[ { "id": 367930039, "name": "CVE-2021-31166", "full_name": "0vercl0k\/CVE-2021-31166", "owner": { "login": "0vercl0k", "id": 1476421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4", "html_url": "https:\/\/github.com\/0vercl0k" }, "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166", "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", "updated_at": "2021-07-14T16:48:53Z", "pushed_at": "2021-06-12T08:27:09Z", "stargazers_count": 749, "watchers_count": 749, "forks_count": 123, "forks": 123, "watchers": 749, "score": 0 }, { "id": 368156601, "name": "CVE-2021-31166", "full_name": "An0ny-m0us\/CVE-2021-31166", "owner": { "login": "An0ny-m0us", "id": 41460798, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4", "html_url": "https:\/\/github.com\/An0ny-m0us" }, "html_url": "https:\/\/github.com\/An0ny-m0us\/CVE-2021-31166", "description": "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.", "fork": false, "created_at": "2021-05-17T11:12:45Z", "updated_at": "2021-07-13T12:00:01Z", "pushed_at": "2021-05-17T11:30:26Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 0, "forks": 0, "watchers": 4, "score": 0 }, { "id": 368306577, "name": "CVE-2021-31166-detection-rules", "full_name": "Frankmock\/CVE-2021-31166-detection-rules", "owner": { "login": "Frankmock", "id": 41307333, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4", "html_url": "https:\/\/github.com\/Frankmock" }, "html_url": "https:\/\/github.com\/Frankmock\/CVE-2021-31166-detection-rules", "description": "Different rules to detect if CVE-2021-31166 is being exploited", "fork": false, "created_at": "2021-05-17T19:55:41Z", "updated_at": "2021-07-01T06:39:41Z", "pushed_at": "2021-05-23T20:00:38Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "forks": 1, "watchers": 4, "score": 0 }, { "id": 368350830, "name": "CVE-2021-31166", "full_name": "corelight\/CVE-2021-31166", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2021-31166", "description": "HTTP Protocol Stack CVE-2021-31166", "fork": false, "created_at": "2021-05-17T23:54:12Z", "updated_at": "2021-07-13T11:59:21Z", "pushed_at": "2021-05-28T00:41:52Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 0, "forks": 0, "watchers": 5, "score": 0 }, { "id": 368786720, "name": "CVE-2021-31166", "full_name": "zecopro\/CVE-2021-31166", "owner": { "login": "zecopro", "id": 23106986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4", "html_url": "https:\/\/github.com\/zecopro" }, "html_url": "https:\/\/github.com\/zecopro\/CVE-2021-31166", "description": "simple bash script for exploit CVE-2021-31166", "fork": false, "created_at": "2021-05-19T07:50:40Z", "updated_at": "2021-05-19T08:39:46Z", "pushed_at": "2021-05-19T08:18:56Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 370131263, "name": "WIn-CVE-2021-31166", "full_name": "bgsilvait\/WIn-CVE-2021-31166", "owner": { "login": "bgsilvait", "id": 38823062, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4", "html_url": "https:\/\/github.com\/bgsilvait" }, "html_url": "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166", "description": null, "fork": false, "created_at": "2021-05-23T18:41:48Z", "updated_at": "2021-05-23T19:32:43Z", "pushed_at": "2021-05-23T19:32:41Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 370268982, "name": "CVE-2021-31166", "full_name": "Udyz\/CVE-2021-31166", "owner": { "login": "Udyz", "id": 39673284, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4", "html_url": "https:\/\/github.com\/Udyz" }, "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-31166", "description": "http.sys remote UAF to Leak Credential", "fork": false, "created_at": "2021-05-24T07:42:18Z", "updated_at": "2021-05-25T04:03:33Z", "pushed_at": "2021-05-25T04:03:31Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 382641118, "name": "CVE-2021-31166-Exploit", "full_name": "y0g3sh-99\/CVE-2021-31166-Exploit", "owner": { "login": "y0g3sh-99", "id": 59962466, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4", "html_url": "https:\/\/github.com\/y0g3sh-99" }, "html_url": "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit", "description": "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)", "fork": false, "created_at": "2021-07-03T14:54:59Z", "updated_at": "2021-07-12T05:39:24Z", "pushed_at": "2021-07-03T15:27:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 } ]