[ { "id": 446683592, "name": "cve-2022-21907", "full_name": "corelight\/cve-2022-21907", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/cve-2022-21907", "description": "cve-2022-21907", "fork": false, "created_at": "2022-01-11T05:00:55Z", "updated_at": "2022-03-21T07:03:34Z", "pushed_at": "2022-01-26T20:31:22Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 448387955, "name": "CVE-2022-21907", "full_name": "mauricelambert\/CVE-2022-21907", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert" }, "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-21907", "description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.", "fork": false, "created_at": "2022-01-15T20:50:25Z", "updated_at": "2022-10-08T17:35:08Z", "pushed_at": "2022-03-07T19:45:22Z", "stargazers_count": 25, "watchers_count": 25, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bluescreen", "crash", "cve", "cve-2022-21907", "denial-of-service", "detection", "dos", "exploit", "iis", "metasploit", "microsoft", "nmap", "payload", "powershell", "protection", "python3", "ruby", "vulnerability", "webserver" ], "visibility": "public", "forks": 8, "watchers": 25, "score": 0 }, { "id": 448729790, "name": "CVE-2022-21907", "full_name": "ZZ-SOCMAP\/CVE-2022-21907", "owner": { "login": "ZZ-SOCMAP", "id": 98105412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4", "html_url": "https:\/\/github.com\/ZZ-SOCMAP" }, "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907", "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "fork": false, "created_at": "2022-01-17T02:28:50Z", "updated_at": "2022-10-29T19:25:12Z", "pushed_at": "2022-01-20T02:07:59Z", "stargazers_count": 366, "watchers_count": 366, "forks_count": 99, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 99, "watchers": 366, "score": 0 }, { "id": 448909871, "name": "CVE-2022-21907", "full_name": "xiska62314\/CVE-2022-21907", "owner": { "login": "xiska62314", "id": 97891523, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4", "html_url": "https:\/\/github.com\/xiska62314" }, "html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907", "description": "CVE-2022-21907", "fork": false, "created_at": "2022-01-17T13:42:44Z", "updated_at": "2022-01-17T13:42:44Z", "pushed_at": "2022-01-17T13:42:45Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 448952968, "name": "CVE-2022-21907-http.sys", "full_name": "p0dalirius\/CVE-2022-21907-http.sys", "owner": { "login": "p0dalirius", "id": 79218792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4", "html_url": "https:\/\/github.com\/p0dalirius" }, "html_url": "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys", "description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers", "fork": false, "created_at": "2022-01-17T15:42:37Z", "updated_at": "2022-10-10T23:42:27Z", "pushed_at": "2022-05-03T10:40:31Z", "stargazers_count": 70, "watchers_count": 70, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "crash", "cve-2022-21907", "iis-server", "poc", "python", "rce" ], "visibility": "public", "forks": 16, "watchers": 70, "score": 0 }, { "id": 451128086, "name": "CVE-2022-21907-Vulnerability-PoC", "full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC", "owner": { "login": "michelep", "id": 1425559, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4", "html_url": "https:\/\/github.com\/michelep" }, "html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC", "description": "CVE-2022-21907 Vulnerability PoC", "fork": false, "created_at": "2022-01-23T14:25:12Z", "updated_at": "2022-11-03T14:00:27Z", "pushed_at": "2022-01-23T14:28:54Z", "stargazers_count": 15, "watchers_count": 15, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 15, "score": 0 }, { "id": 477659433, "name": "CVE-2022-21907", "full_name": "polakow\/CVE-2022-21907", "owner": { "login": "polakow", "id": 53662773, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53662773?v=4", "html_url": "https:\/\/github.com\/polakow" }, "html_url": "https:\/\/github.com\/polakow\/CVE-2022-21907", "description": "A REAL DoS exploit for CVE-2022-21907", "fork": false, "created_at": "2022-04-04T10:53:28Z", "updated_at": "2022-10-15T13:40:22Z", "pushed_at": "2022-04-13T05:48:04Z", "stargazers_count": 124, "watchers_count": 124, "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 29, "watchers": 124, "score": 0 }, { "id": 482340383, "name": "nmap-CVE-2022-21907", "full_name": "gpiechnik2\/nmap-CVE-2022-21907", "owner": { "login": "gpiechnik2", "id": 48253270, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4", "html_url": "https:\/\/github.com\/gpiechnik2" }, "html_url": "https:\/\/github.com\/gpiechnik2\/nmap-CVE-2022-21907", "description": "Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations.", "fork": false, "created_at": "2022-04-16T19:13:27Z", "updated_at": "2022-08-30T10:49:35Z", "pushed_at": "2022-04-16T20:31:51Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-21907", "nmap", "nse", "script", "vuln", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 490768227, "name": "cve-2022-21907-http.sys", "full_name": "iveresk\/cve-2022-21907-http.sys", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907-http.sys", "description": "An unauthenticated attacker can send an HTTP request with an \"Accept-Encoding\" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.", "fork": false, "created_at": "2022-05-10T16:00:50Z", "updated_at": "2022-05-22T07:39:33Z", "pushed_at": "2022-05-24T12:40:16Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 492939533, "name": "cve-2022-21907", "full_name": "iveresk\/cve-2022-21907", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907", "description": "Multithread Golang application", "fork": false, "created_at": "2022-05-16T17:42:45Z", "updated_at": "2022-07-03T17:01:53Z", "pushed_at": "2022-06-10T10:02:42Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 559316245, "name": "CVE-2022-21907", "full_name": "Malwareman007\/CVE-2022-21907", "owner": { "login": "Malwareman007", "id": 86009160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4", "html_url": "https:\/\/github.com\/Malwareman007" }, "html_url": "https:\/\/github.com\/Malwareman007\/CVE-2022-21907", "description": "POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.", "fork": false, "created_at": "2022-10-29T18:25:26Z", "updated_at": "2022-10-31T02:09:38Z", "pushed_at": "2022-10-29T18:35:04Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-21907", "exploit", "http", "http-protocol", "poc", "remote-code-execution", "security", "security-tools", "vulnerability", "vulnerability-scanners" ], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 } ]