[ { "id": 418375861, "name": "CVE-2021-36260", "full_name": "rabbitsafe\/CVE-2021-36260", "owner": { "login": "rabbitsafe", "id": 33046073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4", "html_url": "https:\/\/github.com\/rabbitsafe" }, "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-36260", "description": "CVE-2021-36260", "fork": false, "created_at": "2021-10-18T06:40:48Z", "updated_at": "2022-01-06T10:35:20Z", "pushed_at": "2021-11-23T07:26:03Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 11, "score": 0 }, { "id": 421880973, "name": "CVE-2021-36260", "full_name": "Aiminsun\/CVE-2021-36260", "owner": { "login": "Aiminsun", "id": 58260225, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4", "html_url": "https:\/\/github.com\/Aiminsun" }, "html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260", "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", "updated_at": "2022-01-27T08:07:50Z", "pushed_at": "2021-10-28T06:37:37Z", "stargazers_count": 83, "watchers_count": 83, "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 40, "watchers": 83, "score": 0 }, { "id": 424140037, "name": "CVE-2021-36260-metasploit", "full_name": "TaroballzChen\/CVE-2021-36260-metasploit", "owner": { "login": "TaroballzChen", "id": 27862593, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4", "html_url": "https:\/\/github.com\/TaroballzChen" }, "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-36260-metasploit", "description": "the metasploit script(POC) about CVE-2021-36260 ", "fork": false, "created_at": "2021-11-03T08:11:49Z", "updated_at": "2022-01-28T05:27:02Z", "pushed_at": "2021-11-03T08:26:24Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 8, "score": 0 }, { "id": 437809411, "name": "CheckHKRCE", "full_name": "tuntin9x\/CheckHKRCE", "owner": { "login": "tuntin9x", "id": 42837549, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42837549?v=4", "html_url": "https:\/\/github.com\/tuntin9x" }, "html_url": "https:\/\/github.com\/tuntin9x\/CheckHKRCE", "description": "CVE-2021-36260", "fork": false, "created_at": "2021-12-13T09:23:36Z", "updated_at": "2022-02-02T18:44:17Z", "pushed_at": "2021-12-13T15:12:19Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 } ]