PoC-in-GitHub/2021/CVE-2021-40449.json
2023-02-10 03:31:51 +09:00

209 lines
No EOL
6.9 KiB
JSON

[
{
"id": 417881648,
"name": "CallbackHell",
"full_name": "ly4k\/CallbackHell",
"owner": {
"login": "ly4k",
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ly4k"
},
"html_url": "https:\/\/github.com\/ly4k\/CallbackHell",
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2022-12-31T11:20:51Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 437,
"watchers_count": 437,
"has_discussions": false,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-40449"
],
"visibility": "public",
"forks": 94,
"watchers": 437,
"score": 0
},
{
"id": 419264342,
"name": "CVE-2021-40449-Exploit",
"full_name": "KaLendsi\/CVE-2021-40449-Exploit",
"owner": {
"login": "KaLendsi",
"id": 68001644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
"html_url": "https:\/\/github.com\/KaLendsi"
},
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-40449-Exploit",
"description": "windows 10 14393 LPE",
"fork": false,
"created_at": "2021-10-20T09:24:36Z",
"updated_at": "2023-01-31T18:43:45Z",
"pushed_at": "2021-10-28T03:51:09Z",
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 87,
"score": 0
},
{
"id": 420883668,
"name": "CVE-2021-40449",
"full_name": "hakivvi\/CVE-2021-40449",
"owner": {
"login": "hakivvi",
"id": 67718634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67718634?v=4",
"html_url": "https:\/\/github.com\/hakivvi"
},
"html_url": "https:\/\/github.com\/hakivvi\/CVE-2021-40449",
"description": "LPE exploit for a UAF in Windows (CVE-2021-40449).",
"fork": false,
"created_at": "2021-10-25T04:58:49Z",
"updated_at": "2023-01-31T18:52:30Z",
"pushed_at": "2021-11-05T06:54:10Z",
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-40449"
],
"visibility": "public",
"forks": 17,
"watchers": 35,
"score": 0
},
{
"id": 425552572,
"name": "CVE-2021-40449_poc",
"full_name": "Kristal-g\/CVE-2021-40449_poc",
"owner": {
"login": "Kristal-g",
"id": 61376744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61376744?v=4",
"html_url": "https:\/\/github.com\/Kristal-g"
},
"html_url": "https:\/\/github.com\/Kristal-g\/CVE-2021-40449_poc",
"description": "Exploit for CVE-2021-40449",
"fork": false,
"created_at": "2021-11-07T16:15:19Z",
"updated_at": "2023-02-02T12:55:16Z",
"pushed_at": "2021-11-07T16:21:20Z",
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 51,
"score": 0
},
{
"id": 427341436,
"name": "cve-2021-40449-poc",
"full_name": "CppXL\/cve-2021-40449-poc",
"owner": {
"login": "CppXL",
"id": 36043454,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36043454?v=4",
"html_url": "https:\/\/github.com\/CppXL"
},
"html_url": "https:\/\/github.com\/CppXL\/cve-2021-40449-poc",
"description": null,
"fork": false,
"created_at": "2021-11-12T11:49:10Z",
"updated_at": "2022-04-13T09:55:40Z",
"pushed_at": "2021-11-12T13:28:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 461544780,
"name": "CVE-2021-40449-NtGdiResetDC-UAF",
"full_name": "BL0odz\/CVE-2021-40449-NtGdiResetDC-UAF",
"owner": {
"login": "BL0odz",
"id": 38938632,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38938632?v=4",
"html_url": "https:\/\/github.com\/BL0odz"
},
"html_url": "https:\/\/github.com\/BL0odz\/CVE-2021-40449-NtGdiResetDC-UAF",
"description": null,
"fork": false,
"created_at": "2022-02-20T16:23:26Z",
"updated_at": "2022-11-09T18:15:22Z",
"pushed_at": "2022-02-20T16:34:32Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 8,
"score": 0
},
{
"id": 466221042,
"name": "voidmap",
"full_name": "SamuelTulach\/voidmap",
"owner": {
"login": "SamuelTulach",
"id": 16323119,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16323119?v=4",
"html_url": "https:\/\/github.com\/SamuelTulach"
},
"html_url": "https:\/\/github.com\/SamuelTulach\/voidmap",
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2023-02-09T15:20:08Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 68,
"score": 0
}
]