PoC-in-GitHub/2021/CVE-2021-36260.json
2025-12-10 15:44:23 +09:00

315 lines
No EOL
11 KiB
JSON

[
{
"id": 418375861,
"name": "CVE-2021-36260",
"full_name": "rabbitsafe\/CVE-2021-36260",
"owner": {
"login": "rabbitsafe",
"id": 33046073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
"html_url": "https:\/\/github.com\/rabbitsafe",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-36260",
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-10-18T06:40:48Z",
"updated_at": "2024-10-03T10:45:48Z",
"pushed_at": "2023-10-27T02:20:32Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},
{
"id": 421880973,
"name": "CVE-2021-36260",
"full_name": "Aiminsun\/CVE-2021-36260",
"owner": {
"login": "Aiminsun",
"id": 58260225,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4",
"html_url": "https:\/\/github.com\/Aiminsun",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260",
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2025-12-10T04:11:02Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 290,
"watchers_count": 290,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 290,
"score": 0,
"subscribers_count": 6
},
{
"id": 424140037,
"name": "CVE-2021-36260-metasploit",
"full_name": "TaroballzChen\/CVE-2021-36260-metasploit",
"owner": {
"login": "TaroballzChen",
"id": 27862593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
"html_url": "https:\/\/github.com\/TaroballzChen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-36260-metasploit",
"description": "the metasploit script(POC) about CVE-2021-36260 ",
"fork": false,
"created_at": "2021-11-03T08:11:49Z",
"updated_at": "2025-10-18T13:27:40Z",
"pushed_at": "2021-11-03T08:26:24Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 19,
"score": 0,
"subscribers_count": 2
},
{
"id": 437809411,
"name": "CheckHKRCE",
"full_name": "tuntin9x\/CheckHKRCE",
"owner": {
"login": "tuntin9x",
"id": 42837549,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42837549?v=4",
"html_url": "https:\/\/github.com\/tuntin9x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tuntin9x\/CheckHKRCE",
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-12-13T09:23:36Z",
"updated_at": "2025-01-24T16:08:23Z",
"pushed_at": "2022-10-27T01:14:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 520972929,
"name": "CVE-2021-36260",
"full_name": "Cuerz\/CVE-2021-36260",
"owner": {
"login": "Cuerz",
"id": 84277976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84277976?v=4",
"html_url": "https:\/\/github.com\/Cuerz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cuerz\/CVE-2021-36260",
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2025-11-11T18:02:48Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-36260",
"exploit"
],
"visibility": "public",
"forks": 23,
"watchers": 161,
"score": 0,
"subscribers_count": 2
},
{
"id": 530277219,
"name": "Simple-CVE-2021-36260",
"full_name": "TakenoSite\/Simple-CVE-2021-36260",
"owner": {
"login": "TakenoSite",
"id": 84880497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84880497?v=4",
"html_url": "https:\/\/github.com\/TakenoSite",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TakenoSite\/Simple-CVE-2021-36260",
"description": null,
"fork": false,
"created_at": "2022-08-29T15:21:11Z",
"updated_at": "2023-05-10T06:31:35Z",
"pushed_at": "2022-08-31T11:27:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 708419065,
"name": "HIK-CVE-2021-36260-Exploit",
"full_name": "haingn\/HIK-CVE-2021-36260-Exploit",
"owner": {
"login": "haingn",
"id": 52133074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52133074?v=4",
"html_url": "https:\/\/github.com\/haingn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/haingn\/HIK-CVE-2021-36260-Exploit",
"description": null,
"fork": false,
"created_at": "2023-10-22T14:09:18Z",
"updated_at": "2023-10-22T14:09:32Z",
"pushed_at": "2023-10-22T14:09:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 768617455,
"name": "hikvision_brute",
"full_name": "NanoTrash\/hikvision_brute",
"owner": {
"login": "NanoTrash",
"id": 135466894,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135466894?v=4",
"html_url": "https:\/\/github.com\/NanoTrash",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NanoTrash\/hikvision_brute",
"description": "Brute Hikvision CAMS with CVE-2021-36260 Exploit",
"fork": false,
"created_at": "2024-03-07T12:20:40Z",
"updated_at": "2025-08-14T03:30:48Z",
"pushed_at": "2023-07-29T17:41:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 824675966,
"name": "HikvisionExploiter",
"full_name": "tamim1089\/HikvisionExploiter",
"owner": {
"login": "tamim1089",
"id": 82332026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82332026?v=4",
"html_url": "https:\/\/github.com\/tamim1089",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tamim1089\/HikvisionExploiter",
"description": "HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324 + CVE-2021-36260 Detection",
"fork": false,
"created_at": "2024-07-05T16:58:14Z",
"updated_at": "2025-12-09T22:34:00Z",
"pushed_at": "2025-07-27T21:30:03Z",
"stargazers_count": 305,
"watchers_count": 305,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 305,
"score": 0,
"subscribers_count": 5
},
{
"id": 894493486,
"name": "hikvision_probe",
"full_name": "aengussong\/hikvision_probe",
"owner": {
"login": "aengussong",
"id": 26045876,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26045876?v=4",
"html_url": "https:\/\/github.com\/aengussong",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aengussong\/hikvision_probe",
"description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)",
"fork": false,
"created_at": "2024-11-26T13:02:18Z",
"updated_at": "2025-05-12T06:22:39Z",
"pushed_at": "2024-11-26T13:21:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]