Auto Update 2023/12/30 12:31:28

This commit is contained in:
motikan2010-bot 2023-12-30 21:31:28 +09:00
parent a33661459a
commit c02ee14e14
41 changed files with 654 additions and 122 deletions

View file

@ -133,19 +133,19 @@
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
"updated_at": "2023-11-15T13:01:56Z",
"updated_at": "2023-12-30T09:21:49Z",
"pushed_at": "2021-09-28T16:14:13Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 35,
"forks": 12,
"watchers": 36,
"score": 0,
"subscribers_count": 2
},

View file

@ -1158,10 +1158,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2023-12-04T11:19:34Z",
"updated_at": "2023-12-30T08:25:07Z",
"pushed_at": "2023-05-11T02:12:25Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -1177,7 +1177,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 177,
"watchers": 178,
"score": 0,
"subscribers_count": 5
},

32
2016/CVE-2016-0701.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 50957830,
"name": "cve-2016-0701",
"full_name": "luanjampa\/cve-2016-0701",
"owner": {
"login": "luanjampa",
"id": 4728927,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4728927?v=4",
"html_url": "https:\/\/github.com\/luanjampa"
},
"html_url": "https:\/\/github.com\/luanjampa\/cve-2016-0701",
"description": null,
"fork": false,
"created_at": "2016-02-02T22:53:34Z",
"updated_at": "2016-02-15T06:03:46Z",
"pushed_at": "2016-02-24T17:32:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 4
}
]

View file

@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 50619014,
"name": "cve-2016-0728-testbed",
"full_name": "neuschaefer\/cve-2016-0728-testbed",
"owner": {
"login": "neuschaefer",
"id": 1021512,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1021512?v=4",
"html_url": "https:\/\/github.com\/neuschaefer"
},
"html_url": "https:\/\/github.com\/neuschaefer\/cve-2016-0728-testbed",
"description": "A testbed for CVE-2016-0728, a refcount leak\/overflow bug in Linux",
"fork": false,
"created_at": "2016-01-28T22:38:13Z",
"updated_at": "2023-02-16T19:24:26Z",
"pushed_at": "2016-01-29T00:48:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 4
},
{
"id": 53915696,
"name": "cve-2016-0728",

View file

@ -28,5 +28,35 @@
"watchers": 38,
"score": 0,
"subscribers_count": 5
},
{
"id": 56596683,
"name": "CVE-2016-0846-PoC",
"full_name": "b0b0505\/CVE-2016-0846-PoC",
"owner": {
"login": "b0b0505",
"id": 6748041,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6748041?v=4",
"html_url": "https:\/\/github.com\/b0b0505"
},
"html_url": "https:\/\/github.com\/b0b0505\/CVE-2016-0846-PoC",
"description": null,
"fork": false,
"created_at": "2016-04-19T12:56:44Z",
"updated_at": "2016-04-27T18:05:22Z",
"pushed_at": "2016-04-19T13:01:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"score": 0,
"subscribers_count": 3
}
]

32
2016/CVE-2016-2118.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 56461631,
"name": "cfengine-CVE-2016-2118",
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
"description": "An example detection and remediation policy.",
"fork": false,
"created_at": "2016-04-17T22:22:04Z",
"updated_at": "2016-04-18T02:57:44Z",
"pushed_at": "2016-04-19T14:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2016/CVE-2016-3141.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 56758577,
"name": "CVE-2016-3141",
"full_name": "peternguyen93\/CVE-2016-3141",
"owner": {
"login": "peternguyen93",
"id": 1802870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
"html_url": "https:\/\/github.com\/peternguyen93"
},
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
"description": "CVE-2016-3141",
"fork": false,
"created_at": "2016-04-21T08:59:05Z",
"updated_at": "2023-03-11T18:41:15Z",
"pushed_at": "2016-04-23T15:55:01Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 3
}
]

View file

@ -199,10 +199,10 @@
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
"fork": false,
"created_at": "2019-10-16T10:04:30Z",
"updated_at": "2023-10-23T06:43:58Z",
"updated_at": "2023-12-30T09:27:56Z",
"pushed_at": "2019-10-16T12:20:53Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -211,7 +211,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 4
},
@ -349,10 +349,10 @@
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
"fork": false,
"created_at": "2020-04-22T21:11:27Z",
"updated_at": "2023-12-26T03:25:15Z",
"updated_at": "2023-12-30T09:26:26Z",
"pushed_at": "2022-01-02T20:40:58Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -371,7 +371,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
},

View file

@ -261,5 +261,35 @@
"watchers": 24,
"score": 0,
"subscribers_count": 2
},
{
"id": 737270169,
"name": "CVE-2021-21551",
"full_name": "houseofxyz\/CVE-2021-21551",
"owner": {
"login": "houseofxyz",
"id": 121667935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121667935?v=4",
"html_url": "https:\/\/github.com\/houseofxyz"
},
"html_url": "https:\/\/github.com\/houseofxyz\/CVE-2021-21551",
"description": "Dell dbutil_2_3.sys driver exploit",
"fork": false,
"created_at": "2023-12-30T12:23:23Z",
"updated_at": "2023-12-30T12:23:23Z",
"pushed_at": "2023-12-30T12:23:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2023-12-26T09:54:28Z",
"updated_at": "2023-12-30T12:19:46Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 1
},

View file

@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414051484,
"name": "cve-2021-24499",
"full_name": "hh-hunter\/cve-2021-24499",
"owner": {
"login": "hh-hunter",
"id": 91593280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
"html_url": "https:\/\/github.com\/hh-hunter"
},
"html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
"description": null,
"fork": false,
"created_at": "2021-10-06T03:07:31Z",
"updated_at": "2021-10-06T03:45:29Z",
"pushed_at": "2021-10-06T03:44:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 698068217,
"name": "CVE-2021-24499",

View file

@ -58,5 +58,39 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 414009465,
"name": "CVE-2021-27651",
"full_name": "orangmuda\/CVE-2021-27651",
"owner": {
"login": "orangmuda",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/orangmuda"
},
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
"description": "bypass all stages of the password reset flow",
"fork": false,
"created_at": "2021-10-05T23:33:50Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-05T23:35:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"code-injection",
"pega",
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,6 +29,66 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413892415,
"name": "CVE-2021-41773",
"full_name": "numanturle\/CVE-2021-41773",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-05T16:18:09Z",
"updated_at": "2023-12-08T12:43:35Z",
"pushed_at": "2021-10-05T16:48:27Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},
{
"id": 413901787,
"name": "CVE-2021-41773",
"full_name": "knqyf263\/CVE-2021-41773",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
"fork": false,
"created_at": "2021-10-05T16:45:41Z",
"updated_at": "2023-12-08T12:43:35Z",
"pushed_at": "2021-10-06T05:40:34Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"score": 0,
"subscribers_count": 3
},
{
"id": 413916578,
"name": "CVE-2021-41773-PoC",
@ -95,6 +155,96 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413943505,
"name": "CVE-2021-41773",
"full_name": "masahiro331\/CVE-2021-41773",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T18:56:04Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-06T03:43:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 413969845,
"name": "CVE-2021-41773",
"full_name": "j4k0m\/CVE-2021-41773",
"owner": {
"login": "j4k0m",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/j4k0m"
},
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T20:30:01Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T22:06:50Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 413972926,
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
"description": "Poc.py ",
"fork": false,
"created_at": "2021-10-05T20:41:34Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 414013246,
"name": "CVE-2021-41773-PoC",
@ -192,6 +342,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414050354,
"name": "CVE-2021-41773-PoC",
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
"owner": {
"login": "habibiefaried",
"id": 4345690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
"html_url": "https:\/\/github.com\/habibiefaried"
},
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"fork": false,
"created_at": "2021-10-06T03:01:41Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-06T05:39:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
@ -222,6 +402,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414082633,
"name": "cve-2021-41773-nse",
"full_name": "TAI-REx\/cve-2021-41773-nse",
"owner": {
"login": "TAI-REx",
"id": 78527947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
"html_url": "https:\/\/github.com\/TAI-REx"
},
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:36:22Z",
"updated_at": "2021-11-26T18:07:10Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-45744 - A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
"fork": false,
"created_at": "2022-01-14T15:36:21Z",
"updated_at": "2022-01-14T18:37:56Z",
"updated_at": "2023-12-30T08:24:30Z",
"pushed_at": "2022-01-14T16:00:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
"fork": false,
"created_at": "2022-01-14T16:52:08Z",
"updated_at": "2022-01-14T18:37:18Z",
"updated_at": "2023-12-30T08:24:27Z",
"pushed_at": "2022-01-14T16:52:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46067 - In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover.",
"fork": false,
"created_at": "2022-01-14T17:19:09Z",
"updated_at": "2022-01-14T18:33:43Z",
"updated_at": "2023-12-30T08:23:32Z",
"pushed_at": "2022-01-15T11:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46068 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.",
"fork": false,
"created_at": "2022-01-14T18:04:01Z",
"updated_at": "2022-01-14T18:36:30Z",
"updated_at": "2023-12-30T08:24:13Z",
"pushed_at": "2022-01-14T19:34:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T18:27:00Z",
"updated_at": "2022-01-14T18:29:45Z",
"updated_at": "2023-12-30T08:24:23Z",
"pushed_at": "2022-01-14T18:27:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46070 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel.",
"fork": false,
"created_at": "2022-01-14T18:54:29Z",
"updated_at": "2022-01-14T18:54:29Z",
"updated_at": "2023-12-30T08:24:16Z",
"pushed_at": "2022-01-14T19:32:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46071 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T19:09:36Z",
"updated_at": "2022-01-14T19:09:36Z",
"updated_at": "2023-12-30T08:24:20Z",
"pushed_at": "2022-01-14T19:10:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46072 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T19:34:50Z",
"updated_at": "2022-01-14T19:34:50Z",
"updated_at": "2023-12-30T08:24:11Z",
"pushed_at": "2022-01-14T19:35:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46073 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T19:49:07Z",
"updated_at": "2022-01-14T19:49:07Z",
"updated_at": "2023-12-30T08:24:07Z",
"pushed_at": "2022-01-14T19:49:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46074 - A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel.",
"fork": false,
"created_at": "2022-01-14T20:01:50Z",
"updated_at": "2022-01-14T20:01:50Z",
"updated_at": "2023-12-30T08:24:03Z",
"pushed_at": "2022-01-14T20:02:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46075 - A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations.",
"fork": false,
"created_at": "2022-01-14T20:15:28Z",
"updated_at": "2022-01-14T20:15:28Z",
"updated_at": "2023-12-30T08:24:01Z",
"pushed_at": "2022-01-14T20:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46076 - Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution.",
"fork": false,
"created_at": "2022-01-14T20:28:01Z",
"updated_at": "2022-01-14T20:28:01Z",
"updated_at": "2023-12-30T08:23:57Z",
"pushed_at": "2022-01-14T20:28:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46078 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.",
"fork": false,
"created_at": "2022-01-14T20:49:42Z",
"updated_at": "2022-01-14T20:49:42Z",
"updated_at": "2023-12-30T08:23:53Z",
"pushed_at": "2022-01-14T20:50:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46079 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection.",
"fork": false,
"created_at": "2022-01-14T21:26:02Z",
"updated_at": "2022-01-14T21:26:02Z",
"updated_at": "2023-12-30T08:23:50Z",
"pushed_at": "2022-01-14T21:27:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2021-46080 - A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability.",
"fork": false,
"created_at": "2022-01-14T21:45:58Z",
"updated_at": "2022-01-14T21:45:58Z",
"updated_at": "2023-12-30T08:23:46Z",
"pushed_at": "2022-01-14T21:58:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables leak - CVE-2022-0337",
"fork": false,
"created_at": "2022-03-19T08:10:46Z",
"updated_at": "2023-12-20T04:10:59Z",
"updated_at": "2023-12-30T11:10:51Z",
"pushed_at": "2022-09-04T17:28:56Z",
"stargazers_count": 320,
"watchers_count": 320,
"stargazers_count": 319,
"watchers_count": 319,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 320,
"watchers": 319,
"score": 0,
"subscribers_count": 6
},

View file

@ -264,7 +264,7 @@
"description": "A Python PoC of CVE-2022-21661, inspired from z92g's Go PoC",
"fork": false,
"created_at": "2023-04-27T00:36:16Z",
"updated_at": "2023-11-10T03:25:45Z",
"updated_at": "2023-12-30T09:42:45Z",
"pushed_at": "2023-04-27T00:50:50Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -18,13 +18,13 @@
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 88,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-32947 walkthough and demo",
"fork": false,
"created_at": "2023-09-17T08:21:47Z",
"updated_at": "2023-12-28T09:13:34Z",
"updated_at": "2023-12-30T12:15:10Z",
"pushed_at": "2023-09-18T03:04:48Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 134,
"watchers": 135,
"score": 0,
"subscribers_count": 3
}

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-12-29T15:08:32Z",
"updated_at": "2023-12-30T07:41:36Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 862,
"watchers_count": 862,
"stargazers_count": 861,
"watchers_count": 861,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 862,
"watchers": 861,
"score": 0,
"subscribers_count": 25
},

View file

@ -43,7 +43,7 @@
"description": "CVE-2023-20198 Checkscript",
"fork": false,
"created_at": "2023-10-17T08:00:18Z",
"updated_at": "2023-12-03T18:18:08Z",
"updated_at": "2023-12-30T09:37:12Z",
"pushed_at": "2023-10-23T20:19:49Z",
"stargazers_count": 18,
"watchers_count": 18,

View file

@ -13,19 +13,19 @@
"description": "nuclei templates CVE RCE CNVD IoT",
"fork": false,
"created_at": "2023-12-05T05:00:27Z",
"updated_at": "2023-12-05T05:21:17Z",
"updated_at": "2023-12-30T06:44:58Z",
"pushed_at": "2023-12-06T13:48:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-28T13:51:27Z",
"updated_at": "2023-10-29T00:10:16Z",
"updated_at": "2023-12-30T09:44:46Z",
"pushed_at": "2023-06-28T13:58:43Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 4
}

32
2023/CVE-2023-35985.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 737198469,
"name": "-CVE-2023-35985",
"full_name": "SpiralBL0CK\/-CVE-2023-35985",
"owner": {
"login": "SpiralBL0CK",
"id": 25670930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
"html_url": "https:\/\/github.com\/SpiralBL0CK"
},
"html_url": "https:\/\/github.com\/SpiralBL0CK\/-CVE-2023-35985",
"description": " CVE-2023-35985 reproduction",
"fork": false,
"created_at": "2023-12-30T06:35:21Z",
"updated_at": "2023-12-30T06:35:21Z",
"pushed_at": "2023-12-30T07:00:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
"fork": false,
"created_at": "2023-08-12T18:33:57Z",
"updated_at": "2023-12-25T17:58:31Z",
"updated_at": "2023-12-30T10:33:45Z",
"pushed_at": "2023-09-07T08:37:04Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 87,
"watchers": 88,
"score": 0,
"subscribers_count": 2
},

View file

@ -73,19 +73,19 @@
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
"fork": false,
"created_at": "2023-12-17T14:18:54Z",
"updated_at": "2023-12-29T06:47:46Z",
"updated_at": "2023-12-30T09:21:14Z",
"pushed_at": "2023-12-18T02:46:21Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": true,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 43,
"forks": 9,
"watchers": 44,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Postfix SMTP Smuggling - Expect Script POC",
"fork": false,
"created_at": "2023-12-26T17:02:20Z",
"updated_at": "2023-12-29T08:37:56Z",
"updated_at": "2023-12-30T12:13:28Z",
"pushed_at": "2023-12-26T20:16:45Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -3808,6 +3808,13 @@
- [datackmy/FallingSkies-CVE-2023-35885](https://github.com/datackmy/FallingSkies-CVE-2023-35885)
- [Chocapikk/CVE-2023-35885](https://github.com/Chocapikk/CVE-2023-35885)
### CVE-2023-35985 (2023-11-27)
<code>An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
</code>
- [SpiralBL0CK/-CVE-2023-35985](https://github.com/SpiralBL0CK/-CVE-2023-35985)
### CVE-2023-36025 (2023-11-14)
<code>Windows SmartScreen Security Feature Bypass Vulnerability
@ -13985,6 +13992,7 @@
- [ihack4falafel/Dell-Driver-EoP-CVE-2021-21551](https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551)
- [tijme/kernel-mii](https://github.com/tijme/kernel-mii)
- [nanabingies/CVE-2021-21551](https://github.com/nanabingies/CVE-2021-21551)
- [houseofxyz/CVE-2021-21551](https://github.com/houseofxyz/CVE-2021-21551)
### CVE-2021-21716
- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
@ -14502,6 +14510,7 @@
</code>
- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
### CVE-2021-24507 (2021-08-09)
@ -15099,6 +15108,7 @@
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
### CVE-2021-27850 (2021-04-15)
@ -17231,12 +17241,19 @@
</code>
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
@ -33770,6 +33787,13 @@
- [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln)
- [BabyTeam1024/CVE-2016-0638](https://github.com/BabyTeam1024/CVE-2016-0638)
### CVE-2016-0701 (2016-02-14)
<code>The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
</code>
- [luanjampa/cve-2016-0701](https://github.com/luanjampa/cve-2016-0701)
### CVE-2016-0702 (2016-03-03)
<code>The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a &quot;CacheBleed&quot; attack.
@ -33786,6 +33810,7 @@
- [kennetham/cve_2016_0728](https://github.com/kennetham/cve_2016_0728)
- [nardholio/cve-2016-0728](https://github.com/nardholio/cve-2016-0728)
- [googleweb/CVE-2016-0728](https://github.com/googleweb/CVE-2016-0728)
- [neuschaefer/cve-2016-0728-testbed](https://github.com/neuschaefer/cve-2016-0728-testbed)
- [bittorrent3389/cve-2016-0728](https://github.com/bittorrent3389/cve-2016-0728)
- [sibilleg/exploit_cve-2016-0728](https://github.com/sibilleg/exploit_cve-2016-0728)
- [hal0taso/CVE-2016-0728](https://github.com/hal0taso/CVE-2016-0728)
@ -33846,6 +33871,7 @@
</code>
- [secmob/CVE-2016-0846](https://github.com/secmob/CVE-2016-0846)
- [b0b0505/CVE-2016-0846-PoC](https://github.com/b0b0505/CVE-2016-0846-PoC)
### CVE-2016-0974 (2016-02-10)
@ -33976,6 +34002,13 @@
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
### CVE-2016-2118 (2016-04-12)
<code>The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka &quot;BADLOCK.&quot;
</code>
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
### CVE-2016-2173 (2017-04-21)
<code>org.springframework.core.serializer.DefaultDeserializer in Spring AMQP before 1.5.5 allows remote attackers to execute arbitrary code.
@ -34097,6 +34130,13 @@
- [mxypoo/CVE-2016-3116-DropbearSSH](https://github.com/mxypoo/CVE-2016-3116-DropbearSSH)
### CVE-2016-3141 (2016-03-31)
<code>Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
</code>
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
### CVE-2016-3238 (2016-07-12)
<code>The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka &quot;Windows Print Spooler Remote Code Execution Vulnerability.&quot;