PoC-in-GitHub/2022/CVE-2022-21907.json

93 lines
3.3 KiB
JSON
Raw Normal View History

2022-01-16 09:13:45 +09:00
[
2022-06-24 15:18:06 +09:00
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",
"full_name": "p0dalirius\/CVE-2022-21907-http.sys",
"owner": {
"login": "p0dalirius",
"id": 79218792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
"html_url": "https:\/\/github.com\/p0dalirius"
},
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys",
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
2022-07-26 21:17:11 +09:00
"updated_at": "2022-07-26T12:10:05Z",
2022-06-24 15:18:06 +09:00
"pushed_at": "2022-05-03T10:40:31Z",
2022-07-26 21:17:11 +09:00
"stargazers_count": 69,
"watchers_count": 69,
2022-07-29 03:18:32 +09:00
"forks_count": 14,
2022-06-24 15:18:06 +09:00
"allow_forking": true,
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2022-06-24 15:18:06 +09:00
"topics": [
"crash",
"cve-2022-21907",
"iis-server",
"poc",
"python",
"rce"
],
"visibility": "public",
2022-07-29 03:18:32 +09:00
"forks": 14,
2022-07-26 21:17:11 +09:00
"watchers": 69,
2022-06-24 15:18:06 +09:00
"score": 0
},
2022-05-11 03:18:46 +09:00
{
"id": 490768227,
"name": "cve-2022-21907-http.sys",
"full_name": "iveresk\/cve-2022-21907-http.sys",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907-http.sys",
"description": "An unauthenticated attacker can send an HTTP request with an \"Accept-Encoding\" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.",
"fork": false,
"created_at": "2022-05-10T16:00:50Z",
2022-05-22 21:15:05 +09:00
"updated_at": "2022-05-22T07:39:33Z",
2022-05-25 03:17:49 +09:00
"pushed_at": "2022-05-24T12:40:16Z",
2022-05-22 21:15:05 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2022-05-11 03:18:46 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2022-05-11 03:18:46 +09:00
"topics": [],
"visibility": "public",
"forks": 0,
2022-05-22 21:15:05 +09:00
"watchers": 1,
2022-05-11 03:18:46 +09:00
"score": 0
2022-05-17 03:15:39 +09:00
},
{
"id": 492939533,
"name": "cve-2022-21907",
"full_name": "iveresk\/cve-2022-21907",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907",
"description": "Multithread Golang application",
"fork": false,
"created_at": "2022-05-16T17:42:45Z",
2022-07-04 03:16:08 +09:00
"updated_at": "2022-07-03T17:01:53Z",
2022-06-10 21:17:39 +09:00
"pushed_at": "2022-06-10T10:02:42Z",
2022-07-04 03:16:08 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2022-05-17 03:15:39 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required": false,
2022-05-17 03:15:39 +09:00
"topics": [],
"visibility": "public",
"forks": 0,
2022-07-04 03:16:08 +09:00
"watchers": 1,
2022-05-17 03:15:39 +09:00
"score": 0
2022-01-16 09:13:45 +09:00
}
]