PoC-in-GitHub/2021/CVE-2021-23017.json
2025-11-21 09:43:02 +09:00

292 lines
No EOL
10 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 439285309,
"name": "nginx-patch",
"full_name": "niandy\/nginx-patch",
"owner": {
"login": "niandy",
"id": 8412769,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8412769?v=4",
"html_url": "https:\/\/github.com\/niandy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/niandy\/nginx-patch",
"description": "nginx 1.15.10 patch against cve-2021-23017 (ingress version)",
"fork": false,
"created_at": "2021-12-17T09:53:39Z",
"updated_at": "2021-12-22T08:15:05Z",
"pushed_at": "2021-12-17T11:53:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 508934873,
"name": "CVE-2021-23017-PoC",
"full_name": "M507\/CVE-2021-23017-PoC",
"owner": {
"login": "M507",
"id": 38591075,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38591075?v=4",
"html_url": "https:\/\/github.com\/M507",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/M507\/CVE-2021-23017-PoC",
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2025-11-20T22:51:49Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-23017",
"poc"
],
"visibility": "public",
"forks": 25,
"watchers": 124,
"score": 0,
"subscribers_count": 4
},
{
"id": 668565009,
"name": "CVE-2021-23017-PoC",
"full_name": "lakshit1212\/CVE-2021-23017-PoC",
"owner": {
"login": "lakshit1212",
"id": 140044978,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140044978?v=4",
"html_url": "https:\/\/github.com\/lakshit1212",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lakshit1212\/CVE-2021-23017-PoC",
"description": null,
"fork": false,
"created_at": "2023-07-20T05:39:01Z",
"updated_at": "2023-08-22T23:46:40Z",
"pushed_at": "2023-07-20T05:43:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 707950575,
"name": "CVE-2021-23017",
"full_name": "ShivamDey\/CVE-2021-23017",
"owner": {
"login": "ShivamDey",
"id": 87941867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87941867?v=4",
"html_url": "https:\/\/github.com\/ShivamDey",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShivamDey\/CVE-2021-23017",
"description": null,
"fork": false,
"created_at": "2023-10-21T04:24:02Z",
"updated_at": "2023-10-21T04:25:17Z",
"pushed_at": "2023-10-21T04:25:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 900254066,
"name": "CVE-2021-23017-POC",
"full_name": "z3usx01\/CVE-2021-23017-POC",
"owner": {
"login": "z3usx01",
"id": 112891506,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112891506?v=4",
"html_url": "https:\/\/github.com\/z3usx01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3usx01\/CVE-2021-23017-POC",
"description": "The issue only affects nginx if the \"resolver\" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to forge UDP packets from the DNS server.",
"fork": false,
"created_at": "2024-12-08T09:47:52Z",
"updated_at": "2025-01-04T18:06:33Z",
"pushed_at": "2024-12-08T09:52:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 924624980,
"name": "-home-lukewago-Downloads-CVE-2021-23017-Nginx-1.14",
"full_name": "lukwagoasuman\/-home-lukewago-Downloads-CVE-2021-23017-Nginx-1.14",
"owner": {
"login": "lukwagoasuman",
"id": 22435191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22435191?v=4",
"html_url": "https:\/\/github.com\/lukwagoasuman",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lukwagoasuman\/-home-lukewago-Downloads-CVE-2021-23017-Nginx-1.14",
"description": null,
"fork": false,
"created_at": "2025-01-30T11:05:40Z",
"updated_at": "2025-01-30T11:06:30Z",
"pushed_at": "2025-01-30T11:06:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 968024590,
"name": "Vulnerability-Management",
"full_name": "Cybervixy\/Vulnerability-Management",
"owner": {
"login": "Cybervixy",
"id": 178741512,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178741512?v=4",
"html_url": "https:\/\/github.com\/Cybervixy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cybervixy\/Vulnerability-Management",
"description": " NGINX Security Hardening & Vulnerability Remediation Analysis of critical CVEs (CVE-2021-23017, HTTP\/2 DoS flaws) in outdated NGINX versions, with actionable steps for mitigation: upgrades, HTTP\/2 hardening, and patch automation. Includes Nessus scan validation and proactive monitoring strategies.",
"fork": false,
"created_at": "2025-04-17T11:33:08Z",
"updated_at": "2025-04-17T11:36:54Z",
"pushed_at": "2025-04-17T11:36:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 978874642,
"name": "CVE-2021-23017",
"full_name": "moften\/CVE-2021-23017",
"owner": {
"login": "moften",
"id": 4262359,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4262359?v=4",
"html_url": "https:\/\/github.com\/moften",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/moften\/CVE-2021-23017",
"description": "NGINX DNS Overflow Vulnerability Check - CVE-2021-23017 PoC",
"fork": false,
"created_at": "2025-05-06T16:32:48Z",
"updated_at": "2025-05-06T16:36:45Z",
"pushed_at": "2025-05-06T16:36:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"dns",
"nginx"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 1050343736,
"name": "EVIL-CVE-2021-23017-Update-2025",
"full_name": "6lj\/EVIL-CVE-2021-23017-Update-2025",
"owner": {
"login": "6lj",
"id": 186985676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186985676?v=4",
"html_url": "https:\/\/github.com\/6lj",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/6lj\/EVIL-CVE-2021-23017-Update-2025",
"description": "vulnerability in NGINX servers (versions 0.6.181.20.0). The scripts aim to cause a Denial of Service (DoS) by sending malicious DNS responses, with enhancements to bypass firewalls.",
"fork": false,
"created_at": "2025-09-04T09:49:22Z",
"updated_at": "2025-09-13T06:09:07Z",
"pushed_at": "2025-09-05T22:21:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-23017",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]