PoC-in-GitHub/2022/CVE-2022-21907.json
2022-08-22 15:17:12 +09:00

344 lines
No EOL
12 KiB
JSON

[
{
"id": 446683592,
"name": "cve-2022-21907",
"full_name": "corelight\/cve-2022-21907",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-21907",
"description": "cve-2022-21907",
"fork": false,
"created_at": "2022-01-11T05:00:55Z",
"updated_at": "2022-03-21T07:03:34Z",
"pushed_at": "2022-01-26T20:31:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 448387955,
"name": "CVE-2022-21907",
"full_name": "mauricelambert\/CVE-2022-21907",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-21907",
"description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.",
"fork": false,
"created_at": "2022-01-15T20:50:25Z",
"updated_at": "2022-08-15T15:42:04Z",
"pushed_at": "2022-03-07T19:45:22Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bluescreen",
"crash",
"cve",
"cve-2022-21907",
"denial-of-service",
"detection",
"dos",
"exploit",
"iis",
"metasploit",
"microsoft",
"nmap",
"payload",
"powershell",
"protection",
"python3",
"ruby",
"vulnerability",
"webserver"
],
"visibility": "public",
"forks": 8,
"watchers": 22,
"score": 0
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-08-15T15:42:05Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 363,
"watchers_count": 363,
"forks_count": 99,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 99,
"watchers": 363,
"score": 0
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",
"full_name": "p0dalirius\/CVE-2022-21907-http.sys",
"owner": {
"login": "p0dalirius",
"id": 79218792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
"html_url": "https:\/\/github.com\/p0dalirius"
},
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys",
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-08-15T15:42:05Z",
"pushed_at": "2022-05-03T10:40:31Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"crash",
"cve-2022-21907",
"iis-server",
"poc",
"python",
"rce"
],
"visibility": "public",
"forks": 15,
"watchers": 67,
"score": 0
},
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2022-08-15T14:14:19Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"score": 0
},
{
"id": 461942989,
"name": "CVE-2022-21907-RCE-POC",
"full_name": "coconut20\/CVE-2022-21907-RCE-POC",
"owner": {
"login": "coconut20",
"id": 97525284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97525284?v=4",
"html_url": "https:\/\/github.com\/coconut20"
},
"html_url": "https:\/\/github.com\/coconut20\/CVE-2022-21907-RCE-POC",
"description": "CVE-2022-21907 Mass Exploitation tool written in Python 3 compatible with lists of URL\/IPs. For a large number of targets you can increase the number of threads, we don't recommend more than 1024. This tool is NOT free to prevent abuse and do not expect to find a fix-it-all proof of concept for exploitation for free. Only for those knowledgeable.",
"fork": false,
"created_at": "2022-02-21T16:28:39Z",
"updated_at": "2022-04-04T23:51:56Z",
"pushed_at": "2022-02-21T16:38:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 477659433,
"name": "CVE-2022-21907",
"full_name": "polakow\/CVE-2022-21907",
"owner": {
"login": "polakow",
"id": 53662773,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53662773?v=4",
"html_url": "https:\/\/github.com\/polakow"
},
"html_url": "https:\/\/github.com\/polakow\/CVE-2022-21907",
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2022-08-22T03:00:57Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 121,
"score": 0
},
{
"id": 482340383,
"name": "nmap-CVE-2022-21907",
"full_name": "gpiechnik2\/nmap-CVE-2022-21907",
"owner": {
"login": "gpiechnik2",
"id": 48253270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4",
"html_url": "https:\/\/github.com\/gpiechnik2"
},
"html_url": "https:\/\/github.com\/gpiechnik2\/nmap-CVE-2022-21907",
"description": "Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations.",
"fork": false,
"created_at": "2022-04-16T19:13:27Z",
"updated_at": "2022-08-10T17:51:05Z",
"pushed_at": "2022-04-16T20:31:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-21907",
"nmap",
"nse",
"script",
"vuln",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 490768227,
"name": "cve-2022-21907-http.sys",
"full_name": "iveresk\/cve-2022-21907-http.sys",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907-http.sys",
"description": "An unauthenticated attacker can send an HTTP request with an \"Accept-Encoding\" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.",
"fork": false,
"created_at": "2022-05-10T16:00:50Z",
"updated_at": "2022-05-22T07:39:33Z",
"pushed_at": "2022-05-24T12:40:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 492939533,
"name": "cve-2022-21907",
"full_name": "iveresk\/cve-2022-21907",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907",
"description": "Multithread Golang application",
"fork": false,
"created_at": "2022-05-16T17:42:45Z",
"updated_at": "2022-07-03T17:01:53Z",
"pushed_at": "2022-06-10T10:02:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]