View History

2022-02-27 01:14:20 +01:00
[
2022-08-05 02:16:53 +02:00
{
"id": 463960612,
"name": "CVE-2022-21971",
"full_name": "0vercl0k\/CVE-2022-21971",
"owner": {
"login": "0vercl0k",
"id": 1476421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
"html_url": "https:\/\/github.com\/0vercl0k"
},
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2022-21971",
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
2022-08-29 20:18:36 +02:00
"updated_at": "2022-08-29T16:45:47Z",
2022-08-05 02:16:53 +02:00
"pushed_at": "2022-02-26T20:45:19Z",
2022-08-29 20:18:36 +02:00
"stargazers_count": 283,
"watchers_count": 283,
2022-08-23 08:18:11 +02:00
"forks_count": 63,
2022-08-05 02:16:53 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"com",
"cve-2022-21971",
"memory-corruption",
"office",
"oleload",
"rtf"
],
"visibility": "public",
2022-08-23 08:18:11 +02:00
"forks": 63,
2022-08-29 20:18:36 +02:00
"watchers": 283,
2022-08-05 02:16:53 +02:00
"score": 0
},
{
"id": 481903403,
"name": "CVE-2022-21971-Windows-Runtime-RCE",
"full_name": "tufanturhan\/CVE-2022-21971-Windows-Runtime-RCE",
"owner": {
"login": "tufanturhan",
"id": 49189594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49189594?v=4",
"html_url": "https:\/\/github.com\/tufanturhan"
},
"html_url": "https:\/\/github.com\/tufanturhan\/CVE-2022-21971-Windows-Runtime-RCE",
"description": null,
"fork": false,
"created_at": "2022-04-15T09:14:22Z",
"updated_at": "2022-04-19T10:23:00Z",
"pushed_at": "2022-04-15T09:14:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
2022-05-22 20:15:14 +02:00
{
"id": 495065838,
"name": "CVE-2022-21971",
"full_name": "XmasSnowISBACK\/CVE-2022-21971",
"owner": {
"login": "XmasSnowISBACK",
"id": 105931778,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
},
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-21971",
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\" ",
"fork": false,
"created_at": "2022-05-22T13:20:39Z",
"updated_at": "2022-05-22T13:29:20Z",
"pushed_at": "2022-05-22T13:21:06Z",
"stargazers_count": 0,
"watchers_count": 0,
2022-08-17 08:17:14 +02:00
"forks_count": 1,
2022-05-22 20:15:14 +02:00
"allow_forking": true,
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2022-05-22 20:15:14 +02:00
"topics": [
"com",
"cve-2022-21971",
"memory-corruption",
"office",
"oleload",
"rtf"
],
"visibility": "public",
2022-08-17 08:17:14 +02:00
"forks": 1,
2022-05-22 20:15:14 +02:00
"watchers": 0,
"score": 0
2022-02-27 01:14:20 +01:00
}
]