mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-27 14:45:33 +01:00
292 lines
No EOL
10 KiB
JSON
292 lines
No EOL
10 KiB
JSON
[
|
||
{
|
||
"id": 439285309,
|
||
"name": "nginx-patch",
|
||
"full_name": "niandy\/nginx-patch",
|
||
"owner": {
|
||
"login": "niandy",
|
||
"id": 8412769,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8412769?v=4",
|
||
"html_url": "https:\/\/github.com\/niandy",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/niandy\/nginx-patch",
|
||
"description": "nginx 1.15.10 patch against cve-2021-23017 (ingress version)",
|
||
"fork": false,
|
||
"created_at": "2021-12-17T09:53:39Z",
|
||
"updated_at": "2021-12-22T08:15:05Z",
|
||
"pushed_at": "2021-12-17T11:53:50Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 508934873,
|
||
"name": "CVE-2021-23017-PoC",
|
||
"full_name": "M507\/CVE-2021-23017-PoC",
|
||
"owner": {
|
||
"login": "M507",
|
||
"id": 38591075,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38591075?v=4",
|
||
"html_url": "https:\/\/github.com\/M507",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/M507\/CVE-2021-23017-PoC",
|
||
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
|
||
"fork": false,
|
||
"created_at": "2022-06-30T04:39:58Z",
|
||
"updated_at": "2025-11-20T22:51:49Z",
|
||
"pushed_at": "2023-11-12T16:29:03Z",
|
||
"stargazers_count": 124,
|
||
"watchers_count": 124,
|
||
"has_discussions": false,
|
||
"forks_count": 25,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-23017",
|
||
"poc"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 25,
|
||
"watchers": 124,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 668565009,
|
||
"name": "CVE-2021-23017-PoC",
|
||
"full_name": "lakshit1212\/CVE-2021-23017-PoC",
|
||
"owner": {
|
||
"login": "lakshit1212",
|
||
"id": 140044978,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140044978?v=4",
|
||
"html_url": "https:\/\/github.com\/lakshit1212",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lakshit1212\/CVE-2021-23017-PoC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-07-20T05:39:01Z",
|
||
"updated_at": "2023-08-22T23:46:40Z",
|
||
"pushed_at": "2023-07-20T05:43:03Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 707950575,
|
||
"name": "CVE-2021-23017",
|
||
"full_name": "ShivamDey\/CVE-2021-23017",
|
||
"owner": {
|
||
"login": "ShivamDey",
|
||
"id": 87941867,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87941867?v=4",
|
||
"html_url": "https:\/\/github.com\/ShivamDey",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ShivamDey\/CVE-2021-23017",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-10-21T04:24:02Z",
|
||
"updated_at": "2023-10-21T04:25:17Z",
|
||
"pushed_at": "2023-10-21T04:25:14Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 900254066,
|
||
"name": "CVE-2021-23017-POC",
|
||
"full_name": "z3usx01\/CVE-2021-23017-POC",
|
||
"owner": {
|
||
"login": "z3usx01",
|
||
"id": 112891506,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112891506?v=4",
|
||
"html_url": "https:\/\/github.com\/z3usx01",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/z3usx01\/CVE-2021-23017-POC",
|
||
"description": "The issue only affects nginx if the \"resolver\" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to forge UDP packets from the DNS server.",
|
||
"fork": false,
|
||
"created_at": "2024-12-08T09:47:52Z",
|
||
"updated_at": "2025-01-04T18:06:33Z",
|
||
"pushed_at": "2024-12-08T09:52:23Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 924624980,
|
||
"name": "-home-lukewago-Downloads-CVE-2021-23017-Nginx-1.14",
|
||
"full_name": "lukwagoasuman\/-home-lukewago-Downloads-CVE-2021-23017-Nginx-1.14",
|
||
"owner": {
|
||
"login": "lukwagoasuman",
|
||
"id": 22435191,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22435191?v=4",
|
||
"html_url": "https:\/\/github.com\/lukwagoasuman",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lukwagoasuman\/-home-lukewago-Downloads-CVE-2021-23017-Nginx-1.14",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-01-30T11:05:40Z",
|
||
"updated_at": "2025-01-30T11:06:30Z",
|
||
"pushed_at": "2025-01-30T11:06:26Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 968024590,
|
||
"name": "Vulnerability-Management",
|
||
"full_name": "Cybervixy\/Vulnerability-Management",
|
||
"owner": {
|
||
"login": "Cybervixy",
|
||
"id": 178741512,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178741512?v=4",
|
||
"html_url": "https:\/\/github.com\/Cybervixy",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cybervixy\/Vulnerability-Management",
|
||
"description": " NGINX Security Hardening & Vulnerability Remediation Analysis of critical CVEs (CVE-2021-23017, HTTP\/2 DoS flaws) in outdated NGINX versions, with actionable steps for mitigation: upgrades, HTTP\/2 hardening, and patch automation. Includes Nessus scan validation and proactive monitoring strategies.",
|
||
"fork": false,
|
||
"created_at": "2025-04-17T11:33:08Z",
|
||
"updated_at": "2025-04-17T11:36:54Z",
|
||
"pushed_at": "2025-04-17T11:36:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 978874642,
|
||
"name": "CVE-2021-23017",
|
||
"full_name": "moften\/CVE-2021-23017",
|
||
"owner": {
|
||
"login": "moften",
|
||
"id": 4262359,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4262359?v=4",
|
||
"html_url": "https:\/\/github.com\/moften",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/moften\/CVE-2021-23017",
|
||
"description": "NGINX DNS Overflow Vulnerability Check - CVE-2021-23017 PoC",
|
||
"fork": false,
|
||
"created_at": "2025-05-06T16:32:48Z",
|
||
"updated_at": "2025-05-06T16:36:45Z",
|
||
"pushed_at": "2025-05-06T16:36:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"dns",
|
||
"nginx"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 1050343736,
|
||
"name": "EVIL-CVE-2021-23017-Update-2025",
|
||
"full_name": "6lj\/EVIL-CVE-2021-23017-Update-2025",
|
||
"owner": {
|
||
"login": "6lj",
|
||
"id": 186985676,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186985676?v=4",
|
||
"html_url": "https:\/\/github.com\/6lj",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/6lj\/EVIL-CVE-2021-23017-Update-2025",
|
||
"description": "vulnerability in NGINX servers (versions 0.6.18–1.20.0). The scripts aim to cause a Denial of Service (DoS) by sending malicious DNS responses, with enhancements to bypass firewalls.",
|
||
"fork": false,
|
||
"created_at": "2025-09-04T09:49:22Z",
|
||
"updated_at": "2025-09-13T06:09:07Z",
|
||
"pushed_at": "2025-09-05T22:21:30Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve",
|
||
"cve-2021-23017",
|
||
"poc"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |