Auto Update 2020/03/02 00:08:02

This commit is contained in:
motikan2010-bot 2020-03-02 00:08:02 +09:00
parent 4f564223c3
commit 75f93bb4ad
25 changed files with 231 additions and 135 deletions

View file

@ -21,5 +21,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 185906522,
"name": "cve-2011-1473",
"full_name": "zjt674449039\/cve-2011-1473",
"owner": {
"login": "zjt674449039",
"id": 47102219,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/47102219?v=4",
"html_url": "https:\/\/github.com\/zjt674449039"
},
"html_url": "https:\/\/github.com\/zjt674449039\/cve-2011-1473",
"description": null,
"fork": false,
"created_at": "2019-05-10T02:42:13Z",
"updated_at": "2019-05-10T05:50:12Z",
"pushed_at": "2019-05-10T05:50:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 80754018,
"name": "GO-CVE-2011-4862",
"full_name": "hdbreaker\/GO-CVE-2011-4862",
"owner": {
"login": "hdbreaker",
"id": 5799585,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5799585?v=4",
"html_url": "https:\/\/github.com\/hdbreaker"
},
"html_url": "https:\/\/github.com\/hdbreaker\/GO-CVE-2011-4862",
"description": "Go Exploit for CVE-2011-4862",
"fork": false,
"created_at": "2017-02-02T18:12:56Z",
"updated_at": "2019-10-22T07:01:17Z",
"pushed_at": "2017-02-02T18:19:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 159565645,
"name": "cve-2011-4862",
@ -21,5 +44,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 238652146,
"name": "CVE-2011-4862",
"full_name": "kpawar2410\/CVE-2011-4862",
"owner": {
"login": "kpawar2410",
"id": 51210677,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/51210677?v=4",
"html_url": "https:\/\/github.com\/kpawar2410"
},
"html_url": "https:\/\/github.com\/kpawar2410\/CVE-2011-4862",
"description": "Final Project for Security and Privacy CS 600.443",
"fork": false,
"created_at": "2020-02-06T09:30:45Z",
"updated_at": "2020-02-12T04:52:15Z",
"pushed_at": "2020-02-12T04:52:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-29T15:19:36Z",
"updated_at": "2020-03-01T11:20:22Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 42,
"forks": 42,
"watchers": 239,
"watchers": 240,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-29T15:19:36Z",
"updated_at": "2020-03-01T11:20:22Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 42,
"forks": 42,
"watchers": 239,
"watchers": 240,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2017-03-15T20:25:40Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 27,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.",
"fork": false,
"created_at": "2018-02-03T20:47:08Z",
"updated_at": "2018-02-10T10:28:17Z",
"updated_at": "2020-03-01T09:54:21Z",
"pushed_at": "2018-02-10T02:17:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-11-02T03:11:27Z",
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 70,
"forks": 70,
"forks_count": 71,
"forks": 71,
"watchers": 147,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
"fork": false,
"created_at": "2018-02-22T05:31:13Z",
"updated_at": "2020-02-17T21:37:49Z",
"updated_at": "2020-03-01T13:10:08Z",
"pushed_at": "2018-02-25T08:49:07Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 34,
"forks": 34,
"watchers": 73,
"watchers": 74,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-29T15:19:36Z",
"updated_at": "2020-03-01T11:20:22Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 42,
"forks": 42,
"watchers": 239,
"watchers": 240,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2020-02-25T19:21:27Z",
"updated_at": "2020-03-01T13:26:36Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 653,
"watchers_count": 653,
"stargazers_count": 654,
"watchers_count": 654,
"forks_count": 172,
"forks": 172,
"watchers": 653,
"watchers": 654,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate",
"fork": false,
"created_at": "2018-11-13T13:40:10Z",
"updated_at": "2019-04-04T17:14:49Z",
"updated_at": "2020-03-01T10:00:36Z",
"pushed_at": "2018-11-14T02:40:24Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-29T15:19:36Z",
"updated_at": "2020-03-01T11:20:22Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 42,
"forks": 42,
"watchers": 239,
"watchers": 240,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2020-02-09T08:14:49Z",
"updated_at": "2020-03-01T09:47:41Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"forks_count": 96,
"forks": 96,
"watchers": 359,
"watchers": 360,
"score": 0
},
{

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 173,
"forks": 173,
"forks_count": 174,
"forks": 174,
"watchers": 287,
"score": 0
},
@ -1144,8 +1144,8 @@
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1084,
"watchers_count": 1084,
"forks_count": 362,
"forks": 362,
"forks_count": 363,
"forks": 363,
"watchers": 1084,
"score": 0
},

View file

@ -726,13 +726,13 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2020-02-19T15:07:14Z",
"updated_at": "2020-03-01T13:47:44Z",
"pushed_at": "2020-02-13T16:54:50Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 11,
"forks": 11,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-02-25T08:42:03Z",
"updated_at": "2020-03-01T11:20:34Z",
"pushed_at": "2019-06-24T06:06:48Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 492,
"watchers_count": 492,
"forks_count": 108,
"forks": 108,
"watchers": 493,
"watchers": 492,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-02-29T15:19:36Z",
"updated_at": "2020-03-01T11:20:22Z",
"pushed_at": "2020-02-15T14:24:04Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 42,
"forks": 42,
"watchers": 239,
"watchers": 240,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340",
"fork": false,
"created_at": "2019-05-27T19:06:14Z",
"updated_at": "2019-11-29T06:51:16Z",
"updated_at": "2020-03-01T14:38:32Z",
"pushed_at": "2019-05-28T02:55:03Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 16,
"forks": 16,
"watchers": 59,
"watchers": 60,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A small python script that checks for CVE-2019-8446",
"fork": false,
"created_at": "2020-02-29T04:29:02Z",
"updated_at": "2020-02-29T20:50:33Z",
"updated_at": "2020-03-01T13:37:35Z",
"pushed_at": "2020-02-29T20:50:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Demo Android application for CVE-2019-9465",
"fork": false,
"created_at": "2020-02-19T13:57:11Z",
"updated_at": "2020-03-01T08:07:32Z",
"updated_at": "2020-03-01T09:13:03Z",
"pushed_at": "2020-02-19T13:57:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2020-02-28T10:06:31Z",
"updated_at": "2020-03-01T09:27:09Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
"updated_at": "2020-03-01T07:01:58Z",
"updated_at": "2020-03-01T12:57:05Z",
"pushed_at": "2020-02-20T11:03:18Z",
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 24,
"forks": 24,
"watchers": 132,
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 25,
"forks": 25,
"watchers": 133,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-25T23:44:16Z",
"updated_at": "2020-02-29T16:33:52Z",
"updated_at": "2020-03-01T13:46:51Z",
"pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 128,
"watchers_count": 128,
"forks_count": 34,
"forks": 34,
"watchers": 128,
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 35,
"forks": 35,
"watchers": 129,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-03-01T07:46:56Z",
"updated_at": "2020-03-01T14:42:39Z",
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 37,
"forks": 37,
"watchers": 115,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 38,
"forks": 38,
"watchers": 118,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-03-01T02:29:31Z",
"updated_at": "2020-03-01T14:56:16Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 12,
"forks": 12,
"watchers": 39,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 14,
"forks": 14,
"watchers": 44,
"score": 0
},
{
@ -174,13 +174,36 @@
"description": "CVE-2020-0688",
"fork": false,
"created_at": "2020-02-28T17:03:53Z",
"updated_at": "2020-02-29T15:34:30Z",
"updated_at": "2020-03-01T12:06:45Z",
"pushed_at": "2020-02-28T17:07:15Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
"id": 244149446,
"name": "CVE-2020-0688",
"full_name": "zcgonvh\/CVE-2020-0688",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2020-0688",
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-03-01T14:57:50Z",
"pushed_at": "2020-03-01T12:58:01Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks": 5,
"watchers": 10,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 64,
"forks": 64,
"forks_count": 65,
"forks": 65,
"watchers": 116,
"score": 0
},
@ -82,13 +82,13 @@
"description": "CNVD-2020-10487\/CVE-2020-1938,批量扫描工具",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2020-03-01T04:06:22Z",
"updated_at": "2020-03-01T13:45:04Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 55,
"forks": 55,
"watchers": 135,
"stargazers_count": 136,
"watchers_count": 136,
"forks_count": 56,
"forks": 56,
"watchers": 136,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
"fork": false,
"created_at": "2020-02-21T07:48:50Z",
"updated_at": "2020-02-22T17:43:58Z",
"updated_at": "2020-03-01T11:45:22Z",
"pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "CNVD-2020-10487 OR CVE-2020-1938 批量验证脚本,批量验证,并自动截图,方便提交及复核",
"fork": false,
"created_at": "2020-02-22T13:25:57Z",
"updated_at": "2020-02-24T08:18:04Z",
"updated_at": "2020-03-01T09:55:08Z",
"pushed_at": "2020-02-24T08:18:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -381,13 +381,13 @@
"description": "CVE-2020-1938(GhostCat) clean and readable code version",
"fork": false,
"created_at": "2020-03-01T01:45:23Z",
"updated_at": "2020-03-01T02:43:05Z",
"updated_at": "2020-03-01T12:28:07Z",
"pushed_at": "2020-03-01T02:43:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-2551 poc exploit python Weblogic RCE with IIOP, power by 【劦久信安】 online check:",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-02-29T04:56:49Z",
"pushed_at": "2020-02-28T03:15:41Z",
"stargazers_count": 19,
"watchers_count": 19,
"updated_at": "2020-03-01T12:16:08Z",
"pushed_at": "2020-03-01T11:27:40Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 7,
"forks": 7,
"watchers": 19,
"watchers": 20,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-03-01T08:26:34Z",
"updated_at": "2020-03-01T15:07:42Z",
"pushed_at": "2020-02-28T09:34:19Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 12,
"forks": 12,
"watchers": 43,
"watchers": 51,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "django 漏洞CVE-2020-7471 Potential SQL injection via StringAgg(delimiter) 的漏洞环境和 POC",
"fork": false,
"created_at": "2020-02-11T13:57:14Z",
"updated_at": "2020-03-01T08:43:59Z",
"updated_at": "2020-03-01T14:38:48Z",
"pushed_at": "2020-02-13T12:56:31Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 13,
"forks": 13,
"watchers": 63,
"watchers": 65,
"score": 0
},
{

View file

@ -109,6 +109,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
- [truongtn/cve-2020-0688](https://github.com/truongtn/cve-2020-0688)
- [onSec-fr/CVE-2020-0688-Scanner](https://github.com/onSec-fr/CVE-2020-0688-Scanner)
- [youncyb/CVE-2020-0688](https://github.com/youncyb/CVE-2020-0688)
- [zcgonvh/CVE-2020-0688](https://github.com/zcgonvh/CVE-2020-0688)
### CVE-2020-0728
@ -11615,6 +11616,7 @@ Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microso
</code>
- [c826/bash-tls-reneg-attack](https://github.com/c826/bash-tls-reneg-attack)
- [zjt674449039/cve-2011-1473](https://github.com/zjt674449039/cve-2011-1473)
### CVE-2011-1475
@ -11746,7 +11748,9 @@ The simplexml_load_string function in the XML import plug-in (libraries/import/x
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
</code>
- [hdbreaker/GO-CVE-2011-4862](https://github.com/hdbreaker/GO-CVE-2011-4862)
- [lol-fi/cve-2011-4862](https://github.com/lol-fi/cve-2011-4862)
- [kpawar2410/CVE-2011-4862](https://github.com/kpawar2410/CVE-2011-4862)
### CVE-2011-4872