Auto Update 2022/03/06 06:14:14

This commit is contained in:
motikan2010-bot 2022-03-06 15:14:14 +09:00
parent 641c734a0e
commit 75fe78c2ef
31 changed files with 124 additions and 261 deletions

View file

@ -13,17 +13,17 @@
"description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.",
"fork": false,
"created_at": "2014-06-12T04:44:13Z",
"updated_at": "2021-07-19T01:55:06Z",
"updated_at": "2022-03-06T03:23:13Z",
"pushed_at": "2014-07-24T20:47:27Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 36,
"watchers": 37,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-02-17T21:04:44Z",
"updated_at": "2022-03-06T02:27:34Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 316,
"watchers_count": 316,
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 316,
"watchers": 317,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2022-02-17T21:04:44Z",
"updated_at": "2022-03-06T02:27:34Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 316,
"watchers_count": 316,
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 316,
"watchers": 317,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2022-03-05T06:44:23Z",
"updated_at": "2022-03-06T02:16:11Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 671,
"watchers_count": 671,
"stargazers_count": 672,
"watchers_count": 672,
"forks_count": 294,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 294,
"watchers": 671,
"watchers": 672,
"score": 0
},
{

View file

@ -429,17 +429,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-02-23T01:48:08Z",
"updated_at": "2022-03-06T03:18:30Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 317,
"watchers": 318,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2021-05-01T14:04:58Z",
"updated_at": "2021-05-04T04:23:05Z",
"pushed_at": "2021-05-04T04:23:04Z",
"updated_at": "2022-03-06T05:15:35Z",
"pushed_at": "2022-03-06T05:15:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -94,17 +94,17 @@
"description": "CVE-2017-5689 Proof-of-Concept exploit",
"fork": false,
"created_at": "2017-07-27T21:06:08Z",
"updated_at": "2022-03-04T20:59:30Z",
"updated_at": "2022-03-06T01:51:18Z",
"pushed_at": "2017-07-27T21:08:49Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 52,
"watchers": 53,
"score": 0
},
{

View file

@ -25,32 +25,5 @@
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 365731888,
"name": "CVE-2018-8060",
"full_name": "Crystalware\/CVE-2018-8060",
"owner": {
"login": "Crystalware",
"id": 49976592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
"html_url": "https:\/\/github.com\/Crystalware"
},
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2018-8060",
"description": "Proof of concept for the HWiNFO AMD64 Null Pointer Dereference vulnerability.",
"fork": false,
"created_at": "2021-05-09T11:04:59Z",
"updated_at": "2021-05-09T11:07:53Z",
"pushed_at": "2021-05-09T11:07:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,37 +0,0 @@
[
{
"id": 295028706,
"name": "CVE-2019-13600",
"full_name": "Crystalware\/CVE-2019-13600",
"owner": {
"login": "Crystalware",
"id": 49976592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
"html_url": "https:\/\/github.com\/Crystalware"
},
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2019-13600",
"description": "My first zero day.",
"fork": false,
"created_at": "2020-09-12T21:25:14Z",
"updated_at": "2021-09-05T04:14:43Z",
"pushed_at": "2021-07-10T22:54:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"binary",
"c",
"cve-2019-13600",
"exploit",
"poc",
"proof-of-concept",
"windows"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -44,7 +44,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3195,
"watchers_count": 3195,
"forks_count": 948,
"forks_count": 947,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,7 +69,7 @@
"webshell"
],
"visibility": "public",
"forks": 948,
"forks": 947,
"watchers": 3195,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-02-23T01:48:08Z",
"updated_at": "2022-03-06T03:18:30Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 317,
"watchers": 318,
"score": 0
},
{

View file

@ -222,17 +222,17 @@
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2022-01-24T21:03:40Z",
"updated_at": "2022-03-06T03:42:04Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 233,
"watchers": 232,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3195,
"watchers_count": 3195,
"forks_count": 948,
"forks_count": 947,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,7 +42,7 @@
"webshell"
],
"visibility": "public",
"forks": 948,
"forks": 947,
"watchers": 3195,
"score": 0
},

View file

@ -1,29 +0,0 @@
[
{
"id": 365756839,
"name": "CVE-2020-14979",
"full_name": "Crystalware\/CVE-2020-14979",
"owner": {
"login": "Crystalware",
"id": 49976592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
"html_url": "https:\/\/github.com\/Crystalware"
},
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2020-14979",
"description": "Exploit proof of concept for EVGA's WinRing0 device driver.",
"fork": false,
"created_at": "2021-05-09T13:16:03Z",
"updated_at": "2021-09-08T14:02:47Z",
"pushed_at": "2021-06-21T01:53:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 390601262,
"name": "CVE-2020-9014",
"full_name": "Crystalware\/CVE-2020-9014",
"owner": {
"login": "Crystalware",
"id": 49976592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
"html_url": "https:\/\/github.com\/Crystalware"
},
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2020-9014",
"description": "Proof of concept code for CVE-2020-9014",
"fork": false,
"created_at": "2021-07-29T04:37:09Z",
"updated_at": "2021-07-29T04:51:30Z",
"pushed_at": "2021-07-29T04:51:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2022-01-16T04:17:08Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 46,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"forks": 47,
"watchers": 191,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2022-02-07T12:09:15Z",
"updated_at": "2022-03-06T04:57:33Z",
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 177,
"watchers_count": 177,
"forks_count": 44,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 177,
"forks": 45,
"watchers": 178,
"score": 0
},
{

View file

@ -42,29 +42,29 @@
"score": 0
},
{
"id": 390672212,
"id": 423304617,
"name": "CVE-2021-27965",
"full_name": "Crystalware\/CVE-2021-27965",
"full_name": "Jeromeyoung\/CVE-2021-27965",
"owner": {
"login": "Crystalware",
"id": 49976592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49976592?v=4",
"html_url": "https:\/\/github.com\/Crystalware"
"login": "Jeromeyoung",
"id": 39945364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4",
"html_url": "https:\/\/github.com\/Jeromeyoung"
},
"html_url": "https:\/\/github.com\/Crystalware\/CVE-2021-27965",
"html_url": "https:\/\/github.com\/Jeromeyoung\/CVE-2021-27965",
"description": "Proof of concept for CVE-2021-27965 (Stack-based Buffer Overflow)",
"fork": false,
"created_at": "2021-07-29T09:32:56Z",
"updated_at": "2021-10-31T02:39:44Z",
"created_at": "2021-11-01T01:41:37Z",
"updated_at": "2021-11-01T01:41:37Z",
"pushed_at": "2021-10-31T02:39:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 0,
"score": 0
}

View file

@ -52,12 +52,12 @@
"pushed_at": "2021-06-02T14:54:14Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 10,
"score": 0
},

View file

@ -94,17 +94,17 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2022-03-05T22:36:34Z",
"updated_at": "2022-03-06T01:45:04Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 190,
"watchers": 192,
"score": 0
}
]

View file

@ -726,17 +726,17 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2022-03-05T03:59:08Z",
"updated_at": "2022-03-06T02:12:05Z",
"pushed_at": "2022-02-13T12:21:53Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 88,
"watchers": 89,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 44,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"forks": 45,
"watchers": 96,
"score": 0
},

View file

@ -106,17 +106,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-03-05T11:59:55Z",
"updated_at": "2022-03-06T01:02:09Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1378,
"watchers_count": 1378,
"stargazers_count": 1379,
"watchers_count": 1379,
"forks_count": 394,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 394,
"watchers": 1378,
"watchers": 1379,
"score": 0
},
{
@ -908,10 +908,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-03-05T18:37:28Z",
"updated_at": "2022-03-06T01:14:12Z",
"pushed_at": "2022-01-27T20:09:24Z",
"stargazers_count": 445,
"watchers_count": 445,
"stargazers_count": 447,
"watchers_count": 447,
"forks_count": 81,
"allow_forking": true,
"is_template": false,
@ -920,7 +920,7 @@
],
"visibility": "public",
"forks": 81,
"watchers": 445,
"watchers": 447,
"score": 0
},
{
@ -3154,7 +3154,7 @@
"fork": false,
"created_at": "2022-02-14T22:09:44Z",
"updated_at": "2022-03-02T19:20:59Z",
"pushed_at": "2022-03-04T20:45:04Z",
"pushed_at": "2022-03-06T05:46:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -354,17 +354,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-03-05T10:48:51Z",
"updated_at": "2022-03-06T05:54:27Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -1972,12 +1972,12 @@
"pushed_at": "2021-12-11T10:39:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 36,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 37,
"watchers": 3,
"score": 0
},
@ -3208,17 +3208,17 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
"updated_at": "2022-03-02T06:30:38Z",
"updated_at": "2022-03-06T03:42:40Z",
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 320,
"watchers_count": 320,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 321,
"watchers": 320,
"score": 0
},
{
@ -3552,12 +3552,12 @@
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2768,
"watchers_count": 2768,
"forks_count": 671,
"forks_count": 672,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 671,
"forks": 672,
"watchers": 2768,
"score": 0
},
@ -5422,10 +5422,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-03-02T03:30:20Z",
"updated_at": "2022-03-06T00:38:15Z",
"pushed_at": "2022-01-27T16:08:20Z",
"stargazers_count": 406,
"watchers_count": 406,
"stargazers_count": 407,
"watchers_count": 407,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
@ -5441,7 +5441,7 @@
],
"visibility": "public",
"forks": 89,
"watchers": 406,
"watchers": 407,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Test whether a container environment is vulnerable to container escapes via CVE-2022-0492",
"fork": false,
"created_at": "2022-02-28T01:25:26Z",
"updated_at": "2022-03-05T19:14:43Z",
"updated_at": "2022-03-06T06:01:46Z",
"pushed_at": "2022-02-28T01:25:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -10,17 +10,22 @@
"html_url": "https:\/\/github.com\/faisalfs10x"
},
"html_url": "https:\/\/github.com\/faisalfs10x\/Webmin-CVE-2022-0824-revshell",
"description": "Webmin CVE-2022-0824 Reverse Shell",
"description": "Webmin CVE-2022-0824 Post-Auth Reverse Shell",
"fork": false,
"created_at": "2022-03-06T00:03:31Z",
"updated_at": "2022-03-06T00:06:58Z",
"pushed_at": "2022-03-06T00:06:55Z",
"updated_at": "2022-03-06T06:15:29Z",
"pushed_at": "2022-03-06T00:36:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"cve",
"exploit",
"proof-of-concept",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-03-05T08:02:05Z",
"updated_at": "2022-03-06T05:58:52Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 195,
"watchers": 196,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-03-05T08:59:41Z",
"updated_at": "2022-03-06T01:03:22Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 474,
"watchers_count": 474,
"stargazers_count": 475,
"watchers_count": 475,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 90,
"watchers": 474,
"watchers": 475,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-22947",
"fork": false,
"created_at": "2022-03-02T11:58:55Z",
"updated_at": "2022-03-05T14:33:14Z",
"updated_at": "2022-03-06T05:21:32Z",
"pushed_at": "2022-03-03T14:03:30Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 140,
"watchers": 146,
"score": 0
},
{
@ -339,17 +339,17 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-03-05T10:48:51Z",
"updated_at": "2022-03-06T05:54:27Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -2169,7 +2169,7 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
</code>
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
- [Crystalware/CVE-2021-27965](https://github.com/Crystalware/CVE-2021-27965)
- [Jeromeyoung/CVE-2021-27965](https://github.com/Jeromeyoung/CVE-2021-27965)
### CVE-2021-28079 (2021-04-26)
@ -6337,14 +6337,6 @@ Stored Cross-site scripting (XSS) vulnerability in Blackboard Learn/PeopleTool v
- [kyletimmermans/blackboard-xss](https://github.com/kyletimmermans/blackboard-xss)
### CVE-2020-9014 (2021-02-05)
<code>
In Epson iProjection v2.30, the driver file (EMP_NSAU.sys) allows local users to cause a denial of service (BSOD) via crafted input to the virtual audio device driver with IOCTL 0x9C402402, 0x9C402406, or 0x9C40240A. \Device\EMPNSAUIO and \DosDevices\EMPNSAU are similarly affected.
</code>
- [Crystalware/CVE-2020-9014](https://github.com/Crystalware/CVE-2020-9014)
### CVE-2020-9038 (2020-02-17)
<code>
@ -7657,14 +7649,6 @@ On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to th
- [g-rubert/CVE-2020-14965](https://github.com/g-rubert/CVE-2020-14965)
### CVE-2020-14979 (2020-08-11)
<code>
The WinRing0.sys and WinRing0x64.sys drivers 1.2.0 in EVGA Precision X1 through 1.0.6 allow local users, including low integrity processes, to read and write to arbitrary memory locations. This allows any user to gain NT AUTHORITY\SYSTEM privileges by mapping \Device\PhysicalMemory into the calling process.
</code>
- [Crystalware/CVE-2020-14979](https://github.com/Crystalware/CVE-2020-14979)
### CVE-2020-15002 (2020-10-23)
<code>
@ -11893,9 +11877,6 @@ In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image f
- [masahiro331/CVE-2019-13574](https://github.com/masahiro331/CVE-2019-13574)
### CVE-2019-13600
- [Crystalware/CVE-2019-13600](https://github.com/Crystalware/CVE-2019-13600)
### CVE-2019-13633 (2020-10-19)
<code>
@ -14508,7 +14489,6 @@ HWiNFO AMD64 Kernel driver version 8.98 and lower allows an unprivileged user to
</code>
- [otavioarj/SIOCtl](https://github.com/otavioarj/SIOCtl)
- [Crystalware/CVE-2018-8060](https://github.com/Crystalware/CVE-2018-8060)
### CVE-2018-8065 (2018-03-12)