[ { "id": 418375861, "name": "CVE-2021-36260", "full_name": "rabbitsafe\/CVE-2021-36260", "owner": { "login": "rabbitsafe", "id": 33046073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4", "html_url": "https:\/\/github.com\/rabbitsafe", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-36260", "description": "CVE-2021-36260", "fork": false, "created_at": "2021-10-18T06:40:48Z", "updated_at": "2024-10-03T10:45:48Z", "pushed_at": "2023-10-27T02:20:32Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 16, "score": 0, "subscribers_count": 1 }, { "id": 421880973, "name": "CVE-2021-36260", "full_name": "Aiminsun\/CVE-2021-36260", "owner": { "login": "Aiminsun", "id": 58260225, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4", "html_url": "https:\/\/github.com\/Aiminsun", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260", "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", "updated_at": "2025-01-08T18:53:38Z", "pushed_at": "2021-10-28T06:37:37Z", "stargazers_count": 258, "watchers_count": 258, "has_discussions": false, "forks_count": 76, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 76, "watchers": 258, "score": 0, "subscribers_count": 5 }, { "id": 424140037, "name": "CVE-2021-36260-metasploit", "full_name": "TaroballzChen\/CVE-2021-36260-metasploit", "owner": { "login": "TaroballzChen", "id": 27862593, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4", "html_url": "https:\/\/github.com\/TaroballzChen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-36260-metasploit", "description": "the metasploit script(POC) about CVE-2021-36260 ", "fork": false, "created_at": "2021-11-03T08:11:49Z", "updated_at": "2024-08-12T20:17:46Z", "pushed_at": "2021-11-03T08:26:24Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 16, "score": 0, "subscribers_count": 2 }, { "id": 437809411, "name": "CheckHKRCE", "full_name": "tuntin9x\/CheckHKRCE", "owner": { "login": "tuntin9x", "id": 42837549, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42837549?v=4", "html_url": "https:\/\/github.com\/tuntin9x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tuntin9x\/CheckHKRCE", "description": "CVE-2021-36260", "fork": false, "created_at": "2021-12-13T09:23:36Z", "updated_at": "2024-08-13T14:54:28Z", "pushed_at": "2022-10-27T01:14:34Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 520972929, "name": "CVE-2021-36260", "full_name": "Cuerz\/CVE-2021-36260", "owner": { "login": "Cuerz", "id": 84277976, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84277976?v=4", "html_url": "https:\/\/github.com\/Cuerz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Cuerz\/CVE-2021-36260", "description": "海康威视RCE漏洞 批量检测和利用工具", "fork": false, "created_at": "2022-08-03T17:27:59Z", "updated_at": "2025-01-06T10:44:12Z", "pushed_at": "2022-08-05T19:57:30Z", "stargazers_count": 145, "watchers_count": 145, "has_discussions": false, "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-36260", "exploit" ], "visibility": "public", "forks": 24, "watchers": 145, "score": 0, "subscribers_count": 2 }, { "id": 530277219, "name": "Simple-CVE-2021-36260", "full_name": "TakenoSite\/Simple-CVE-2021-36260", "owner": { "login": "TakenoSite", "id": 84880497, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84880497?v=4", "html_url": "https:\/\/github.com\/TakenoSite", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TakenoSite\/Simple-CVE-2021-36260", "description": null, "fork": false, "created_at": "2022-08-29T15:21:11Z", "updated_at": "2023-05-10T06:31:35Z", "pushed_at": "2022-08-31T11:27:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 667627206, "name": "hikvision_brute", "full_name": "r3t4k3r\/hikvision_brute", "owner": { "login": "r3t4k3r", "id": 86055096, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86055096?v=4", "html_url": "https:\/\/github.com\/r3t4k3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r3t4k3r\/hikvision_brute", "description": "Brute Hikvision CAMS with CVE-2021-36260 Exploit", "fork": false, "created_at": "2023-07-18T00:31:47Z", "updated_at": "2024-11-08T07:20:31Z", "pushed_at": "2023-07-29T17:41:39Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 708419065, "name": "HIK-CVE-2021-36260-Exploit", "full_name": "haingn\/HIK-CVE-2021-36260-Exploit", "owner": { "login": "haingn", "id": 52133074, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52133074?v=4", "html_url": "https:\/\/github.com\/haingn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/haingn\/HIK-CVE-2021-36260-Exploit", "description": null, "fork": false, "created_at": "2023-10-22T14:09:18Z", "updated_at": "2023-10-22T14:09:32Z", "pushed_at": "2023-10-22T14:09:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 894493486, "name": "hikvision_probe", "full_name": "aengussong\/hikvision_probe", "owner": { "login": "aengussong", "id": 26045876, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26045876?v=4", "html_url": "https:\/\/github.com\/aengussong", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aengussong\/hikvision_probe", "description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)", "fork": false, "created_at": "2024-11-26T13:02:18Z", "updated_at": "2025-01-13T11:38:52Z", "pushed_at": "2024-11-26T13:21:56Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]