[ { "id": 418375861, "name": "CVE-2021-36260", "full_name": "rabbitsafe\/CVE-2021-36260", "owner": { "login": "rabbitsafe", "id": 33046073, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4", "html_url": "https:\/\/github.com\/rabbitsafe" }, "html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-36260", "description": "CVE-2021-36260", "fork": false, "created_at": "2021-10-18T06:40:48Z", "updated_at": "2022-11-09T18:14:05Z", "pushed_at": "2022-09-19T02:12:42Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 15, "score": 0 }, { "id": 421880973, "name": "CVE-2021-36260", "full_name": "Aiminsun\/CVE-2021-36260", "owner": { "login": "Aiminsun", "id": 58260225, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4", "html_url": "https:\/\/github.com\/Aiminsun" }, "html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260", "description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.", "fork": false, "created_at": "2021-10-27T15:51:12Z", "updated_at": "2023-02-25T15:26:11Z", "pushed_at": "2021-10-28T06:37:37Z", "stargazers_count": 170, "watchers_count": 170, "has_discussions": false, "forks_count": 67, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 67, "watchers": 170, "score": 0 }, { "id": 424140037, "name": "CVE-2021-36260-metasploit", "full_name": "TaroballzChen\/CVE-2021-36260-metasploit", "owner": { "login": "TaroballzChen", "id": 27862593, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4", "html_url": "https:\/\/github.com\/TaroballzChen" }, "html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-36260-metasploit", "description": "the metasploit script(POC) about CVE-2021-36260 ", "fork": false, "created_at": "2021-11-03T08:11:49Z", "updated_at": "2022-11-09T18:14:17Z", "pushed_at": "2021-11-03T08:26:24Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 14, "score": 0 }, { "id": 437809411, "name": "CheckHKRCE", "full_name": "tuntin9x\/CheckHKRCE", "owner": { "login": "tuntin9x", "id": 42837549, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42837549?v=4", "html_url": "https:\/\/github.com\/tuntin9x" }, "html_url": "https:\/\/github.com\/tuntin9x\/CheckHKRCE", "description": "CVE-2021-36260", "fork": false, "created_at": "2021-12-13T09:23:36Z", "updated_at": "2022-11-17T12:42:51Z", "pushed_at": "2022-10-27T01:14:34Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 3, "score": 0 }, { "id": 520972929, "name": "CVE-2021-36260", "full_name": "Cuerz\/CVE-2021-36260", "owner": { "login": "Cuerz", "id": 84277976, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84277976?v=4", "html_url": "https:\/\/github.com\/Cuerz" }, "html_url": "https:\/\/github.com\/Cuerz\/CVE-2021-36260", "description": "海康威视RCE漏洞 批量检测和利用工具", "fork": false, "created_at": "2022-08-03T17:27:59Z", "updated_at": "2023-03-13T06:00:20Z", "pushed_at": "2022-08-05T19:57:30Z", "stargazers_count": 62, "watchers_count": 62, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-36260", "exploit" ], "visibility": "public", "forks": 14, "watchers": 62, "score": 0 } ]