[ { "id": 372590733, "name": "CVE-2021-28476", "full_name": "0vercl0k\/CVE-2021-28476", "owner": { "login": "0vercl0k", "id": 1476421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4", "html_url": "https:\/\/github.com\/0vercl0k", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-28476", "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2021-05-31T18:02:39Z", "updated_at": "2024-10-26T16:47:30Z", "pushed_at": "2021-06-01T15:08:23Z", "stargazers_count": 218, "watchers_count": 218, "has_discussions": false, "forks_count": 37, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-28476", "guest-to-host", "hyper-v", "network-service-provider", "nvsp", "rndis", "vmswitch" ], "visibility": "public", "forks": 37, "watchers": 218, "score": 0, "subscribers_count": 4 }, { "id": 373204692, "name": "CVE-2021-28476", "full_name": "bluefrostsecurity\/CVE-2021-28476", "owner": { "login": "bluefrostsecurity", "id": 4976074, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4", "html_url": "https:\/\/github.com\/bluefrostsecurity", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2021-28476", "description": null, "fork": false, "created_at": "2021-06-02T14:50:56Z", "updated_at": "2024-11-30T08:01:38Z", "pushed_at": "2021-06-02T14:54:14Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 10, "score": 0, "subscribers_count": 2 }, { "id": 396338187, "name": "CVE-2021-28476-tools-env", "full_name": "LaCeeKa\/CVE-2021-28476-tools-env", "owner": { "login": "LaCeeKa", "id": 88970302, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88970302?v=4", "html_url": "https:\/\/github.com\/LaCeeKa", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/LaCeeKa\/CVE-2021-28476-tools-env", "description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.", "fork": false, "created_at": "2021-08-15T12:06:44Z", "updated_at": "2024-10-26T16:43:59Z", "pushed_at": "2021-08-15T11:44:02Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 448441625, "name": "CVE-2021-28476", "full_name": "australeo\/CVE-2021-28476", "owner": { "login": "australeo", "id": 47684814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47684814?v=4", "html_url": "https:\/\/github.com\/australeo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/australeo\/CVE-2021-28476", "description": "CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM", "fork": false, "created_at": "2022-01-16T02:45:26Z", "updated_at": "2024-12-26T13:58:06Z", "pushed_at": "2022-01-16T02:46:22Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 471563181, "name": "0vercl0k", "full_name": "2273852279qqs\/0vercl0k", "owner": { "login": "2273852279qqs", "id": 101910961, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101910961?v=4", "html_url": "https:\/\/github.com\/2273852279qqs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/2273852279qqs\/0vercl0k", "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2022-03-19T01:33:04Z", "updated_at": "2022-03-19T01:33:04Z", "pushed_at": "2022-03-19T01:33:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 482583152, "name": "0vercl0k", "full_name": "dengyang123x\/0vercl0k", "owner": { "login": "dengyang123x", "id": 103896519, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103896519?v=4", "html_url": "https:\/\/github.com\/dengyang123x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dengyang123x\/0vercl0k", "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2022-04-17T17:00:49Z", "updated_at": "2022-05-31T07:42:57Z", "pushed_at": "2022-04-17T17:00:50Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]