mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
218 lines
No EOL
7.5 KiB
JSON
218 lines
No EOL
7.5 KiB
JSON
[
|
|
{
|
|
"id": 446683592,
|
|
"name": "cve-2022-21907",
|
|
"full_name": "corelight\/cve-2022-21907",
|
|
"owner": {
|
|
"login": "corelight",
|
|
"id": 21672558,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
|
"html_url": "https:\/\/github.com\/corelight"
|
|
},
|
|
"html_url": "https:\/\/github.com\/corelight\/cve-2022-21907",
|
|
"description": "cve-2022-21907",
|
|
"fork": false,
|
|
"created_at": "2022-01-11T05:00:55Z",
|
|
"updated_at": "2022-03-21T07:03:34Z",
|
|
"pushed_at": "2022-01-26T20:31:22Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 448387955,
|
|
"name": "CVE-2022-21907",
|
|
"full_name": "mauricelambert\/CVE-2022-21907",
|
|
"owner": {
|
|
"login": "mauricelambert",
|
|
"id": 50479118,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
|
"html_url": "https:\/\/github.com\/mauricelambert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-21907",
|
|
"description": "CVE-2022-21907: detection, protection, exploitation and demonstration. Exploitation: Powershell, Python, Ruby, NMAP and Metasploit. Detection and protection: Powershell. Demonstration: Youtube.",
|
|
"fork": false,
|
|
"created_at": "2022-01-15T20:50:25Z",
|
|
"updated_at": "2022-03-20T07:36:21Z",
|
|
"pushed_at": "2022-03-07T19:45:22Z",
|
|
"stargazers_count": 18,
|
|
"watchers_count": 18,
|
|
"forks_count": 7,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"bluescreen",
|
|
"crash",
|
|
"cve",
|
|
"cve-2022-21907",
|
|
"denial-of-service",
|
|
"detection",
|
|
"dos",
|
|
"exploit",
|
|
"iis",
|
|
"metasploit",
|
|
"microsoft",
|
|
"nmap",
|
|
"payload",
|
|
"powershell",
|
|
"protection",
|
|
"python3",
|
|
"ruby",
|
|
"vulnerability",
|
|
"webserver"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 7,
|
|
"watchers": 18,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 448729790,
|
|
"name": "CVE-2022-21907",
|
|
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
|
|
"owner": {
|
|
"login": "ZZ-SOCMAP",
|
|
"id": 98105412,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
|
|
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
|
|
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
|
|
"fork": false,
|
|
"created_at": "2022-01-17T02:28:50Z",
|
|
"updated_at": "2022-03-28T19:30:24Z",
|
|
"pushed_at": "2022-01-20T02:07:59Z",
|
|
"stargazers_count": 356,
|
|
"watchers_count": 356,
|
|
"forks_count": 97,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 97,
|
|
"watchers": 356,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 448909871,
|
|
"name": "CVE-2022-21907",
|
|
"full_name": "xiska62314\/CVE-2022-21907",
|
|
"owner": {
|
|
"login": "xiska62314",
|
|
"id": 97891523,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
|
|
"html_url": "https:\/\/github.com\/xiska62314"
|
|
},
|
|
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
|
|
"description": "CVE-2022-21907",
|
|
"fork": false,
|
|
"created_at": "2022-01-17T13:42:44Z",
|
|
"updated_at": "2022-01-17T13:42:44Z",
|
|
"pushed_at": "2022-01-17T13:42:45Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 448952968,
|
|
"name": "CVE-2022-21907-http.sys",
|
|
"full_name": "p0dalirius\/CVE-2022-21907-http.sys",
|
|
"owner": {
|
|
"login": "p0dalirius",
|
|
"id": 79218792,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79218792?v=4",
|
|
"html_url": "https:\/\/github.com\/p0dalirius"
|
|
},
|
|
"html_url": "https:\/\/github.com\/p0dalirius\/CVE-2022-21907-http.sys",
|
|
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
|
|
"fork": false,
|
|
"created_at": "2022-01-17T15:42:37Z",
|
|
"updated_at": "2022-03-24T14:41:25Z",
|
|
"pushed_at": "2022-02-25T11:05:11Z",
|
|
"stargazers_count": 59,
|
|
"watchers_count": 59,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"crash",
|
|
"cve-2022-21907",
|
|
"iis-server",
|
|
"poc",
|
|
"python",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 59,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 451128086,
|
|
"name": "CVE-2022-21907-Vulnerability-PoC",
|
|
"full_name": "michelep\/CVE-2022-21907-Vulnerability-PoC",
|
|
"owner": {
|
|
"login": "michelep",
|
|
"id": 1425559,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1425559?v=4",
|
|
"html_url": "https:\/\/github.com\/michelep"
|
|
},
|
|
"html_url": "https:\/\/github.com\/michelep\/CVE-2022-21907-Vulnerability-PoC",
|
|
"description": "CVE-2022-21907 Vulnerability PoC",
|
|
"fork": false,
|
|
"created_at": "2022-01-23T14:25:12Z",
|
|
"updated_at": "2022-03-21T07:03:05Z",
|
|
"pushed_at": "2022-01-23T14:28:54Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 461942989,
|
|
"name": "CVE-2022-21907-RCE-POC",
|
|
"full_name": "coconut20\/CVE-2022-21907-RCE-POC",
|
|
"owner": {
|
|
"login": "coconut20",
|
|
"id": 97525284,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97525284?v=4",
|
|
"html_url": "https:\/\/github.com\/coconut20"
|
|
},
|
|
"html_url": "https:\/\/github.com\/coconut20\/CVE-2022-21907-RCE-POC",
|
|
"description": "CVE-2022-21907 Mass Exploitation tool written in Python 3 compatible with lists of URL\/IPs. For a large number of targets you can increase the number of threads, we don't recommend more than 1024. This tool is NOT free to prevent abuse and do not expect to find a fix-it-all proof of concept for exploitation for free. Only for those knowledgeable.",
|
|
"fork": false,
|
|
"created_at": "2022-02-21T16:28:39Z",
|
|
"updated_at": "2022-02-25T01:34:34Z",
|
|
"pushed_at": "2022-02-21T16:38:50Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 4,
|
|
"score": 0
|
|
}
|
|
] |