mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
163 lines
No EOL
5.7 KiB
JSON
163 lines
No EOL
5.7 KiB
JSON
[
|
|
{
|
|
"id": 367930039,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "0vercl0k\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "0vercl0k",
|
|
"id": 1476421,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
|
|
"html_url": "https:\/\/github.com\/0vercl0k"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166",
|
|
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
|
"fork": false,
|
|
"created_at": "2021-05-16T16:15:56Z",
|
|
"updated_at": "2021-05-31T12:52:46Z",
|
|
"pushed_at": "2021-05-21T23:58:50Z",
|
|
"stargazers_count": 717,
|
|
"watchers_count": 717,
|
|
"forks_count": 114,
|
|
"forks": 114,
|
|
"watchers": 717,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 368156601,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "An0ny-m0us\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "An0ny-m0us",
|
|
"id": 41460798,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4",
|
|
"html_url": "https:\/\/github.com\/An0ny-m0us"
|
|
},
|
|
"html_url": "https:\/\/github.com\/An0ny-m0us\/CVE-2021-31166",
|
|
"description": "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.",
|
|
"fork": false,
|
|
"created_at": "2021-05-17T11:12:45Z",
|
|
"updated_at": "2021-05-20T10:57:49Z",
|
|
"pushed_at": "2021-05-17T11:30:26Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 368306577,
|
|
"name": "CVE-2021-31166-detection-rules",
|
|
"full_name": "Frankmock\/CVE-2021-31166-detection-rules",
|
|
"owner": {
|
|
"login": "Frankmock",
|
|
"id": 41307333,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4",
|
|
"html_url": "https:\/\/github.com\/Frankmock"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Frankmock\/CVE-2021-31166-detection-rules",
|
|
"description": "Different rules to detect if CVE-2021-31166 is being exploited",
|
|
"fork": false,
|
|
"created_at": "2021-05-17T19:55:41Z",
|
|
"updated_at": "2021-05-23T20:00:40Z",
|
|
"pushed_at": "2021-05-23T20:00:38Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 368350830,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "corelight\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "corelight",
|
|
"id": 21672558,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
|
"html_url": "https:\/\/github.com\/corelight"
|
|
},
|
|
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-31166",
|
|
"description": "HTTP Protocol Stack CVE-2021-31166",
|
|
"fork": false,
|
|
"created_at": "2021-05-17T23:54:12Z",
|
|
"updated_at": "2021-05-28T07:38:28Z",
|
|
"pushed_at": "2021-05-28T00:41:52Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 368786720,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "zecopro\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "zecopro",
|
|
"id": 23106986,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4",
|
|
"html_url": "https:\/\/github.com\/zecopro"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zecopro\/CVE-2021-31166",
|
|
"description": "simple bash script for exploit CVE-2021-31166",
|
|
"fork": false,
|
|
"created_at": "2021-05-19T07:50:40Z",
|
|
"updated_at": "2021-05-19T08:39:46Z",
|
|
"pushed_at": "2021-05-19T08:18:56Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 370131263,
|
|
"name": "WIn-CVE-2021-31166",
|
|
"full_name": "bgsilvait\/WIn-CVE-2021-31166",
|
|
"owner": {
|
|
"login": "bgsilvait",
|
|
"id": 38823062,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4",
|
|
"html_url": "https:\/\/github.com\/bgsilvait"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-05-23T18:41:48Z",
|
|
"updated_at": "2021-05-23T19:32:43Z",
|
|
"pushed_at": "2021-05-23T19:32:41Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 370268982,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "Udyz\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "Udyz",
|
|
"id": 39673284,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
|
"html_url": "https:\/\/github.com\/Udyz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-31166",
|
|
"description": "http.sys remote UAF to Leak Credential",
|
|
"fork": false,
|
|
"created_at": "2021-05-24T07:42:18Z",
|
|
"updated_at": "2021-05-25T04:03:33Z",
|
|
"pushed_at": "2021-05-25T04:03:31Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |