2021-05-16 23:11:26 +02:00
[
{
"id" : 367930039 ,
"name" : "CVE-2021-31166" ,
"full_name" : "0vercl0k\/CVE-2021-31166" ,
"owner" : {
"login" : "0vercl0k" ,
"id" : 1476421 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4" ,
"html_url" : "https:\/\/github.com\/0vercl0k"
} ,
"html_url" : "https:\/\/github.com\/0vercl0k\/CVE-2021-31166" ,
"description" : "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely." ,
"fork" : false ,
"created_at" : "2021-05-16T16:15:56Z" ,
2021-08-03 17:12:20 +02:00
"updated_at" : "2021-08-03T10:13:44Z" ,
2021-06-12 11:11:10 +02:00
"pushed_at" : "2021-06-12T08:27:09Z" ,
2021-08-03 17:12:20 +02:00
"stargazers_count" : 754 ,
"watchers_count" : 754 ,
2021-07-31 17:11:37 +02:00
"forks_count" : 125 ,
"forks" : 125 ,
2021-08-03 17:12:20 +02:00
"watchers" : 754 ,
2021-05-17 17:12:54 +02:00
"score" : 0
} ,
{
"id" : 368156601 ,
"name" : "CVE-2021-31166" ,
"full_name" : "An0ny-m0us\/CVE-2021-31166" ,
"owner" : {
"login" : "An0ny-m0us" ,
"id" : 41460798 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4" ,
"html_url" : "https:\/\/github.com\/An0ny-m0us"
} ,
"html_url" : "https:\/\/github.com\/An0ny-m0us\/CVE-2021-31166" ,
"description" : "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash." ,
"fork" : false ,
"created_at" : "2021-05-17T11:12:45Z" ,
2021-08-04 17:12:04 +02:00
"updated_at" : "2021-08-04T12:48:57Z" ,
2021-05-17 17:12:54 +02:00
"pushed_at" : "2021-05-17T11:30:26Z" ,
2021-08-04 17:12:04 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2021-05-17 17:12:54 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-08-04 17:12:04 +02:00
"watchers" : 5 ,
2021-05-16 23:11:26 +02:00
"score" : 0
2021-05-17 23:11:34 +02:00
} ,
{
"id" : 368306577 ,
"name" : "CVE-2021-31166-detection-rules" ,
"full_name" : "Frankmock\/CVE-2021-31166-detection-rules" ,
"owner" : {
"login" : "Frankmock" ,
"id" : 41307333 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4" ,
"html_url" : "https:\/\/github.com\/Frankmock"
} ,
"html_url" : "https:\/\/github.com\/Frankmock\/CVE-2021-31166-detection-rules" ,
"description" : "Different rules to detect if CVE-2021-31166 is being exploited" ,
"fork" : false ,
"created_at" : "2021-05-17T19:55:41Z" ,
2021-07-01 11:11:50 +02:00
"updated_at" : "2021-07-01T06:39:41Z" ,
2021-05-23 23:12:07 +02:00
"pushed_at" : "2021-05-23T20:00:38Z" ,
2021-07-01 11:11:50 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2021-07-06 11:11:47 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-01 11:11:50 +02:00
"watchers" : 4 ,
2021-05-19 11:12:00 +02:00
"score" : 0
} ,
{
"id" : 368350830 ,
"name" : "CVE-2021-31166" ,
"full_name" : "corelight\/CVE-2021-31166" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/CVE-2021-31166" ,
"description" : "HTTP Protocol Stack CVE-2021-31166" ,
"fork" : false ,
"created_at" : "2021-05-17T23:54:12Z" ,
2021-07-13 17:11:59 +02:00
"updated_at" : "2021-07-13T11:59:21Z" ,
2021-05-28 05:11:33 +02:00
"pushed_at" : "2021-05-28T00:41:52Z" ,
2021-07-13 17:11:59 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2021-07-20 23:11:48 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-13 17:11:59 +02:00
"watchers" : 5 ,
2021-05-19 11:12:00 +02:00
"score" : 0
} ,
{
"id" : 368786720 ,
"name" : "CVE-2021-31166" ,
"full_name" : "zecopro\/CVE-2021-31166" ,
"owner" : {
"login" : "zecopro" ,
"id" : 23106986 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4" ,
"html_url" : "https:\/\/github.com\/zecopro"
} ,
"html_url" : "https:\/\/github.com\/zecopro\/CVE-2021-31166" ,
"description" : "simple bash script for exploit CVE-2021-31166" ,
"fork" : false ,
"created_at" : "2021-05-19T07:50:40Z" ,
"updated_at" : "2021-05-19T08:39:46Z" ,
"pushed_at" : "2021-05-19T08:18:56Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
2021-05-17 23:11:34 +02:00
"score" : 0
2021-05-23 23:12:07 +02:00
} ,
{
"id" : 370131263 ,
"name" : "WIn-CVE-2021-31166" ,
"full_name" : "bgsilvait\/WIn-CVE-2021-31166" ,
"owner" : {
"login" : "bgsilvait" ,
"id" : 38823062 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4" ,
"html_url" : "https:\/\/github.com\/bgsilvait"
} ,
"html_url" : "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-05-23T18:41:48Z" ,
"updated_at" : "2021-05-23T19:32:43Z" ,
"pushed_at" : "2021-05-23T19:32:41Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-05-24 11:11:38 +02:00
} ,
{
"id" : 370268982 ,
"name" : "CVE-2021-31166" ,
"full_name" : "Udyz\/CVE-2021-31166" ,
"owner" : {
"login" : "Udyz" ,
"id" : 39673284 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4" ,
"html_url" : "https:\/\/github.com\/Udyz"
} ,
"html_url" : "https:\/\/github.com\/Udyz\/CVE-2021-31166" ,
"description" : "http.sys remote UAF to Leak Credential" ,
"fork" : false ,
"created_at" : "2021-05-24T07:42:18Z" ,
2021-07-28 23:12:31 +02:00
"updated_at" : "2021-07-28T18:30:12Z" ,
2021-05-25 11:11:47 +02:00
"pushed_at" : "2021-05-25T04:03:31Z" ,
2021-07-28 23:12:31 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-05-24 11:11:38 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-28 23:12:31 +02:00
"watchers" : 2 ,
2021-05-24 11:11:38 +02:00
"score" : 0
2021-07-03 17:11:25 +02:00
} ,
{
"id" : 382641118 ,
"name" : "CVE-2021-31166-Exploit" ,
"full_name" : "y0g3sh-99\/CVE-2021-31166-Exploit" ,
"owner" : {
"login" : "y0g3sh-99" ,
"id" : 59962466 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4" ,
"html_url" : "https:\/\/github.com\/y0g3sh-99"
} ,
"html_url" : "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit" ,
"description" : "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)" ,
"fork" : false ,
"created_at" : "2021-07-03T14:54:59Z" ,
2021-08-03 11:12:13 +02:00
"updated_at" : "2021-08-03T04:35:31Z" ,
2021-07-03 23:12:19 +02:00
"pushed_at" : "2021-07-03T15:27:28Z" ,
2021-08-03 11:12:13 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-07-03 17:11:25 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-08-03 11:12:13 +02:00
"watchers" : 3 ,
2021-07-03 17:11:25 +02:00
"score" : 0
2021-05-16 23:11:26 +02:00
}
]