2024-11-28 19:31:51 +01:00
[
{
"id" : 439285309 ,
"name" : "nginx-patch" ,
"full_name" : "niandy\/nginx-patch" ,
"owner" : {
"login" : "niandy" ,
"id" : 8412769 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8412769?v=4" ,
"html_url" : "https:\/\/github.com\/niandy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/niandy\/nginx-patch" ,
"description" : "nginx 1.15.10 patch against cve-2021-23017 (ingress version)" ,
"fork" : false ,
"created_at" : "2021-12-17T09:53:39Z" ,
"updated_at" : "2021-12-22T08:15:05Z" ,
"pushed_at" : "2021-12-17T11:53:50Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 508934873 ,
"name" : "CVE-2021-23017-PoC" ,
"full_name" : "M507\/CVE-2021-23017-PoC" ,
"owner" : {
"login" : "M507" ,
"id" : 38591075 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38591075?v=4" ,
"html_url" : "https:\/\/github.com\/M507" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/M507\/CVE-2021-23017-PoC" ,
"description" : "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017" ,
"fork" : false ,
"created_at" : "2022-06-30T04:39:58Z" ,
2025-01-07 01:46:58 +01:00
"updated_at" : "2025-01-06T23:20:07Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2023-11-12T16:29:03Z" ,
2025-01-07 01:46:58 +01:00
"stargazers_count" : 101 ,
"watchers_count" : 101 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 21 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"poc"
] ,
"visibility" : "public" ,
"forks" : 21 ,
2025-01-07 01:46:58 +01:00
"watchers" : 101 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 668565009 ,
"name" : "CVE-2021-23017-PoC" ,
"full_name" : "lakshit1212\/CVE-2021-23017-PoC" ,
"owner" : {
"login" : "lakshit1212" ,
"id" : 140044978 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/140044978?v=4" ,
"html_url" : "https:\/\/github.com\/lakshit1212" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lakshit1212\/CVE-2021-23017-PoC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-07-20T05:39:01Z" ,
"updated_at" : "2023-08-22T23:46:40Z" ,
"pushed_at" : "2023-07-20T05:43:03Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 707950575 ,
"name" : "CVE-2021-23017" ,
"full_name" : "ShivamDey\/CVE-2021-23017" ,
"owner" : {
"login" : "ShivamDey" ,
"id" : 87941867 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/87941867?v=4" ,
"html_url" : "https:\/\/github.com\/ShivamDey" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ShivamDey\/CVE-2021-23017" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-10-21T04:24:02Z" ,
"updated_at" : "2023-10-21T04:25:17Z" ,
"pushed_at" : "2023-10-21T04:25:14Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
2024-12-08 13:31:42 +01:00
} ,
{
"id" : 900254066 ,
"name" : "CVE-2021-23017-POC" ,
"full_name" : "z3usx01\/CVE-2021-23017-POC" ,
"owner" : {
"login" : "z3usx01" ,
"id" : 112891506 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/112891506?v=4" ,
"html_url" : "https:\/\/github.com\/z3usx01" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/z3usx01\/CVE-2021-23017-POC" ,
"description" : "The issue only affects nginx if the \"resolver\" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to forge UDP packets from the DNS server." ,
"fork" : false ,
"created_at" : "2024-12-08T09:47:52Z" ,
2025-01-04 19:31:46 +01:00
"updated_at" : "2025-01-04T18:06:33Z" ,
2024-12-08 13:31:42 +01:00
"pushed_at" : "2024-12-08T09:52:23Z" ,
2025-01-04 19:31:46 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-12-08 13:31:42 +01:00
"has_discussions" : false ,
2024-12-14 19:32:08 +01:00
"forks_count" : 1 ,
2024-12-08 13:31:42 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-12-14 19:32:08 +01:00
"forks" : 1 ,
2025-01-04 19:31:46 +01:00
"watchers" : 1 ,
2024-12-08 13:31:42 +01:00
"score" : 0 ,
2024-12-09 01:31:16 +01:00
"subscribers_count" : 1
2024-11-28 19:31:51 +01:00
}
]