PoC-in-GitHub/2022/CVE-2022-21907.json
2024-03-16 21:26:28 +09:00

527 lines
No EOL
18 KiB
JSON

[
{
"id": 446683592,
"name": "cve-2022-21907",
"full_name": "corelight\/cve-2022-21907",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-21907",
"description": "cve-2022-21907",
"fork": false,
"created_at": "2022-01-11T05:00:55Z",
"updated_at": "2022-03-21T07:03:34Z",
"pushed_at": "2022-01-26T20:31:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 6
},
{
"id": 448387955,
"name": "CVE-2022-21907",
"full_name": "mauricelambert\/CVE-2022-21907",
"owner": {
"login": "mauricelambert",
"id": 50479118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-21907",
"description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.",
"fork": false,
"created_at": "2022-01-15T20:50:25Z",
"updated_at": "2024-01-23T03:47:47Z",
"pushed_at": "2022-03-07T19:45:22Z",
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bluescreen",
"crash",
"cve",
"cve-2022-21907",
"denial-of-service",
"detection",
"dos",
"exploit",
"iis",
"metasploit",
"microsoft",
"nmap",
"payload",
"powershell",
"protection",
"python3",
"ruby",
"vulnerability",
"webserver"
],
"visibility": "public",
"forks": 11,
"watchers": 27,
"score": 0,
"subscribers_count": 3
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2024-01-30T19:33:15Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 364,
"watchers_count": 364,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 364,
"score": 0,
"subscribers_count": 10
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",
"full_name": "p0dalirius\/CVE-2022-21907-http.sys",
"owner": {
"login": "p0dalirius",
"id": 79218792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
"html_url": "https:\/\/github.com\/p0dalirius"
},
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys",
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2024-01-26T09:40:56Z",
"pushed_at": "2024-03-16T08:26:06Z",
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"crash",
"cve-2022-21907",
"iis-server",
"poc",
"python",
"rce"
],
"visibility": "public",
"forks": 16,
"watchers": 78,
"score": 0,
"subscribers_count": 6
},
{
"id": 451128086,
"name": "CVE-2022-21907-Vulnerability-PoC",
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
"owner": {
"login": "michelep",
"id": 1425559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
"html_url": "https:\/\/github.com\/michelep"
},
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
"description": "CVE-2022-21907 Vulnerability PoC",
"fork": false,
"created_at": "2022-01-23T14:25:12Z",
"updated_at": "2024-01-25T18:49:06Z",
"pushed_at": "2022-01-23T14:28:54Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 23,
"score": 0,
"subscribers_count": 2
},
{
"id": 477659433,
"name": "CVE-2022-21907",
"full_name": "polakow\/CVE-2022-21907",
"owner": {
"login": "polakow",
"id": 53662773,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53662773?v=4",
"html_url": "https:\/\/github.com\/polakow"
},
"html_url": "https:\/\/github.com\/polakow\/CVE-2022-21907",
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2024-01-19T17:37:14Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 129,
"score": 0,
"subscribers_count": 4
},
{
"id": 482340383,
"name": "nmap-CVE-2022-21907",
"full_name": "gpiechnik2\/nmap-CVE-2022-21907",
"owner": {
"login": "gpiechnik2",
"id": 48253270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4",
"html_url": "https:\/\/github.com\/gpiechnik2"
},
"html_url": "https:\/\/github.com\/gpiechnik2\/nmap-CVE-2022-21907",
"description": "Repository containing nse script for vulnerability CVE-2022-21907. It is a component (IIS) vulnerability on Windows. It allows remote code execution. The vulnerability affects the kernel module http. sys, which handles most basic IIS operations.",
"fork": false,
"created_at": "2022-04-16T19:13:27Z",
"updated_at": "2022-08-30T10:49:35Z",
"pushed_at": "2022-04-16T20:31:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-21907",
"nmap",
"nse",
"script",
"vuln",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 490768227,
"name": "cve-2022-21907-http.sys",
"full_name": "iveresk\/cve-2022-21907-http.sys",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907-http.sys",
"description": "An unauthenticated attacker can send an HTTP request with an \"Accept-Encoding\" HTTP request header triggering a double free in the unknown coding-list inside the HTTP Protocol Stack (http.sys) to process packets, resulting in a kernel crash.",
"fork": false,
"created_at": "2022-05-10T16:00:50Z",
"updated_at": "2022-05-22T07:39:33Z",
"pushed_at": "2022-05-24T12:40:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 492939533,
"name": "cve-2022-21907",
"full_name": "iveresk\/cve-2022-21907",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-21907",
"description": "Multithread Golang application",
"fork": false,
"created_at": "2022-05-16T17:42:45Z",
"updated_at": "2022-07-03T17:01:53Z",
"pushed_at": "2022-06-10T10:02:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 559316245,
"name": "CVE-2022-21907",
"full_name": "Malwareman007\/CVE-2022-21907",
"owner": {
"login": "Malwareman007",
"id": 86009160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
"html_url": "https:\/\/github.com\/Malwareman007"
},
"html_url": "https:\/\/github.com\/Malwareman007\/CVE-2022-21907",
"description": "POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.",
"fork": false,
"created_at": "2022-10-29T18:25:26Z",
"updated_at": "2023-05-06T12:14:50Z",
"pushed_at": "2023-10-18T03:00:29Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-21907",
"exploit",
"http",
"http-protocol",
"poc",
"remote-code-execution",
"security",
"security-tools",
"vulnerability",
"vulnerability-scanners"
],
"visibility": "public",
"forks": 4,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
{
"id": 569183785,
"name": "Home-Demolisher",
"full_name": "0xmaximus\/Home-Demolisher",
"owner": {
"login": "0xmaximus",
"id": 63053441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4",
"html_url": "https:\/\/github.com\/0xmaximus"
},
"html_url": "https:\/\/github.com\/0xmaximus\/Home-Demolisher",
"description": "PoC for CVE-2021-31166 and CVE-2022-21907",
"fork": false,
"created_at": "2022-11-22T09:10:36Z",
"updated_at": "2024-01-13T10:43:03Z",
"pushed_at": "2022-12-08T11:05:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 3
},
{
"id": 632224259,
"name": "CVE-2022-21907",
"full_name": "cassie0206\/CVE-2022-21907",
"owner": {
"login": "cassie0206",
"id": 90564331,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90564331?v=4",
"html_url": "https:\/\/github.com\/cassie0206"
},
"html_url": "https:\/\/github.com\/cassie0206\/CVE-2022-21907",
"description": "2022 Spring Prof. 謝續平",
"fork": false,
"created_at": "2023-04-25T01:13:51Z",
"updated_at": "2023-05-17T08:52:27Z",
"pushed_at": "2023-06-25T07:11:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 637001964,
"name": "CVE-2022-21907-RCE",
"full_name": "EzoomE\/CVE-2022-21907-RCE",
"owner": {
"login": "EzoomE",
"id": 99851303,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99851303?v=4",
"html_url": "https:\/\/github.com\/EzoomE"
},
"html_url": "https:\/\/github.com\/EzoomE\/CVE-2022-21907-RCE",
"description": "CVE-2022-21907漏洞RCE PoC",
"fork": false,
"created_at": "2023-05-06T07:50:08Z",
"updated_at": "2023-05-06T07:50:53Z",
"pushed_at": "2023-05-22T03:14:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 679736679,
"name": "CVE-2022-21907",
"full_name": "asepsaepdin\/CVE-2022-21907",
"owner": {
"login": "asepsaepdin",
"id": 122620685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
"html_url": "https:\/\/github.com\/asepsaepdin"
},
"html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2022-21907",
"description": null,
"fork": false,
"created_at": "2023-08-17T13:58:00Z",
"updated_at": "2023-08-17T14:12:38Z",
"pushed_at": "2023-09-03T15:14:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 729648780,
"name": "CVE-2022-21907",
"full_name": "kamal-marouane\/CVE-2022-21907",
"owner": {
"login": "kamal-marouane",
"id": 110986028,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110986028?v=4",
"html_url": "https:\/\/github.com\/kamal-marouane"
},
"html_url": "https:\/\/github.com\/kamal-marouane\/CVE-2022-21907",
"description": "Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash.",
"fork": false,
"created_at": "2023-12-09T22:26:49Z",
"updated_at": "2023-12-11T20:32:49Z",
"pushed_at": "2024-01-19T04:04:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]