[ { "id": 446683592, "name": "cve-2022-21907", "full_name": "corelight\/cve-2022-21907", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/cve-2022-21907", "description": "cve-2022-21907", "fork": false, "created_at": "2022-01-11T05:00:55Z", "updated_at": "2022-03-21T07:03:34Z", "pushed_at": "2022-01-26T20:31:22Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 6 }, { "id": 448387955, "name": "CVE-2022-21907", "full_name": "mauricelambert\/CVE-2022-21907", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert" }, "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-21907", "description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.", "fork": false, "created_at": "2022-01-15T20:50:25Z", "updated_at": "2024-01-23T03:47:47Z", "pushed_at": "2022-03-07T19:45:22Z", "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bluescreen", "crash", "cve", "cve-2022-21907", "denial-of-service", "detection", "dos", "exploit", "iis", "metasploit", "microsoft", "nmap", "payload", "powershell", "protection", "python3", "ruby", "vulnerability", "webserver" ], "visibility": "public", "forks": 11, "watchers": 27, "score": 0, "subscribers_count": 3 }, { "id": 448729790, "name": "CVE-2022-21907", "full_name": "ZZ-SOCMAP\/CVE-2022-21907", "owner": { "login": "ZZ-SOCMAP", "id": 98105412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4", "html_url": "https:\/\/github.com\/ZZ-SOCMAP" }, "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907", "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907", "fork": false, "created_at": "2022-01-17T02:28:50Z", "updated_at": "2024-01-30T19:33:15Z", "pushed_at": "2022-01-20T02:07:59Z", "stargazers_count": 364, "watchers_count": 364, "has_discussions": false, "forks_count": 98, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 98, "watchers": 364, "score": 0, "subscribers_count": 10 }, { "id": 448909871, "name": "CVE-2022-21907", "full_name": "xiska62314\/CVE-2022-21907", "owner": { "login": "xiska62314", "id": 97891523, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4", "html_url": "https:\/\/github.com\/xiska62314" }, "html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907", "description": "CVE-2022-21907", "fork": false, "created_at": "2022-01-17T13:42:44Z", "updated_at": "2022-01-17T13:42:44Z", "pushed_at": "2022-01-17T13:42:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 448952968, "name": "CVE-2022-21907-http.sys", "full_name": "p0dalirius\/CVE-2022-21907-http.sys", "owner": { "login": "p0dalirius", "id": 79218792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4", "html_url": "https:\/\/github.com\/p0dalirius" }, "html_url": "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys", "description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers", "fork": false, "created_at": "2022-01-17T15:42:37Z", "updated_at": "2024-01-26T09:40:56Z", "pushed_at": "2024-03-16T08:26:06Z", "stargazers_count": 78, "watchers_count": 78, "has_discussions": false, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "crash", "cve-2022-21907", "iis-server", "poc", "python", "rce" ], "visibility": "public", "forks": 16, "watchers": 78, "score": 0, "subscribers_count": 6 }, { "id": 451128086, "name": "CVE-2022-21907-Vulnerability-PoC", "full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC", "owner": { "login": "michelep", "id": 1425559, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4", "html_url": "https:\/\/github.com\/michelep" }, "html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC", "description": "CVE-2022-21907 Vulnerability PoC", "fork": false, "created_at": "2022-01-23T14:25:12Z", "updated_at": "2024-01-25T18:49:06Z", "pushed_at": "2022-01-23T14:28:54Z", "stargazers_count": 23, "watchers_count": 23, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 23, "score": 0, "subscribers_count": 2 }, { "id": 477659433, "name": "CVE-2022-21907", "full_name": "polakow\/CVE-2022-21907", "owner": { "login": "polakow", "id": 53662773, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53662773?v=4", "html_url": "https:\/\/github.com\/polakow" }, "html_url": "https:\/\/github.com\/polakow\/CVE-2022-21907", "description": "A REAL DoS exploit for CVE-2022-21907", "fork": false, "created_at": "2022-04-04T10:53:28Z", "updated_at": "2024-01-19T17:37:14Z", "pushed_at": "2022-04-13T05:48:04Z", "stargazers_count": 129, "watchers_count": 129, "has_discussions": false, "forks_count": 38, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 38, "watchers": 129, "score": 0, "subscribers_count": 4 }, { "id": 482340383, "name": "nmap-CVE-2022-21907", "full_name": "gpiechnik2\/nmap-CVE-2022-21907", "owner": { "login": "gpiechnik2", "id": 48253270, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4", "html_url": "https:\/\/github.com\/gpiechnik2" }, "html_url": "https:\/\/github.com\/gpiechnik2\/nmap-CVE-2022-21907", "description": "Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations.", "fork": false, "created_at": "2022-04-16T19:13:27Z", "updated_at": "2022-08-30T10:49:35Z", "pushed_at": "2022-04-16T20:31:51Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-21907", "nmap", "nse", "script", "vuln", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 490768227, "name": "cve-2022-21907-http.sys", "full_name": "iveresk\/cve-2022-21907-http.sys", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907-http.sys", "description": "An unauthenticated attacker can send an HTTP request with an \"Accept-Encoding\" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.", "fork": false, "created_at": "2022-05-10T16:00:50Z", "updated_at": "2022-05-22T07:39:33Z", "pushed_at": "2022-05-24T12:40:16Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 492939533, "name": "cve-2022-21907", "full_name": "iveresk\/cve-2022-21907", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907", "description": "Multithread Golang application", "fork": false, "created_at": "2022-05-16T17:42:45Z", "updated_at": "2022-07-03T17:01:53Z", "pushed_at": "2022-06-10T10:02:42Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 559316245, "name": "CVE-2022-21907", "full_name": "Malwareman007\/CVE-2022-21907", "owner": { "login": "Malwareman007", "id": 86009160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4", "html_url": "https:\/\/github.com\/Malwareman007" }, "html_url": "https:\/\/github.com\/Malwareman007\/CVE-2022-21907", "description": "POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.", "fork": false, "created_at": "2022-10-29T18:25:26Z", "updated_at": "2023-05-06T12:14:50Z", "pushed_at": "2023-10-18T03:00:29Z", "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-21907", "exploit", "http", "http-protocol", "poc", "remote-code-execution", "security", "security-tools", "vulnerability", "vulnerability-scanners" ], "visibility": "public", "forks": 4, "watchers": 17, "score": 0, "subscribers_count": 1 }, { "id": 569183785, "name": "Home-Demolisher", "full_name": "0xmaximus\/Home-Demolisher", "owner": { "login": "0xmaximus", "id": 63053441, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4", "html_url": "https:\/\/github.com\/0xmaximus" }, "html_url": "https:\/\/github.com\/0xmaximus\/Home-Demolisher", "description": "PoC for CVE-2021-31166 and CVE-2022-21907", "fork": false, "created_at": "2022-11-22T09:10:36Z", "updated_at": "2024-01-13T10:43:03Z", "pushed_at": "2022-12-08T11:05:50Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 3 }, { "id": 632224259, "name": "CVE-2022-21907", "full_name": "cassie0206\/CVE-2022-21907", "owner": { "login": "cassie0206", "id": 90564331, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90564331?v=4", "html_url": "https:\/\/github.com\/cassie0206" }, "html_url": "https:\/\/github.com\/cassie0206\/CVE-2022-21907", "description": "2022 Spring Prof. 謝續平", "fork": false, "created_at": "2023-04-25T01:13:51Z", "updated_at": "2023-05-17T08:52:27Z", "pushed_at": "2023-06-25T07:11:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 637001964, "name": "CVE-2022-21907-RCE", "full_name": "EzoomE\/CVE-2022-21907-RCE", "owner": { "login": "EzoomE", "id": 99851303, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99851303?v=4", "html_url": "https:\/\/github.com\/EzoomE" }, "html_url": "https:\/\/github.com\/EzoomE\/CVE-2022-21907-RCE", "description": "CVE-2022-21907漏洞RCE PoC", "fork": false, "created_at": "2023-05-06T07:50:08Z", "updated_at": "2023-05-06T07:50:53Z", "pushed_at": "2023-05-22T03:14:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 679736679, "name": "CVE-2022-21907", "full_name": "asepsaepdin\/CVE-2022-21907", "owner": { "login": "asepsaepdin", "id": 122620685, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4", "html_url": "https:\/\/github.com\/asepsaepdin" }, "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2022-21907", "description": null, "fork": false, "created_at": "2023-08-17T13:58:00Z", "updated_at": "2023-08-17T14:12:38Z", "pushed_at": "2023-09-03T15:14:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 729648780, "name": "CVE-2022-21907", "full_name": "kamal-marouane\/CVE-2022-21907", "owner": { "login": "kamal-marouane", "id": 110986028, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110986028?v=4", "html_url": "https:\/\/github.com\/kamal-marouane" }, "html_url": "https:\/\/github.com\/kamal-marouane\/CVE-2022-21907", "description": "Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash.", "fork": false, "created_at": "2023-12-09T22:26:49Z", "updated_at": "2023-12-11T20:32:49Z", "pushed_at": "2024-01-19T04:04:36Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]