diff --git a/2007/CVE-2007-0038.json b/2007/CVE-2007-0038.json new file mode 100644 index 0000000000..866e062cc9 --- /dev/null +++ b/2007/CVE-2007-0038.json @@ -0,0 +1,25 @@ +[ + { + "id": 224839310, + "name": "CVE-2007-0038", + "full_name": "Axua\/CVE-2007-0038", + "owner": { + "login": "Axua", + "id": 28788087, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28788087?v=4", + "html_url": "https:\/\/github.com\/Axua" + }, + "html_url": "https:\/\/github.com\/Axua\/CVE-2007-0038", + "description": "IE7 buffer overflow through an ANI file", + "fork": false, + "created_at": "2019-11-29T11:15:39Z", + "updated_at": "2020-04-30T04:01:07Z", + "pushed_at": "2019-11-29T11:16:13Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2007/CVE-2007-0843.json b/2007/CVE-2007-0843.json new file mode 100644 index 0000000000..a7eea9a0d6 --- /dev/null +++ b/2007/CVE-2007-0843.json @@ -0,0 +1,25 @@ +[ + { + "id": 27229028, + "name": "spydir", + "full_name": "z3APA3A\/spydir", + "owner": { + "login": "z3APA3A", + "id": 7222768, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7222768?v=4", + "html_url": "https:\/\/github.com\/z3APA3A" + }, + "html_url": "https:\/\/github.com\/z3APA3A\/spydir", + "description": "Spydir is a small utility to monitor file changes in Windows directory regardless of subdirectory and files permissions (exploits CVE-2007-0843)", + "fork": false, + "created_at": "2014-11-27T14:36:05Z", + "updated_at": "2020-09-04T11:59:08Z", + "pushed_at": "2017-04-08T16:40:03Z", + "stargazers_count": 7, + "watchers_count": 7, + "forks_count": 3, + "forks": 3, + "watchers": 7, + "score": 0 + } +] \ No newline at end of file diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json new file mode 100644 index 0000000000..259e79e520 --- /dev/null +++ b/2007/CVE-2007-2447.json @@ -0,0 +1,209 @@ +[ + { + "id": 143461594, + "name": "CVE-2007-2447", + "full_name": "amriunix\/CVE-2007-2447", + "owner": { + "login": "amriunix", + "id": 6618368, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/6618368?v=4", + "html_url": "https:\/\/github.com\/amriunix" + }, + "html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447", + "description": "CVE-2007-2447 - Samba usermap script", + "fork": false, + "created_at": "2018-08-03T18:39:56Z", + "updated_at": "2020-11-04T10:36:06Z", + "pushed_at": "2020-08-16T18:54:38Z", + "stargazers_count": 18, + "watchers_count": 18, + "forks_count": 10, + "forks": 10, + "watchers": 18, + "score": 0 + }, + { + "id": 195401614, + "name": "metasploitable2", + "full_name": "Unix13\/metasploitable2", + "owner": { + "login": "Unix13", + "id": 52569108, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/52569108?v=4", + "html_url": "https:\/\/github.com\/Unix13" + }, + "html_url": "https:\/\/github.com\/Unix13\/metasploitable2", + "description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.", + "fork": false, + "created_at": "2019-07-05T11:55:41Z", + "updated_at": "2020-08-26T14:48:27Z", + "pushed_at": "2018-07-11T18:22:51Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 2, + "forks": 2, + "watchers": 1, + "score": 0 + }, + { + "id": 211957347, + "name": "smb_usermap", + "full_name": "b1fair\/smb_usermap", + "owner": { + "login": "b1fair", + "id": 43326124, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/43326124?v=4", + "html_url": "https:\/\/github.com\/b1fair" + }, + "html_url": "https:\/\/github.com\/b1fair\/smb_usermap", + "description": "A simple exploit for CVE-2007-2447", + "fork": false, + "created_at": "2019-09-30T21:06:09Z", + "updated_at": "2019-10-01T18:44:18Z", + "pushed_at": "2019-10-01T18:44:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 225688290, + "name": "exploit_smb_usermap_script", + "full_name": "Unam3dd\/exploit_smb_usermap_script", + "owner": { + "login": "Unam3dd", + "id": 34691959, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4", + "html_url": "https:\/\/github.com\/Unam3dd" + }, + "html_url": "https:\/\/github.com\/Unam3dd\/exploit_smb_usermap_script", + "description": "Python Script Exploit SMB Usermap Script CVE-2007-2447", + "fork": false, + "created_at": "2019-12-03T18:25:41Z", + "updated_at": "2020-12-18T19:57:17Z", + "pushed_at": "2019-12-03T18:36:28Z", + "stargazers_count": 2, + "watchers_count": 2, + "forks_count": 0, + "forks": 0, + "watchers": 2, + "score": 0 + }, + { + "id": 235003634, + "name": "CVE-2007-2447", + "full_name": "JoseBarrios\/CVE-2007-2447", + "owner": { + "login": "JoseBarrios", + "id": 794342, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/794342?v=4", + "html_url": "https:\/\/github.com\/JoseBarrios" + }, + "html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447", + "description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.", + "fork": false, + "created_at": "2020-01-20T02:30:35Z", + "updated_at": "2020-01-20T02:30:39Z", + "pushed_at": "2020-01-20T02:30:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 257885318, + "name": "CVE-2007-2447", + "full_name": "3x1t1um\/CVE-2007-2447", + "owner": { + "login": "3x1t1um", + "id": 54857145, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54857145?v=4", + "html_url": "https:\/\/github.com\/3x1t1um" + }, + "html_url": "https:\/\/github.com\/3x1t1um\/CVE-2007-2447", + "description": null, + "fork": false, + "created_at": "2020-04-22T11:47:16Z", + "updated_at": "2020-08-04T14:13:55Z", + "pushed_at": "2020-08-04T14:13:53Z", + "stargazers_count": 1, + "watchers_count": 1, + "forks_count": 0, + "forks": 0, + "watchers": 1, + "score": 0 + }, + { + "id": 264335823, + "name": "smb-usermap-destroyer", + "full_name": "nickvourd\/smb-usermap-destroyer", + "owner": { + "login": "nickvourd", + "id": 32869078, + "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32869078?v=4", + "html_url": "https:\/\/github.com\/nickvourd" + }, + "html_url": "https:\/\/github.com\/nickvourd\/smb-usermap-destroyer", + "description": "Smb Usermap Destoyer is a python2 exploit for CVE-2007-2447 ( 'Username' map script' Command Execution ).", + "fork": false, + "created_at": "2020-05-16T01:36:28Z", + "updated_at": "2020-05-30T10:13:25Z", + "pushed_at": "2020-05-30T10:13:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 319098047, + "name": "exploit-CVE-2007-2447", + "full_name": "xlcc4096\/exploit-CVE-2007-2447", + "owner": { + "login": "xlcc4096", + "id": 75581853, + "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75581853?v=4", + "html_url": "https:\/\/github.com\/xlcc4096" + }, + "html_url": "https:\/\/github.com\/xlcc4096\/exploit-CVE-2007-2447", + "description": "Exploit for the vulnerability CVE-2007-2447", + "fork": false, + "created_at": "2020-12-06T18:04:44Z", + "updated_at": "2020-12-06T18:09:38Z", + "pushed_at": "2020-12-06T18:09:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 319992014, + "name": "CVE-2007-2447_Samba_3.0.25rc3", + "full_name": "WildfootW\/CVE-2007-2447_Samba_3.0.25rc3", + "owner": { + "login": "WildfootW", + "id": 11520473, + "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11520473?v=4", + "html_url": "https:\/\/github.com\/WildfootW" + }, + "html_url": "https:\/\/github.com\/WildfootW\/CVE-2007-2447_Samba_3.0.25rc3", + "description": null, + "fork": false, + "created_at": "2020-12-09T15:04:44Z", + "updated_at": "2020-12-09T15:06:06Z", + "pushed_at": "2020-12-09T15:06:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 3fdd6fde93..f209ce5a35 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -1186,13 +1186,13 @@ "description": "CVE-2014-0160 OpenSSL Heartbleed Proof of Concept", "fork": false, "created_at": "2020-12-13T19:53:50Z", - "updated_at": "2020-12-16T10:34:53Z", + "updated_at": "2020-12-20T17:05:21Z", "pushed_at": "2020-12-14T19:15:20Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-3153.json b/2014/CVE-2014-3153.json index 726e174662..ff4d64df01 100644 --- a/2014/CVE-2014-3153.json +++ b/2014/CVE-2014-3153.json @@ -174,8 +174,8 @@ "description": "Exploiting CVE-2014-3153, AKA Towelroot.", "fork": false, "created_at": "2020-10-31T11:39:11Z", - "updated_at": "2020-12-18T13:20:06Z", - "pushed_at": "2020-12-18T13:20:03Z", + "updated_at": "2020-12-20T20:43:14Z", + "pushed_at": "2020-12-20T20:43:12Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 87cb14ec91..d037c4cc2f 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -734,5 +734,28 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 323146977, + "name": "CVE-2016-5195", + "full_name": "DanielEbert\/CVE-2016-5195", + "owner": { + "login": "DanielEbert", + "id": 53190379, + "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53190379?v=4", + "html_url": "https:\/\/github.com\/DanielEbert" + }, + "html_url": "https:\/\/github.com\/DanielEbert\/CVE-2016-5195", + "description": null, + "fork": false, + "created_at": "2020-12-20T19:17:10Z", + "updated_at": "2020-12-20T19:19:01Z", + "pushed_at": "2020-12-20T19:18:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-0781.json b/2017/CVE-2017-0781.json index d83ad8370a..16dbf4e32e 100644 --- a/2017/CVE-2017-0781.json +++ b/2017/CVE-2017-0781.json @@ -13,13 +13,13 @@ "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "fork": false, "created_at": "2017-10-09T15:13:25Z", - "updated_at": "2020-12-17T15:12:33Z", + "updated_at": "2020-12-20T20:39:57Z", "pushed_at": "2017-10-09T15:20:11Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "forks_count": 34, "forks": 34, - "watchers": 71, + "watchers": 72, "score": 0 }, { diff --git a/2017/CVE-2017-11317.json b/2017/CVE-2017-11317.json index 97c3714a98..00cf2af6ee 100644 --- a/2017/CVE-2017-11317.json +++ b/2017/CVE-2017-11317.json @@ -13,13 +13,13 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2020-12-20T04:47:36Z", + "updated_at": "2020-12-20T15:57:46Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "forks_count": 33, "forks": 33, - "watchers": 103, + "watchers": 104, "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 4af50f1578..450ab3f0be 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -59,13 +59,13 @@ "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "fork": false, "created_at": "2017-11-21T05:55:53Z", - "updated_at": "2020-12-18T03:53:18Z", + "updated_at": "2020-12-20T18:17:01Z", "pushed_at": "2017-11-29T03:33:53Z", - "stargazers_count": 479, - "watchers_count": 479, + "stargazers_count": 478, + "watchers_count": 478, "forks_count": 245, "forks": 245, - "watchers": 479, + "watchers": 478, "score": 0 }, { diff --git a/2017/CVE-2017-15361.json b/2017/CVE-2017-15361.json index 2b66eff306..8f78a31e68 100644 --- a/2017/CVE-2017-15361.json +++ b/2017/CVE-2017-15361.json @@ -82,13 +82,13 @@ "description": "Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber", "fork": false, "created_at": "2017-10-19T20:02:56Z", - "updated_at": "2020-11-06T17:50:09Z", + "updated_at": "2020-12-20T20:55:39Z", "pushed_at": "2018-09-04T21:35:36Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "forks_count": 24, "forks": 24, - "watchers": 33, + "watchers": 34, "score": 0 }, { diff --git a/2018/CVE-2018-8120.json b/2018/CVE-2018-8120.json index 5be4b52615..de3784c4f7 100644 --- a/2018/CVE-2018-8120.json +++ b/2018/CVE-2018-8120.json @@ -82,13 +82,13 @@ "description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ", "fork": false, "created_at": "2018-06-07T08:30:07Z", - "updated_at": "2020-12-06T15:23:23Z", + "updated_at": "2020-12-20T17:04:55Z", "pushed_at": "2018-08-08T05:48:24Z", - "stargazers_count": 277, - "watchers_count": 277, + "stargazers_count": 278, + "watchers_count": 278, "forks_count": 120, "forks": 120, - "watchers": 277, + "watchers": 278, "score": 0 }, { diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index f905a8bf46..07a47a221f 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1071,13 +1071,13 @@ "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", - "updated_at": "2020-12-19T13:42:46Z", + "updated_at": "2020-12-20T19:05:22Z", "pushed_at": "2020-12-06T04:48:38Z", - "stargazers_count": 1127, - "watchers_count": 1127, - "forks_count": 385, - "forks": 385, - "watchers": 1127, + "stargazers_count": 1128, + "watchers_count": 1128, + "forks_count": 386, + "forks": 386, + "watchers": 1128, "score": 0 }, { diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 23e0a3f92b..6f74a2bd80 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -13,13 +13,13 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2020-12-20T04:47:36Z", + "updated_at": "2020-12-20T15:57:46Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "forks_count": 33, "forks": 33, - "watchers": 103, + "watchers": 104, "score": 0 }, { diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index 0d5b837253..3fa68e8de2 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -13,13 +13,13 @@ "description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻", "fork": false, "created_at": "2019-02-24T23:09:43Z", - "updated_at": "2020-11-26T03:59:00Z", + "updated_at": "2020-12-20T19:38:34Z", "pushed_at": "2019-02-25T07:37:07Z", - "stargazers_count": 135, - "watchers_count": 135, + "stargazers_count": 136, + "watchers_count": 136, "forks_count": 44, "forks": 44, - "watchers": 135, + "watchers": 136, "score": 0 }, { diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index d696510b49..1a6ae52769 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -109,8 +109,8 @@ "pushed_at": "2020-11-05T16:37:20Z", "stargazers_count": 158, "watchers_count": 158, - "forks_count": 39, - "forks": 39, + "forks_count": 40, + "forks": 40, "watchers": 158, "score": 0 }, diff --git a/2020/CVE-2020-27949.json b/2020/CVE-2020-27949.json index 5d6a3f227c..fd4cb77045 100644 --- a/2020/CVE-2020-27949.json +++ b/2020/CVE-2020-27949.json @@ -13,8 +13,8 @@ "description": null, "fork": false, "created_at": "2020-12-14T19:39:42Z", - "updated_at": "2020-12-14T19:39:42Z", - "pushed_at": "2020-12-14T19:39:43Z", + "updated_at": "2020-12-20T17:29:10Z", + "pushed_at": "2020-12-20T17:29:07Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2020/CVE-2020-8558.json b/2020/CVE-2020-8558.json index 7e7d2f5d5a..c720e0a0fe 100644 --- a/2020/CVE-2020-8558.json +++ b/2020/CVE-2020-8558.json @@ -13,13 +13,13 @@ "description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.", "fork": false, "created_at": "2020-07-09T06:56:07Z", - "updated_at": "2020-09-01T21:42:14Z", + "updated_at": "2020-12-20T15:27:07Z", "pushed_at": "2020-07-22T12:34:47Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "forks_count": 0, "forks": 0, - "watchers": 15, + "watchers": 16, "score": 0 }, { diff --git a/README.md b/README.md index 1db9cae042..a7148449af 100644 --- a/README.md +++ b/README.md @@ -13113,6 +13113,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo - [shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-](https://github.com/shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195-) - [dulanjaya23/Dirty-Cow-CVE-2016-5195-](https://github.com/dulanjaya23/Dirty-Cow-CVE-2016-5195-) - [KaviDk/dirtyCow](https://github.com/KaviDk/dirtyCow) +- [DanielEbert/CVE-2016-5195](https://github.com/DanielEbert/CVE-2016-5195) ### CVE-2016-5345 (2018-01-22) @@ -16373,6 +16374,22 @@ Unspecified vulnerability in Prototype JavaScript framework (prototypejs) before ## 2007 +### CVE-2007-0038 (2007-03-30) + + +Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred. + + +- [Axua/CVE-2007-0038](https://github.com/Axua/CVE-2007-0038) + +### CVE-2007-0843 (2007-02-22) + + +The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information. + + +- [z3APA3A/spydir](https://github.com/z3APA3A/spydir) + ### CVE-2007-1567 (2007-03-21) @@ -16381,6 +16398,22 @@ Stack-based buffer overflow in War FTP Daemon 1.65, and possibly earlier, allows - [war4uthor/CVE-2007-1567](https://github.com/war4uthor/CVE-2007-1567) +### CVE-2007-2447 (2007-05-14) + + +The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management. + + +- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447) +- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2) +- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap) +- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script) +- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447) +- [3x1t1um/CVE-2007-2447](https://github.com/3x1t1um/CVE-2007-2447) +- [nickvourd/smb-usermap-destroyer](https://github.com/nickvourd/smb-usermap-destroyer) +- [xlcc4096/exploit-CVE-2007-2447](https://github.com/xlcc4096/exploit-CVE-2007-2447) +- [WildfootW/CVE-2007-2447_Samba_3.0.25rc3](https://github.com/WildfootW/CVE-2007-2447_Samba_3.0.25rc3) + ### CVE-2007-3830 (2007-07-17)