[ { "id": 635201457, "name": "CVE-2021-41091", "full_name": "UncleJ4ck\/CVE-2021-41091", "owner": { "login": "UncleJ4ck", "id": 52085661, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52085661?v=4", "html_url": "https:\/\/github.com\/UncleJ4ck", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/UncleJ4ck\/CVE-2021-41091", "description": "POC for CVE-2021-41091", "fork": false, "created_at": "2023-05-02T07:25:13Z", "updated_at": "2025-01-05T16:21:20Z", "pushed_at": "2023-05-20T09:16:34Z", "stargazers_count": 64, "watchers_count": 64, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 64, "score": 0, "subscribers_count": 1 }, { "id": 798589964, "name": "CVE-2021-41091", "full_name": "jrbH4CK\/CVE-2021-41091", "owner": { "login": "jrbH4CK", "id": 163496398, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163496398?v=4", "html_url": "https:\/\/github.com\/jrbH4CK", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jrbH4CK\/CVE-2021-41091", "description": null, "fork": false, "created_at": "2024-05-10T04:42:35Z", "updated_at": "2024-05-10T04:48:04Z", "pushed_at": "2024-05-10T04:48:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 822121304, "name": "Vulnerable-Docker-Engine", "full_name": "SNE-M23-SN\/Vulnerable-Docker-Engine", "owner": { "login": "SNE-M23-SN", "id": 174135229, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174135229?v=4", "html_url": "https:\/\/github.com\/SNE-M23-SN", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SNE-M23-SN\/Vulnerable-Docker-Engine", "description": "This exploit offers an in-depth look at the CVE-2021-41091 security vulnerability and provides a step-by-step guide on how to utilize the exploit script to achieve privilege escalation on a host.", "fork": false, "created_at": "2024-06-30T10:57:02Z", "updated_at": "2024-07-24T11:06:49Z", "pushed_at": "2024-07-24T11:06:46Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]