PoC-in-GitHub/2022/CVE-2022-21907.json

272 lines
9.6 KiB
JSON
Raw Normal View History

2022-01-16 09:13:45 +09:00
[
2022-01-26 21:14:28 +09:00
{
"id": 446683592,
"name": "cve-2022-21907",
"full_name": "corelight\/cve-2022-21907",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-21907",
"description": "cve-2022-21907",
"fork": false,
"created_at": "2022-01-11T05:00:55Z",
2022-03-21 21:15:11 +09:00
"updated_at": "2022-03-21T07:03:34Z",
2022-01-27 09:14:03 +09:00
"pushed_at": "2022-01-26T20:31:22Z",
2022-03-21 21:15:11 +09:00
"stargazers_count": 4,
"watchers_count": 4,
2022-01-26 21:14:28 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-03-21 21:15:11 +09:00
"watchers": 4,
2022-01-26 21:14:28 +09:00
"score": 0
},
2022-01-16 09:13:45 +09:00
{
"id": 448387955,
"name": "CVE-2022-21907",
"full_name": "mauricelambert\/CVE-2022-21907",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-21907",
2022-03-05 21:14:08 +09:00
"description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.",
2022-01-16 09:13:45 +09:00
"fork": false,
"created_at": "2022-01-15T20:50:25Z",
2022-04-13 21:15:21 +09:00
"updated_at": "2022-04-13T07:59:24Z",
2022-03-08 09:14:24 +09:00
"pushed_at": "2022-03-07T19:45:22Z",
2022-04-13 21:15:21 +09:00
"stargazers_count": 20,
"watchers_count": 20,
2022-04-14 15:17:49 +09:00
"forks_count": 8,
2022-01-16 09:13:45 +09:00
"allow_forking": true,
"is_template": false,
2022-01-28 21:14:22 +09:00
"topics": [
"bluescreen",
"crash",
"cve",
2022-03-05 21:14:08 +09:00
"cve-2022-21907",
2022-01-28 21:14:22 +09:00
"denial-of-service",
"detection",
"dos",
"exploit",
"iis",
2022-03-05 21:14:08 +09:00
"metasploit",
"microsoft",
"nmap",
"payload",
2022-01-28 21:14:22 +09:00
"powershell",
"protection",
"python3",
2022-03-05 21:14:08 +09:00
"ruby",
"vulnerability",
2022-01-28 21:14:22 +09:00
"webserver"
],
2022-01-16 09:13:45 +09:00
"visibility": "public",
2022-04-14 15:17:49 +09:00
"forks": 8,
2022-04-13 21:15:21 +09:00
"watchers": 20,
2022-01-17 15:13:58 +09:00
"score": 0
},
{
"id": 448729790,
"name": "CVE-2022-21907",
2022-02-11 21:14:37 +09:00
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
2022-01-17 15:13:58 +09:00
"owner": {
2022-02-11 21:14:37 +09:00
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
2022-01-17 15:13:58 +09:00
},
2022-02-11 21:14:37 +09:00
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
2022-01-20 15:14:17 +09:00
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
2022-01-17 15:13:58 +09:00
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
2022-05-04 21:15:40 +09:00
"updated_at": "2022-05-04T12:05:52Z",
2022-01-20 15:14:17 +09:00
"pushed_at": "2022-01-20T02:07:59Z",
2022-05-04 21:15:40 +09:00
"stargazers_count": 362,
"watchers_count": 362,
2022-04-29 09:15:19 +09:00
"forks_count": 98,
2022-01-17 15:13:58 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-04-29 09:15:19 +09:00
"forks": 98,
2022-05-04 21:15:40 +09:00
"watchers": 362,
2022-01-18 03:14:15 +09:00
"score": 0
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2022-01-16 09:13:45 +09:00
"score": 0
2022-01-18 21:14:27 +09:00
},
2022-01-24 03:14:01 +09:00
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
2022-04-15 15:17:17 +09:00
"updated_at": "2022-04-15T05:51:32Z",
2022-01-24 03:14:01 +09:00
"pushed_at": "2022-01-23T14:28:54Z",
2022-04-15 15:17:17 +09:00
"stargazers_count": 6,
"watchers_count": 6,
2022-03-05 21:14:08 +09:00
"forks_count": 2,
2022-01-24 03:14:01 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-03-05 21:14:08 +09:00
"forks": 2,
2022-04-15 15:17:17 +09:00
"watchers": 6,
2022-01-24 03:14:01 +09:00
"score": 0
2022-02-22 03:14:14 +09:00
},
{
"id": 461942989,
"name": "CVE-2022-21907-RCE-POC",
"full_name": "coconut20\/CVE-2022-21907-RCE-POC",
"owner": {
"login": "coconut20",
"id": 97525284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97525284?v=4",
"html_url": "https:\/\/github.com\/coconut20"
},
"html_url": "https:\/\/github.com\/coconut20\/CVE-2022-21907-RCE-POC",
"description": "CVE-2022-21907 Mass Exploitation tool written in Python 3 compatible with lists of URL\/IPs. For a large number of targets you can increase the number of threads, we don't recommend more than 1024. This tool is NOT free to prevent abuse and do not expect to find a fix-it-all proof of concept for exploitation for free. Only for those knowledgeable.",
"fork": false,
"created_at": "2022-02-21T16:28:39Z",
2022-04-05 09:16:08 +09:00
"updated_at": "2022-04-04T23:51:56Z",
2022-02-22 03:14:14 +09:00
"pushed_at": "2022-02-21T16:38:50Z",
2022-02-25 15:14:15 +09:00
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
2022-02-22 03:14:14 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-02-25 15:14:15 +09:00
"forks": 1,
"watchers": 4,
2022-02-22 03:14:14 +09:00
"score": 0
2022-04-09 03:15:42 +09:00
},
{
"id": 477659433,
"name": "CVE-2022-21907",
"full_name": "polakow\/CVE-2022-21907",
"owner": {
"login": "polakow",
"id": 53662773,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53662773?v=4",
"html_url": "https:\/\/github.com\/polakow"
},
"html_url": "https:\/\/github.com\/polakow\/CVE-2022-21907",
2022-04-13 21:15:21 +09:00
"description": "A REAL DoS exploit for CVE-2022-21907",
2022-04-09 03:15:42 +09:00
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
2022-05-13 03:18:19 +09:00
"updated_at": "2022-05-12T14:34:15Z",
2022-04-13 15:15:15 +09:00
"pushed_at": "2022-04-13T05:48:04Z",
2022-05-13 03:18:19 +09:00
"stargazers_count": 111,
"watchers_count": 111,
2022-05-04 03:18:06 +09:00
"forks_count": 27,
2022-04-09 03:15:42 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-04 03:18:06 +09:00
"forks": 27,
2022-05-13 03:18:19 +09:00
"watchers": 111,
2022-04-17 09:14:45 +09:00
"score": 0
},
{
"id": 482340383,
"name": "nmap-CVE-2022-21907",
"full_name": "gpiechnik2\/nmap-CVE-2022-21907",
"owner": {
"login": "gpiechnik2",
"id": 48253270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4",
"html_url": "https:\/\/github.com\/gpiechnik2"
},
"html_url": "https:\/\/github.com\/gpiechnik2\/nmap-CVE-2022-21907",
"description": "Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations.",
"fork": false,
"created_at": "2022-04-16T19:13:27Z",
"updated_at": "2022-04-16T20:32:50Z",
"pushed_at": "2022-04-16T20:31:51Z",
"stargazers_count": 0,
"watchers_count": 0,
2022-04-20 21:19:26 +09:00
"forks_count": 1,
2022-04-17 09:14:45 +09:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-21907",
"nmap",
"nse",
"script",
"vuln",
"vulnerability"
],
"visibility": "public",
2022-04-20 21:19:26 +09:00
"forks": 1,
2022-04-17 09:14:45 +09:00
"watchers": 0,
2022-04-09 03:15:42 +09:00
"score": 0
2022-05-11 03:18:46 +09:00
},
{
"id": 490768227,
"name": "cve-2022-21907-http.sys",
"full_name": "iveresk\/cve-2022-21907-http.sys",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907-http.sys",
"description": "An unauthenticated attacker can send an HTTP request with an \"Accept-Encoding\" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.",
"fork": false,
"created_at": "2022-05-10T16:00:50Z",
"updated_at": "2022-05-10T17:27:24Z",
2022-05-11 21:18:52 +09:00
"pushed_at": "2022-05-11T11:42:40Z",
2022-05-11 03:18:46 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-01-16 09:13:45 +09:00
}
]