PoC-in-GitHub/2022/CVE-2022-21971.json

104 lines
3.3 KiB
JSON
Raw Normal View History

2022-02-27 01:14:20 +01:00
[
2022-08-05 02:16:53 +02:00
{
"id": 463960612,
"name": "CVE-2022-21971",
"full_name": "0vercl0k\/CVE-2022-21971",
"owner": {
"login": "0vercl0k",
"id": 1476421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
"html_url": "https:\/\/github.com\/0vercl0k"
},
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2022-21971",
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
2023-04-28 14:30:29 +02:00
"updated_at": "2023-04-28T08:31:55Z",
2022-08-05 02:16:53 +02:00
"pushed_at": "2022-02-26T20:45:19Z",
2023-04-28 14:30:29 +02:00
"stargazers_count": 290,
"watchers_count": 290,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2022-11-01 13:21:06 +01:00
"forks_count": 65,
2022-08-05 02:16:53 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"com",
"cve-2022-21971",
"memory-corruption",
"office",
"oleload",
"rtf"
],
"visibility": "public",
2022-11-01 13:21:06 +01:00
"forks": 65,
2023-04-28 14:30:29 +02:00
"watchers": 290,
2022-08-05 02:16:53 +02:00
"score": 0
},
{
"id": 481903403,
"name": "CVE-2022-21971-Windows-Runtime-RCE",
"full_name": "tufanturhan\/CVE-2022-21971-Windows-Runtime-RCE",
"owner": {
"login": "tufanturhan",
"id": 49189594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49189594?v=4",
"html_url": "https:\/\/github.com\/tufanturhan"
},
"html_url": "https:\/\/github.com\/tufanturhan\/CVE-2022-21971-Windows-Runtime-RCE",
"description": null,
"fork": false,
"created_at": "2022-04-15T09:14:22Z",
"updated_at": "2022-04-19T10:23:00Z",
"pushed_at": "2022-04-15T09:14:30Z",
"stargazers_count": 1,
"watchers_count": 1,
2022-11-08 01:17:44 +01:00
"has_discussions": false,
2022-08-05 02:16:53 +02:00
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
2023-01-02 13:13:52 +01:00
},
{
"id": 547436435,
"name": "CVE-2022-21971",
"full_name": "Malwareman007\/CVE-2022-21971",
"owner": {
"login": "Malwareman007",
"id": 86009160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
"html_url": "https:\/\/github.com\/Malwareman007"
},
"html_url": "https:\/\/github.com\/Malwareman007\/CVE-2022-21971",
"description": "POC Of CVE-2022-21971 ",
"fork": false,
"created_at": "2022-10-07T17:25:03Z",
"updated_at": "2022-10-22T19:06:32Z",
"pushed_at": "2022-10-07T17:27:56Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-21971",
"microsoftword",
"pointer",
"prauthproviders",
"security",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 10,
"score": 0
2022-02-27 01:14:20 +01:00
}
]