Auto Update 2023/12/10 18:30:41

This commit is contained in:
motikan2010-bot 2023-12-11 03:30:41 +09:00
parent ac936d78cb
commit 5ee2a20815
43 changed files with 490 additions and 222 deletions

View file

@ -1,32 +0,0 @@
[
{
"id": 132968731,
"name": "CVE-2001-0680",
"full_name": "alt3kx\/CVE-2001-0680",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2001-0680",
"description": "Directory traversal vulnerability in ftpd in QPC QVT\/Net 4.0 and AVT\/Term 5.0",
"fork": false,
"created_at": "2018-05-11T00:29:56Z",
"updated_at": "2018-05-11T09:19:48Z",
"pushed_at": "2018-05-11T09:19:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2023-12-06T21:33:40Z",
"updated_at": "2023-12-10T16:28:14Z",
"pushed_at": "2023-09-12T16:52:26Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 7
}

View file

@ -1,4 +1,34 @@
[
{
"id": 7481496,
"name": "diaggetroot",
"full_name": "hiikezoe\/diaggetroot",
"owner": {
"login": "hiikezoe",
"id": 188175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188175?v=4",
"html_url": "https:\/\/github.com\/hiikezoe"
},
"html_url": "https:\/\/github.com\/hiikezoe\/diaggetroot",
"description": "Obtain root access through CVE-2012-4220",
"fork": false,
"created_at": "2013-01-07T11:45:35Z",
"updated_at": "2023-09-28T10:21:15Z",
"pushed_at": "2013-04-03T11:58:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 12,
"score": 0,
"subscribers_count": 4
},
{
"id": 11198771,
"name": "root-zte-open",

View file

@ -1,4 +1,34 @@
[
{
"id": 8106302,
"name": "MySQL-Fu.rb",
"full_name": "Hood3dRob1n\/MySQL-Fu.rb",
"owner": {
"login": "Hood3dRob1n",
"id": 1881344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1881344?v=4",
"html_url": "https:\/\/github.com\/Hood3dRob1n"
},
"html_url": "https:\/\/github.com\/Hood3dRob1n\/MySQL-Fu.rb",
"description": "MySQL-Fu is a Ruby based MySQL Client Script I wrote. It does most of the stuff a normal MySQL client might do: SQL Shell, Update\/Delete\/Drop Database\/Table, Add\/Delete Users, Dump Database(s)\/Table w\/ option for gzip...... Plus a few extra options to make life a little easier for pentests. Includes Several builtin PHP Command Shell options as well as Pentestmonkey's PHP Reverse Shell, in addition to multiple options for file writing and reading (all files read logged locally for offline analysis later), also includes Ruby port of Kingcope's CVE-2012-5613 Linux MySQL Privilege Escalation Exploit.",
"fork": false,
"created_at": "2013-02-09T04:59:43Z",
"updated_at": "2023-06-21T15:30:06Z",
"pushed_at": "2013-02-09T05:02:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 3
},
{
"id": 137385853,
"name": "UDFPwn-CVE-2012-5613",

32
2012/CVE-2012-5664.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 7420891,
"name": "rails-cve-2012-5664-test",
"full_name": "phusion\/rails-cve-2012-5664-test",
"owner": {
"login": "phusion",
"id": 830588,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/830588?v=4",
"html_url": "https:\/\/github.com\/phusion"
},
"html_url": "https:\/\/github.com\/phusion\/rails-cve-2012-5664-test",
"description": "Demo app showing how the Rails CVE-2013-5664 vulnerability works.",
"fork": false,
"created_at": "2013-01-03T10:07:27Z",
"updated_at": "2018-03-12T19:42:18Z",
"pushed_at": "2013-01-03T13:15:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 5
}
]

32
2012/CVE-2012-5958.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 9437130,
"name": "vulnupnp",
"full_name": "lochiiconnectivity\/vulnupnp",
"owner": {
"login": "lochiiconnectivity",
"id": 4155305,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4155305?v=4",
"html_url": "https:\/\/github.com\/lochiiconnectivity"
},
"html_url": "https:\/\/github.com\/lochiiconnectivity\/vulnupnp",
"description": "Discover uPNP devices vulnerable to CVE-2013-0229 \/ CVE-2013-0230 \/ CVE-2012-5958 \/ CVE-2012-5959",
"fork": false,
"created_at": "2013-04-14T23:34:56Z",
"updated_at": "2016-09-04T16:49:13Z",
"pushed_at": "2013-04-14T23:37:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 188897438,
"name": "CVE-2013-0156",
"full_name": "R3dKn33-zz\/CVE-2013-0156",
"owner": {
"login": "R3dKn33-zz",
"id": 31809058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31809058?v=4",
"html_url": "https:\/\/github.com\/R3dKn33-zz"
},
"html_url": "https:\/\/github.com\/R3dKn33-zz\/CVE-2013-0156",
"description": "Arbitrary deserialization that can be used to trigger SQL injection and even Code execution",
"fork": false,
"created_at": "2019-05-27T19:17:55Z",
"updated_at": "2019-05-27T19:25:01Z",
"pushed_at": "2019-05-27T19:24:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 672302842,
"name": "kuang_grade_mk11",

View file

@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 6
},
{
"id": 200347068,
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"owner": {
"login": "tachibana51",
"id": 29031994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4",
"html_url": "https:\/\/github.com\/tachibana51"
},
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
"description": "this is not stable",
"fork": false,
"created_at": "2019-08-03T07:38:18Z",
"updated_at": "2019-10-26T18:48:26Z",
"pushed_at": "2019-08-03T07:58:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 275396332,
"name": "CVE-2013-2028-Exploit",

View file

@ -148,5 +148,35 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 198426665,
"name": "CVE-2013-2094",
"full_name": "vnik5287\/CVE-2013-2094",
"owner": {
"login": "vnik5287",
"id": 9650718,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9650718?v=4",
"html_url": "https:\/\/github.com\/vnik5287"
},
"html_url": "https:\/\/github.com\/vnik5287\/CVE-2013-2094",
"description": "perf_swevent_init",
"fork": false,
"created_at": "2019-07-23T12:31:55Z",
"updated_at": "2019-07-23T12:33:10Z",
"pushed_at": "2019-07-23T12:33:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2016/CVE-2016-2118.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 56461631,
"name": "cfengine-CVE-2016-2118",
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
"description": "An example detection and remediation policy.",
"fork": false,
"created_at": "2016-04-17T22:22:04Z",
"updated_at": "2016-04-18T02:57:44Z",
"pushed_at": "2016-04-19T14:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2016/CVE-2016-3141.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 56758577,
"name": "CVE-2016-3141",
"full_name": "peternguyen93\/CVE-2016-3141",
"owner": {
"login": "peternguyen93",
"id": 1802870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
"html_url": "https:\/\/github.com\/peternguyen93"
},
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
"description": "CVE-2016-3141",
"fork": false,
"created_at": "2016-04-21T08:59:05Z",
"updated_at": "2023-03-11T18:41:15Z",
"pushed_at": "2016-04-23T15:55:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -29,36 +29,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 95974378,
"name": "CVE-2017-0213",
"full_name": "zcgonvh\/CVE-2017-0213",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2017-0213",
"description": "CVE-2017-0213 for command line",
"fork": false,
"created_at": "2017-07-01T16:07:04Z",
"updated_at": "2023-10-05T08:56:22Z",
"pushed_at": "2017-07-01T16:19:12Z",
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},
{
"id": 105444160,
"name": "CVE-2017-0213",

View file

@ -13,10 +13,10 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2023-11-29T09:10:14Z",
"updated_at": "2023-12-10T12:31:29Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 558,
"watchers_count": 558,
"stargazers_count": 559,
"watchers_count": 559,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 92,
"watchers": 558,
"watchers": 559,
"score": 0,
"subscribers_count": 53
},

View file

@ -13,10 +13,10 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2023-11-29T09:10:14Z",
"updated_at": "2023-12-10T12:31:29Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 558,
"watchers_count": 558,
"stargazers_count": 559,
"watchers_count": 559,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 92,
"watchers": 558,
"watchers": 559,
"score": 0,
"subscribers_count": 53
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-09T22:25:02Z",
"updated_at": "2023-12-10T11:10:13Z",
"updated_at": "2023-12-10T16:51:42Z",
"pushed_at": "2023-12-09T22:25:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-12-02T20:43:48Z",
"updated_at": "2023-12-10T16:19:31Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1155,
"watchers_count": 1155,
"stargazers_count": 1156,
"watchers_count": 1156,
"has_discussions": false,
"forks_count": 355,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1155,
"watchers": 1156,
"score": 0,
"subscribers_count": 69
},

View file

@ -134,7 +134,7 @@
"fork": false,
"created_at": "2023-12-10T11:52:48Z",
"updated_at": "2023-12-10T12:11:32Z",
"pushed_at": "2023-12-10T12:11:29Z",
"pushed_at": "2023-12-10T16:31:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -103,10 +103,10 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2023-11-24T20:22:52Z",
"updated_at": "2023-12-10T18:13:17Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 251,
"watchers_count": 251,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 250,
"watchers": 251,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-10-27T17:13:55Z",
"updated_at": "2023-12-09T10:39:00Z",
"pushed_at": "2023-12-09T10:36:50Z",
"pushed_at": "2023-12-10T15:44:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -420,10 +420,10 @@
"description": "A Golang implementation of clubby789's implementation of CVE-2021-4034",
"fork": false,
"created_at": "2022-01-26T04:58:16Z",
"updated_at": "2023-08-09T21:34:27Z",
"updated_at": "2023-12-10T18:14:05Z",
"pushed_at": "2022-01-27T16:12:20Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -435,7 +435,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},
@ -1305,10 +1305,10 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2023-12-05T12:38:22Z",
"updated_at": "2023-12-10T18:14:03Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -1317,7 +1317,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,12 +13,12 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2023-12-09T15:40:46Z",
"updated_at": "2023-12-10T18:15:31Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 938,
"watchers_count": 938,
"stargazers_count": 939,
"watchers_count": 939,
"has_discussions": false,
"forks_count": 188,
"forks_count": 189,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 188,
"watchers": 938,
"forks": 189,
"watchers": 939,
"score": 0,
"subscribers_count": 25
},

View file

@ -13,19 +13,19 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-12-09T19:27:06Z",
"updated_at": "2023-12-10T18:15:28Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1266,
"watchers_count": 1266,
"stargazers_count": 1267,
"watchers_count": 1267,
"has_discussions": false,
"forks_count": 315,
"forks_count": 316,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 315,
"watchers": 1266,
"forks": 316,
"watchers": 1267,
"score": 0,
"subscribers_count": 27
},

View file

@ -603,10 +603,10 @@
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
"updated_at": "2023-11-03T08:19:10Z",
"updated_at": "2023-12-10T13:23:50Z",
"pushed_at": "2021-12-17T17:02:24Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -615,7 +615,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 154,
"watchers": 153,
"score": 0,
"subscribers_count": 14
},
@ -760,10 +760,10 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
"updated_at": "2023-11-24T20:20:51Z",
"updated_at": "2023-12-10T18:14:43Z",
"pushed_at": "2021-12-13T22:27:25Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -772,7 +772,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 191,
"watchers": 192,
"score": 0,
"subscribers_count": 6
},
@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2023-05-28T11:06:10Z",
"pushed_at": "2023-12-01T17:33:48Z",
"pushed_at": "2023-12-10T15:54:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -1837,10 +1837,10 @@
"description": "Detections for CVE-2021-44228 inside of nested binaries",
"fork": false,
"created_at": "2021-12-11T16:08:47Z",
"updated_at": "2023-09-28T11:33:59Z",
"updated_at": "2023-12-10T13:23:50Z",
"pushed_at": "2021-12-18T22:20:25Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -1858,7 +1858,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 34,
"watchers": 33,
"score": 0,
"subscribers_count": 3
},
@ -3063,10 +3063,10 @@
"description": "An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-12T16:49:45Z",
"updated_at": "2023-09-28T11:34:02Z",
"updated_at": "2023-12-10T18:14:49Z",
"pushed_at": "2021-12-12T21:48:06Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -3075,7 +3075,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
@ -3703,10 +3703,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-12-08T12:40:36Z",
"updated_at": "2023-12-10T16:35:42Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3317,
"watchers_count": 3317,
"stargazers_count": 3318,
"watchers_count": 3318,
"has_discussions": true,
"forks_count": 750,
"allow_forking": true,
@ -3715,7 +3715,7 @@
"topics": [],
"visibility": "public",
"forks": 750,
"watchers": 3317,
"watchers": 3318,
"score": 0,
"subscribers_count": 58
},
@ -6097,10 +6097,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-14T21:32:42Z",
"updated_at": "2023-10-08T19:09:47Z",
"updated_at": "2023-12-10T18:15:18Z",
"pushed_at": "2021-12-15T11:23:38Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -6109,7 +6109,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
"fork": false,
"created_at": "2023-03-15T14:23:41Z",
"updated_at": "2023-08-07T14:13:44Z",
"updated_at": "2023-12-10T14:44:59Z",
"pushed_at": "2023-03-15T14:33:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-21392: Local Privilege Escalation via NMR SUID in Oracle Enterprise Manager ",
"fork": false,
"created_at": "2023-12-08T20:13:23Z",
"updated_at": "2023-12-08T20:39:44Z",
"updated_at": "2023-12-10T18:13:59Z",
"pushed_at": "2023-12-08T20:27:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2023-12-08T12:43:47Z",
"updated_at": "2023-12-10T18:13:43Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 455,
"watchers_count": 455,
"stargazers_count": 456,
"watchers_count": 456,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 141,
"watchers": 455,
"watchers": 456,
"score": 0,
"subscribers_count": 14
},

View file

@ -505,11 +505,11 @@
"html_url": "https:\/\/github.com\/kamal-marouane"
},
"html_url": "https:\/\/github.com\/kamal-marouane\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution or System Crashing Vulnerability.",
"description": "Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash.",
"fork": false,
"created_at": "2023-12-09T22:26:49Z",
"updated_at": "2023-12-10T04:41:18Z",
"pushed_at": "2023-12-10T05:30:41Z",
"updated_at": "2023-12-10T15:48:49Z",
"pushed_at": "2023-12-10T17:52:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "spring-cloud \/ spring-cloud-function,spring.cloud.function.routing-expression,RCE,0day,0-day,POC,EXP,CVE-2022-22963",
"fork": false,
"created_at": "2022-03-26T01:40:04Z",
"updated_at": "2023-12-07T09:47:53Z",
"updated_at": "2023-12-10T18:11:07Z",
"pushed_at": "2023-03-05T12:41:19Z",
"stargazers_count": 354,
"watchers_count": 354,
"stargazers_count": 355,
"watchers_count": 355,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 86,
"watchers": 354,
"watchers": 355,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2023-12-08T12:43:52Z",
"updated_at": "2023-12-10T18:11:27Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 447,
"watchers_count": 447,
"stargazers_count": 448,
"watchers_count": 448,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 447,
"watchers": 448,
"score": 0,
"subscribers_count": 20
}

View file

@ -13,10 +13,10 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2023-12-09T19:23:45Z",
"updated_at": "2023-12-10T18:10:33Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 693,
"watchers_count": 693,
"stargazers_count": 694,
"watchers_count": 694,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 111,
"watchers": 693,
"watchers": 694,
"score": 0,
"subscribers_count": 26
},

View file

@ -515,10 +515,10 @@
"description": "Mass Exploit for CVE 2022-29464 on Carbon",
"fork": false,
"created_at": "2022-06-22T20:58:33Z",
"updated_at": "2023-10-13T03:02:50Z",
"updated_at": "2023-12-10T13:56:28Z",
"pushed_at": "2022-06-22T23:54:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -538,7 +538,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -67,33 +67,33 @@
"subscribers_count": 2
},
{
"id": 568677659,
"name": "cve-2022-41352-zimbra-rce",
"full_name": "aryrz\/cve-2022-41352-zimbra-rce",
"id": 651133271,
"name": "cve-2022-41352-zimbra-rce-1",
"full_name": "lolminerxmrig\/cve-2022-41352-zimbra-rce-1",
"owner": {
"login": "aryrz",
"id": 87161647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87161647?v=4",
"html_url": "https:\/\/github.com\/aryrz"
"login": "lolminerxmrig",
"id": 108659226,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108659226?v=4",
"html_url": "https:\/\/github.com\/lolminerxmrig"
},
"html_url": "https:\/\/github.com\/aryrz\/cve-2022-41352-zimbra-rce",
"html_url": "https:\/\/github.com\/lolminerxmrig\/cve-2022-41352-zimbra-rce-1",
"description": null,
"fork": false,
"created_at": "2022-11-21T07:10:12Z",
"updated_at": "2022-11-22T08:49:55Z",
"created_at": "2023-06-08T15:08:23Z",
"updated_at": "2023-12-10T16:15:47Z",
"pushed_at": "2022-11-21T07:10:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC Exploit for VM2 Sandbox Escape Vulnerability",
"fork": false,
"created_at": "2023-12-10T08:32:26Z",
"updated_at": "2023-12-10T11:21:39Z",
"updated_at": "2023-12-10T15:15:25Z",
"pushed_at": "2023-12-10T11:23:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-12-08T12:44:21Z",
"updated_at": "2023-12-10T13:23:50Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 592,
"watchers_count": 592,
"stargazers_count": 591,
"watchers_count": 591,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 51,
"watchers": 592,
"watchers": 591,
"score": 0,
"subscribers_count": 10
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-12-09T04:35:12Z",
"updated_at": "2023-12-10T16:04:01Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 707,
"watchers_count": 707,
"stargazers_count": 708,
"watchers_count": 708,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 129,
"watchers": 707,
"watchers": 708,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-12-10T09:24:13Z",
"updated_at": "2023-12-10T15:55:12Z",
"pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 194,
"watchers_count": 194,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 195,
"watchers": 194,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2023-12-02T12:13:51Z",
"updated_at": "2023-12-10T13:23:19Z",
"pushed_at": "2023-10-05T23:33:49Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 259,
"watchers_count": 259,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 258,
"watchers": 259,
"score": 0,
"subscribers_count": 13
},

View file

@ -362,5 +362,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 729907332,
"name": "Looney-Tunables",
"full_name": "snurkeburk\/Looney-Tunables",
"owner": {
"login": "snurkeburk",
"id": 70603096,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70603096?v=4",
"html_url": "https:\/\/github.com\/snurkeburk"
},
"html_url": "https:\/\/github.com\/snurkeburk\/Looney-Tunables",
"description": "PoC of CVE-2023-4911",
"fork": false,
"created_at": "2023-12-10T18:05:27Z",
"updated_at": "2023-12-10T18:14:12Z",
"pushed_at": "2023-12-10T18:12:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -150,7 +150,7 @@
"fork": false,
"created_at": "2023-10-26T09:32:48Z",
"updated_at": "2023-10-26T09:41:40Z",
"pushed_at": "2023-10-26T09:39:46Z",
"pushed_at": "2023-12-10T16:57:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-49964: FreeMarker Server-Side Template Injection in Alfresco",
"fork": false,
"created_at": "2023-12-08T20:47:52Z",
"updated_at": "2023-12-09T10:20:17Z",
"updated_at": "2023-12-10T18:13:57Z",
"pushed_at": "2023-12-09T10:54:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.",
"fork": false,
"created_at": "2023-10-06T05:46:16Z",
"updated_at": "2023-12-04T01:13:06Z",
"updated_at": "2023-12-10T13:15:23Z",
"pushed_at": "2023-10-11T04:30:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -827,6 +827,7 @@
- [KernelKrise/CVE-2023-4911](https://github.com/KernelKrise/CVE-2023-4911)
- [Diego-AltF4/CVE-2023-4911](https://github.com/Diego-AltF4/CVE-2023-4911)
- [teraGL/looneyCVE](https://github.com/teraGL/looneyCVE)
- [snurkeburk/Looney-Tunables](https://github.com/snurkeburk/Looney-Tunables)
### CVE-2023-4966 (2023-10-10)
@ -7210,7 +7211,7 @@
### CVE-2022-22817 (2022-01-07)
<code>PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used,
<code>PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
</code>
- [JawadPy/CVE-2022-22817-Exploit](https://github.com/JawadPy/CVE-2022-22817-Exploit)
@ -10921,7 +10922,7 @@
- [segfault-it/cve-2022-41352](https://github.com/segfault-it/cve-2022-41352)
- [Cr4ckC4t/cve-2022-41352-zimbra-rce](https://github.com/Cr4ckC4t/cve-2022-41352-zimbra-rce)
- [aryrz/cve-2022-41352-zimbra-rce](https://github.com/aryrz/cve-2022-41352-zimbra-rce)
- [lolminerxmrig/cve-2022-41352-zimbra-rce-1](https://github.com/lolminerxmrig/cve-2022-41352-zimbra-rce-1)
### CVE-2022-41358 (2022-10-19)
@ -30986,7 +30987,6 @@
</code>
- [shaheemirza/CVE-2017-0213-](https://github.com/shaheemirza/CVE-2017-0213-)
- [zcgonvh/CVE-2017-0213](https://github.com/zcgonvh/CVE-2017-0213)
- [billa3283/CVE-2017-0213](https://github.com/billa3283/CVE-2017-0213)
- [likescam/CVE-2017-0213](https://github.com/likescam/CVE-2017-0213)
- [jbooz1/CVE-2017-0213](https://github.com/jbooz1/CVE-2017-0213)
@ -33484,6 +33484,13 @@
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
### CVE-2016-2118 (2016-04-12)
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka &quot;BADLOCK.&quot;
</code>
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
### CVE-2016-2173 (2017-04-21)
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
@ -33605,6 +33612,13 @@
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
### CVE-2016-3141 (2016-03-31)
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
</code>
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
### CVE-2016-3238 (2016-07-12)
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka &quot;Windows Print Spooler Remote Code Execution Vulnerability.&quot;
@ -36131,6 +36145,7 @@
- [heroku/heroku-CVE-2013-0156](https://github.com/heroku/heroku-CVE-2013-0156)
- [josal/crack-0.1.8-fixed](https://github.com/josal/crack-0.1.8-fixed)
- [bsodmike/rails-exploit-cve-2013-0156](https://github.com/bsodmike/rails-exploit-cve-2013-0156)
- [R3dKn33-zz/CVE-2013-0156](https://github.com/R3dKn33-zz/CVE-2013-0156)
- [Jjdt12/kuang_grade_mk11](https://github.com/Jjdt12/kuang_grade_mk11)
### CVE-2013-0212 (2013-02-24)
@ -36241,6 +36256,7 @@
- [danghvu/nginx-1.4.0](https://github.com/danghvu/nginx-1.4.0)
- [kitctf/nginxpwn](https://github.com/kitctf/nginxpwn)
- [tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC](https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC)
- [m4drat/CVE-2013-2028-Exploit](https://github.com/m4drat/CVE-2013-2028-Exploit)
- [mambroziak/docker-cve-2013-2028](https://github.com/mambroziak/docker-cve-2013-2028)
- [jptr218/nginxhack](https://github.com/jptr218/nginxhack)
@ -36263,6 +36279,7 @@
- [Pashkela/CVE-2013-2094](https://github.com/Pashkela/CVE-2013-2094)
- [tarunyadav/fix-cve-2013-2094](https://github.com/tarunyadav/fix-cve-2013-2094)
- [timhsutw/cve-2013-2094](https://github.com/timhsutw/cve-2013-2094)
- [vnik5287/CVE-2013-2094](https://github.com/vnik5287/CVE-2013-2094)
### CVE-2013-2165 (2013-07-22)
@ -36721,6 +36738,7 @@
<code>diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
</code>
- [hiikezoe/diaggetroot](https://github.com/hiikezoe/diaggetroot)
- [poliva/root-zte-open](https://github.com/poliva/root-zte-open)
### CVE-2012-4431 (2012-12-19)
@ -36787,8 +36805,19 @@
<code>** DISPUTED ** MySQL 5.5.19 and possibly other versions, and MariaDB 5.5.28a and possibly other versions, when configured to assign the FILE privilege to users who should not have administrative privileges, allows remote authenticated users to gain privileges by leveraging the FILE privilege to create files as the MySQL administrator. NOTE: the vendor disputes this issue, stating that this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. NOTE: it could be argued that this should not be included in CVE because it is a configuration issue.
</code>
- [Hood3dRob1n/MySQL-Fu.rb](https://github.com/Hood3dRob1n/MySQL-Fu.rb)
- [w4fz5uck5/UDFPwn-CVE-2012-5613](https://github.com/w4fz5uck5/UDFPwn-CVE-2012-5613)
### CVE-2012-5664
- [phusion/rails-cve-2012-5664-test](https://github.com/phusion/rails-cve-2012-5664-test)
### CVE-2012-5958 (2013-01-31)
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
</code>
- [lochiiconnectivity/vulnupnp](https://github.com/lochiiconnectivity/vulnupnp)
### CVE-2012-5960 (2013-01-31)
<code>Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.
@ -37948,13 +37977,6 @@
- [gilberto47831/Network-Filesystem-Forensics](https://github.com/gilberto47831/Network-Filesystem-Forensics)
### CVE-2001-0680 (2002-03-09)
<code>Directory traversal vulnerability in ftpd in QPC QVT/Net 4.0 and AVT/Term 5.0 allows a remote attacker to traverse directories on the web server via a &quot;dot dot&quot; attack in a LIST (ls) command.
</code>
- [alt3kx/CVE-2001-0680](https://github.com/alt3kx/CVE-2001-0680)
### CVE-2001-0758 (2001-10-12)
<code>Directory traversal vulnerability in Shambala 4.5 allows remote attackers to escape the FTP root directory via &quot;CWD ...&quot; command.