mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/12/21 06:10:19
This commit is contained in:
parent
92a3e80499
commit
98a51b2947
18 changed files with 363 additions and 48 deletions
25
2007/CVE-2007-0038.json
Normal file
25
2007/CVE-2007-0038.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 224839310,
|
||||
"name": "CVE-2007-0038",
|
||||
"full_name": "Axua\/CVE-2007-0038",
|
||||
"owner": {
|
||||
"login": "Axua",
|
||||
"id": 28788087,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4",
|
||||
"html_url": "https:\/\/github.com\/Axua"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038",
|
||||
"description": "IE7 buffer overflow through an ANI file",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-29T11:15:39Z",
|
||||
"updated_at": "2020-04-30T04:01:07Z",
|
||||
"pushed_at": "2019-11-29T11:16:13Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2007/CVE-2007-0843.json
Normal file
25
2007/CVE-2007-0843.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 27229028,
|
||||
"name": "spydir",
|
||||
"full_name": "z3APA3A\/spydir",
|
||||
"owner": {
|
||||
"login": "z3APA3A",
|
||||
"id": 7222768,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7222768?v=4",
|
||||
"html_url": "https:\/\/github.com\/z3APA3A"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z3APA3A\/spydir",
|
||||
"description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)",
|
||||
"fork": false,
|
||||
"created_at": "2014-11-27T14:36:05Z",
|
||||
"updated_at": "2020-09-04T11:59:08Z",
|
||||
"pushed_at": "2017-04-08T16:40:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
209
2007/CVE-2007-2447.json
Normal file
209
2007/CVE-2007-2447.json
Normal file
|
@ -0,0 +1,209 @@
|
|||
[
|
||||
{
|
||||
"id": 143461594,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "amriunix\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "amriunix",
|
||||
"id": 6618368,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6618368?v=4",
|
||||
"html_url": "https:\/\/github.com\/amriunix"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447",
|
||||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T18:39:56Z",
|
||||
"updated_at": "2020-11-04T10:36:06Z",
|
||||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 195401614,
|
||||
"name": "metasploitable2",
|
||||
"full_name": "Unix13\/metasploitable2",
|
||||
"owner": {
|
||||
"login": "Unix13",
|
||||
"id": 52569108,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/52569108?v=4",
|
||||
"html_url": "https:\/\/github.com\/Unix13"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Unix13\/metasploitable2",
|
||||
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-05T11:55:41Z",
|
||||
"updated_at": "2020-08-26T14:48:27Z",
|
||||
"pushed_at": "2018-07-11T18:22:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 211957347,
|
||||
"name": "smb_usermap",
|
||||
"full_name": "b1fair\/smb_usermap",
|
||||
"owner": {
|
||||
"login": "b1fair",
|
||||
"id": 43326124,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/43326124?v=4",
|
||||
"html_url": "https:\/\/github.com\/b1fair"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b1fair\/smb_usermap",
|
||||
"description": "A simple exploit for CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T21:06:09Z",
|
||||
"updated_at": "2019-10-01T18:44:18Z",
|
||||
"pushed_at": "2019-10-01T18:44:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 225688290,
|
||||
"name": "exploit_smb_usermap_script",
|
||||
"full_name": "Unam3dd\/exploit_smb_usermap_script",
|
||||
"owner": {
|
||||
"login": "Unam3dd",
|
||||
"id": 34691959,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4",
|
||||
"html_url": "https:\/\/github.com\/Unam3dd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Unam3dd\/exploit_smb_usermap_script",
|
||||
"description": "Python Script Exploit SMB Usermap Script CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-03T18:25:41Z",
|
||||
"updated_at": "2020-12-18T19:57:17Z",
|
||||
"pushed_at": "2019-12-03T18:36:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235003634,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "JoseBarrios\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "JoseBarrios",
|
||||
"id": 794342,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/794342?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447",
|
||||
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T02:30:35Z",
|
||||
"updated_at": "2020-01-20T02:30:39Z",
|
||||
"pushed_at": "2020-01-20T02:30:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 257885318,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "3x1t1um\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "3x1t1um",
|
||||
"id": 54857145,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54857145?v=4",
|
||||
"html_url": "https:\/\/github.com\/3x1t1um"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-22T11:47:16Z",
|
||||
"updated_at": "2020-08-04T14:13:55Z",
|
||||
"pushed_at": "2020-08-04T14:13:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 264335823,
|
||||
"name": "smb-usermap-destroyer",
|
||||
"full_name": "nickvourd\/smb-usermap-destroyer",
|
||||
"owner": {
|
||||
"login": "nickvourd",
|
||||
"id": 32869078,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32869078?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickvourd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickvourd\/smb-usermap-destroyer",
|
||||
"description": "Smb Usermap Destoyer is a python2 exploit for CVE-2007-2447 ( 'Username' map script' Command Execution ).",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-16T01:36:28Z",
|
||||
"updated_at": "2020-05-30T10:13:25Z",
|
||||
"pushed_at": "2020-05-30T10:13:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 319098047,
|
||||
"name": "exploit-CVE-2007-2447",
|
||||
"full_name": "xlcc4096\/exploit-CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "xlcc4096",
|
||||
"id": 75581853,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75581853?v=4",
|
||||
"html_url": "https:\/\/github.com\/xlcc4096"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447",
|
||||
"description": "Exploit for the vulnerability CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-06T18:04:44Z",
|
||||
"updated_at": "2020-12-06T18:09:38Z",
|
||||
"pushed_at": "2020-12-06T18:09:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 319992014,
|
||||
"name": "CVE-2007-2447_Samba_3.0.25rc3",
|
||||
"full_name": "WildfootW\/CVE-2007-2447_Samba_3.0.25rc3",
|
||||
"owner": {
|
||||
"login": "WildfootW",
|
||||
"id": 11520473,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11520473?v=4",
|
||||
"html_url": "https:\/\/github.com\/WildfootW"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WildfootW\/CVE-2007-2447_Samba_3.0.25rc3",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T15:04:44Z",
|
||||
"updated_at": "2020-12-09T15:06:06Z",
|
||||
"pushed_at": "2020-12-09T15:06:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1186,13 +1186,13 @@
|
|||
"description": "CVE-2014-0160 OpenSSL Heartbleed Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-13T19:53:50Z",
|
||||
"updated_at": "2020-12-16T10:34:53Z",
|
||||
"updated_at": "2020-12-20T17:05:21Z",
|
||||
"pushed_at": "2020-12-14T19:15:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,8 +174,8 @@
|
|||
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-31T11:39:11Z",
|
||||
"updated_at": "2020-12-18T13:20:06Z",
|
||||
"pushed_at": "2020-12-18T13:20:03Z",
|
||||
"updated_at": "2020-12-20T20:43:14Z",
|
||||
"pushed_at": "2020-12-20T20:43:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -734,5 +734,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 323146977,
|
||||
"name": "CVE-2016-5195",
|
||||
"full_name": "DanielEbert\/CVE-2016-5195",
|
||||
"owner": {
|
||||
"login": "DanielEbert",
|
||||
"id": 53190379,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53190379?v=4",
|
||||
"html_url": "https:\/\/github.com\/DanielEbert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DanielEbert\/CVE-2016-5195",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-20T19:17:10Z",
|
||||
"updated_at": "2020-12-20T19:19:01Z",
|
||||
"pushed_at": "2020-12-20T19:18:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2020-12-17T15:12:33Z",
|
||||
"updated_at": "2020-12-20T20:39:57Z",
|
||||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-12-20T04:47:36Z",
|
||||
"updated_at": "2020-12-20T15:57:46Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2020-12-18T03:53:18Z",
|
||||
"updated_at": "2020-12-20T18:17:01Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 479,
|
||||
"watchers_count": 479,
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"forks_count": 245,
|
||||
"forks": 245,
|
||||
"watchers": 479,
|
||||
"watchers": 478,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-19T20:02:56Z",
|
||||
"updated_at": "2020-11-06T17:50:09Z",
|
||||
"updated_at": "2020-12-20T20:55:39Z",
|
||||
"pushed_at": "2018-09-04T21:35:36Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-07T08:30:07Z",
|
||||
"updated_at": "2020-12-06T15:23:23Z",
|
||||
"updated_at": "2020-12-20T17:04:55Z",
|
||||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 277,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1071,13 +1071,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-12-19T13:42:46Z",
|
||||
"updated_at": "2020-12-20T19:05:22Z",
|
||||
"pushed_at": "2020-12-06T04:48:38Z",
|
||||
"stargazers_count": 1127,
|
||||
"watchers_count": 1127,
|
||||
"forks_count": 385,
|
||||
"forks": 385,
|
||||
"watchers": 1127,
|
||||
"stargazers_count": 1128,
|
||||
"watchers_count": 1128,
|
||||
"forks_count": 386,
|
||||
"forks": 386,
|
||||
"watchers": 1128,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2020-12-20T04:47:36Z",
|
||||
"updated_at": "2020-12-20T15:57:46Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱💻",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-24T23:09:43Z",
|
||||
"updated_at": "2020-11-26T03:59:00Z",
|
||||
"updated_at": "2020-12-20T19:38:34Z",
|
||||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 135,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-14T19:39:42Z",
|
||||
"updated_at": "2020-12-14T19:39:42Z",
|
||||
"pushed_at": "2020-12-14T19:39:43Z",
|
||||
"updated_at": "2020-12-20T17:29:10Z",
|
||||
"pushed_at": "2020-12-20T17:29:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-09T06:56:07Z",
|
||||
"updated_at": "2020-09-01T21:42:14Z",
|
||||
"updated_at": "2020-12-20T15:27:07Z",
|
||||
"pushed_at": "2020-07-22T12:34:47Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
33
README.md
33
README.md
|
@ -13113,6 +13113,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
|
|||
- [shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-](https://github.com/shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-)
|
||||
- [dulanjaya23/Dirty-Cow-CVE-2016-5195-](https://github.com/dulanjaya23/Dirty-Cow-CVE-2016-5195-)
|
||||
- [KaviDk/dirtyCow](https://github.com/KaviDk/dirtyCow)
|
||||
- [DanielEbert/CVE-2016-5195](https://github.com/DanielEbert/CVE-2016-5195)
|
||||
|
||||
### CVE-2016-5345 (2018-01-22)
|
||||
|
||||
|
@ -16373,6 +16374,22 @@ Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before
|
|||
|
||||
|
||||
## 2007
|
||||
### CVE-2007-0038 (2007-03-30)
|
||||
|
||||
<code>
|
||||
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
|
||||
</code>
|
||||
|
||||
- [Axua/CVE-2007-0038](https://github.com/Axua/CVE-2007-0038)
|
||||
|
||||
### CVE-2007-0843 (2007-02-22)
|
||||
|
||||
<code>
|
||||
The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
|
||||
</code>
|
||||
|
||||
- [z3APA3A/spydir](https://github.com/z3APA3A/spydir)
|
||||
|
||||
### CVE-2007-1567 (2007-03-21)
|
||||
|
||||
<code>
|
||||
|
@ -16381,6 +16398,22 @@ Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows
|
|||
|
||||
- [war4uthor/CVE-2007-1567](https://github.com/war4uthor/CVE-2007-1567)
|
||||
|
||||
### CVE-2007-2447 (2007-05-14)
|
||||
|
||||
<code>
|
||||
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
|
||||
</code>
|
||||
|
||||
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
|
||||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447)
|
||||
- [nickvourd/smb-usermap-destroyer](https://github.com/nickvourd/smb-usermap-destroyer)
|
||||
- [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447)
|
||||
- [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3)
|
||||
|
||||
### CVE-2007-3830 (2007-07-17)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue