PoC-in-GitHub/2021/CVE-2021-27965.json

98 lines
3.3 KiB
JSON
Raw Normal View History

2021-06-03 17:12:05 +02:00
[
{
"id": 373502325,
"name": "CVE-2021-27965",
"full_name": "mathisvickie\/CVE-2021-27965",
"owner": {
"login": "mathisvickie",
"id": 60326914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60326914?v=4",
"html_url": "https:\/\/github.com\/mathisvickie"
},
"html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-27965",
"description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false,
"created_at": "2021-06-03T12:39:11Z",
2022-02-07 07:14:09 +01:00
"updated_at": "2022-02-07T04:18:07Z",
2021-06-07 17:11:31 +02:00
"pushed_at": "2021-06-07T13:46:21Z",
2022-02-07 07:14:09 +01:00
"stargazers_count": 7,
"watchers_count": 7,
2022-01-08 01:14:00 +01:00
"forks_count": 2,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"buffer-overflow",
"cve",
"cve-2021-27965",
"driver",
"exploit",
"kernel",
"kernel-driver",
"local-privilege-escalation",
"msio64",
"poc",
"privilege-escalation",
"proof-of-concept",
"stack-buffer-overflow",
"windows"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-01-08 01:14:00 +01:00
"forks": 2,
2022-02-07 07:14:09 +01:00
"watchers": 7,
2021-06-03 17:12:05 +02:00
"score": 0
2021-10-06 17:13:09 +02:00
},
{
"id": 390672212,
"name": "CVE-2021-27965",
"full_name": "Crystalware\/CVE-2021-27965",
"owner": {
"login": "Crystalware",
"id": 49976592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
"html_url": "https:\/\/github.com\/Crystalware"
},
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2021-27965",
"description": "Proof of concept for CVE-2021-27965 (Stack-based Buffer Overflow)",
"fork": false,
"created_at": "2021-07-29T09:32:56Z",
2021-10-31 04:12:41 +01:00
"updated_at": "2021-10-31T02:39:44Z",
"pushed_at": "2021-10-31T02:39:41Z",
2021-10-06 17:13:09 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2022-01-04 13:14:11 +01:00
"forks_count": 1,
2021-10-06 17:13:09 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-06 17:13:09 +02:00
"visibility": "public",
2022-01-04 13:14:11 +01:00
"forks": 1,
2021-10-06 17:13:09 +02:00
"watchers": 0,
"score": 0
2022-02-22 01:15:26 +01:00
},
{
"id": 462021959,
"name": "CVE-2021-27965-Win10-20H2-x64",
"full_name": "Leo-Security\/CVE-2021-27965-Win10-20H2-x64",
"owner": {
"login": "Leo-Security",
"id": 82122352,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82122352?v=4",
"html_url": "https:\/\/github.com\/Leo-Security"
},
"html_url": "https:\/\/github.com\/Leo-Security\/CVE-2021-27965-Win10-20H2-x64",
"description": "A repository housing the exploit code for CVE-2021-27965, a stack-buffer overflow vulnerability in MsIo.sys.",
"fork": false,
"created_at": "2022-02-21T20:31:17Z",
2022-02-24 07:14:34 +01:00
"updated_at": "2022-02-24T02:45:36Z",
"pushed_at": "2022-02-24T02:45:33Z",
2022-02-22 01:15:26 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-06-03 17:12:05 +02:00
}
]