mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2024/03/29 18:27:25
This commit is contained in:
parent
7d8afa1024
commit
c3a0e96eac
35 changed files with 208 additions and 297 deletions
2010
2012
2014
2015
2017
2019
2020
2021
2022
2023
CVE-2023-0266.jsonCVE-2023-0386.jsonCVE-2023-23397.jsonCVE-2023-28432.jsonCVE-2023-34152.jsonCVE-2023-35078.jsonCVE-2023-42931.jsonCVE-2023-45866.jsonCVE-2023-46604.jsonCVE-2023-48788.json
2024
CVE-2024-0204.jsonCVE-2024-0582.jsonCVE-2024-1086.jsonCVE-2024-1698.jsonCVE-2024-2169.jsonCVE-2024-21762.jsonCVE-2024-27198.jsonCVE-2024-27619.jsonCVE-2024-28085.jsonCVE-2024-29059.jsonCVE-2024-3094.json
README.md
|
@ -58,35 +58,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 779015110,
|
||||
"name": "vuln-rabilit-windows7",
|
||||
"full_name": "chefphenix25\/vuln-rabilit-windows7",
|
||||
"owner": {
|
||||
"login": "chefphenix25",
|
||||
"id": 165333165,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
|
||||
"html_url": "https:\/\/github.com\/chefphenix25"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
|
||||
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:38:08Z",
|
||||
"updated_at": "2024-03-28T21:38:08Z",
|
||||
"pushed_at": "2024-03-28T21:38:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -28,35 +28,5 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 779015110,
|
||||
"name": "vuln-rabilit-windows7",
|
||||
"full_name": "chefphenix25\/vuln-rabilit-windows7",
|
||||
"owner": {
|
||||
"login": "chefphenix25",
|
||||
"id": 165333165,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
|
||||
"html_url": "https:\/\/github.com\/chefphenix25"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
|
||||
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:38:08Z",
|
||||
"updated_at": "2024-03-28T21:38:08Z",
|
||||
"pushed_at": "2024-03-28T21:38:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 779015110,
|
||||
"name": "vuln-rabilit-windows7",
|
||||
"full_name": "chefphenix25\/vuln-rabilit-windows7",
|
||||
"owner": {
|
||||
"login": "chefphenix25",
|
||||
"id": 165333165,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
|
||||
"html_url": "https:\/\/github.com\/chefphenix25"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
|
||||
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:38:08Z",
|
||||
"updated_at": "2024-03-28T21:38:08Z",
|
||||
"pushed_at": "2024-03-28T21:38:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -91,35 +91,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 779015110,
|
||||
"name": "vuln-rabilit-windows7",
|
||||
"full_name": "chefphenix25\/vuln-rabilit-windows7",
|
||||
"owner": {
|
||||
"login": "chefphenix25",
|
||||
"id": 165333165,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
|
||||
"html_url": "https:\/\/github.com\/chefphenix25"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
|
||||
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:38:08Z",
|
||||
"updated_at": "2024-03-28T21:38:08Z",
|
||||
"pushed_at": "2024-03-28T21:38:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -118,35 +118,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 779015110,
|
||||
"name": "vuln-rabilit-windows7",
|
||||
"full_name": "chefphenix25\/vuln-rabilit-windows7",
|
||||
"owner": {
|
||||
"login": "chefphenix25",
|
||||
"id": 165333165,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
|
||||
"html_url": "https:\/\/github.com\/chefphenix25"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
|
||||
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:38:08Z",
|
||||
"updated_at": "2024-03-28T21:38:08Z",
|
||||
"pushed_at": "2024-03-28T21:38:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -295,8 +295,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2017-03-11T10:43:16Z",
|
||||
"updated_at": "2023-04-04T13:04:57Z",
|
||||
"pushed_at": "2017-03-24T19:12:10Z",
|
||||
"updated_at": "2024-03-29T16:06:15Z",
|
||||
"pushed_at": "2024-03-29T16:06:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1841,10 +1841,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2024-03-27T20:01:48Z",
|
||||
"updated_at": "2024-03-29T12:23:33Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1161,
|
||||
"watchers_count": 1161,
|
||||
"stargazers_count": 1162,
|
||||
"watchers_count": 1162,
|
||||
"has_discussions": false,
|
||||
"forks_count": 346,
|
||||
"allow_forking": true,
|
||||
|
@ -1853,7 +1853,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 346,
|
||||
"watchers": 1161,
|
||||
"watchers": 1162,
|
||||
"score": 0,
|
||||
"subscribers_count": 68
|
||||
},
|
||||
|
@ -3107,10 +3107,10 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-15T19:33:53Z",
|
||||
"updated_at": "2024-03-26T07:21:56Z",
|
||||
"updated_at": "2024-03-29T12:17:26Z",
|
||||
"pushed_at": "2022-03-28T04:10:20Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -3119,7 +3119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -3572,35 +3572,5 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 779015110,
|
||||
"name": "vuln-rabilit-windows7",
|
||||
"full_name": "chefphenix25\/vuln-rabilit-windows7",
|
||||
"owner": {
|
||||
"login": "chefphenix25",
|
||||
"id": 165333165,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
|
||||
"html_url": "https:\/\/github.com\/chefphenix25"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
|
||||
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-28T21:38:08Z",
|
||||
"updated_at": "2024-03-28T21:38:08Z",
|
||||
"pushed_at": "2024-03-28T21:38:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-27T19:32:07Z",
|
||||
"updated_at": "2024-01-17T16:02:46Z",
|
||||
"updated_at": "2024-03-29T17:40:16Z",
|
||||
"pushed_at": "2020-08-27T19:33:42Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-25T06:38:15Z",
|
||||
"updated_at": "2023-12-26T02:10:10Z",
|
||||
"updated_at": "2024-03-29T14:08:11Z",
|
||||
"pushed_at": "2019-03-18T01:20:52Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T03:38:31Z",
|
||||
"updated_at": "2024-02-22T13:59:04Z",
|
||||
"updated_at": "2024-03-29T13:07:50Z",
|
||||
"pushed_at": "2020-09-03T06:37:46Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -12529,7 +12529,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-03-26T18:47:20Z",
|
||||
"updated_at": "2024-03-26T18:47:20Z",
|
||||
"pushed_at": "2024-03-28T16:46:50Z",
|
||||
"pushed_at": "2024-03-29T14:19:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T14:42:21Z",
|
||||
"updated_at": "2024-01-20T09:50:38Z",
|
||||
"updated_at": "2024-03-29T13:23:45Z",
|
||||
"pushed_at": "2022-03-16T19:51:30Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2024-03-25T19:29:35Z",
|
||||
"updated_at": "2024-03-29T15:39:57Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Demo showing Claude Opus does not find CVE-2023-0266",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-10T04:41:34Z",
|
||||
"updated_at": "2024-03-29T01:41:59Z",
|
||||
"updated_at": "2024-03-29T15:48:29Z",
|
||||
"pushed_at": "2024-03-19T14:18:20Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "Vulnerabilities Exploitation On Ubuntu 22.04",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T10:26:10Z",
|
||||
"updated_at": "2024-03-26T08:08:28Z",
|
||||
"updated_at": "2024-03-29T15:56:57Z",
|
||||
"pushed_at": "2023-05-16T10:49:19Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -207,7 +207,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -178,13 +178,13 @@
|
|||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 62,
|
||||
"watchers": 340,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
"minio"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-34152",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-27T03:37:25Z",
|
||||
"updated_at": "2024-03-14T20:52:59Z",
|
||||
"updated_at": "2024-03-29T17:38:43Z",
|
||||
"pushed_at": "2023-09-27T03:41:30Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -180,5 +180,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 779303130,
|
||||
"name": "CVE-2023-35078",
|
||||
"full_name": "0nsec\/CVE-2023-35078",
|
||||
"owner": {
|
||||
"login": "0nsec",
|
||||
"id": 99223413,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99223413?v=4",
|
||||
"html_url": "https:\/\/github.com\/0nsec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0nsec\/CVE-2023-35078",
|
||||
"description": "CVE-2023-35078 Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T14:15:49Z",
|
||||
"updated_at": "2024-03-29T14:45:31Z",
|
||||
"pushed_at": "2024-03-29T14:41:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-26T11:01:54Z",
|
||||
"updated_at": "2024-03-26T11:03:30Z",
|
||||
"updated_at": "2024-03-29T16:19:38Z",
|
||||
"pushed_at": "2024-03-26T17:16:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-03-29T11:39:09Z",
|
||||
"pushed_at": "2024-03-27T18:25:56Z",
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"updated_at": "2024-03-29T17:37:37Z",
|
||||
"pushed_at": "2024-03-29T13:34:43Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 233,
|
||||
"forks": 42,
|
||||
"watchers": 242,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2024-03-28T01:59:25Z",
|
||||
"updated_at": "2024-03-29T15:19:35Z",
|
||||
"pushed_at": "2024-01-29T02:28:11Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 196,
|
||||
"watchers": 197,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Fortinet FortiClient EMS SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T20:50:48Z",
|
||||
"updated_at": "2024-03-29T03:33:46Z",
|
||||
"updated_at": "2024-03-29T15:40:30Z",
|
||||
"pushed_at": "2024-03-20T20:42:41Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Authentication Bypass in GoAnywhere MFT",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-23T20:16:14Z",
|
||||
"updated_at": "2024-03-20T08:55:32Z",
|
||||
"updated_at": "2024-03-29T14:34:35Z",
|
||||
"pushed_at": "2024-01-23T20:33:30Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
32
2024/CVE-2024-0582.json
Normal file
32
2024/CVE-2024-0582.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 779314046,
|
||||
"name": "io_uring_LPE-CVE-2024-0582",
|
||||
"full_name": "ysanatomic\/io_uring_LPE-CVE-2024-0582",
|
||||
"owner": {
|
||||
"login": "ysanatomic",
|
||||
"id": 41269324,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
|
||||
"html_url": "https:\/\/github.com\/ysanatomic"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ysanatomic\/io_uring_LPE-CVE-2024-0582",
|
||||
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T14:45:22Z",
|
||||
"updated_at": "2024-03-29T16:31:36Z",
|
||||
"pushed_at": "2024-03-29T16:05:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-03-29T12:29:47Z",
|
||||
"updated_at": "2024-03-29T18:25:20Z",
|
||||
"pushed_at": "2024-03-27T09:22:28Z",
|
||||
"stargazers_count": 730,
|
||||
"watchers_count": 730,
|
||||
"stargazers_count": 792,
|
||||
"watchers_count": 792,
|
||||
"has_discussions": false,
|
||||
"forks_count": 79,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 730,
|
||||
"forks": 85,
|
||||
"watchers": 792,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T04:11:06Z",
|
||||
"updated_at": "2024-03-29T09:27:39Z",
|
||||
"updated_at": "2024-03-29T17:44:55Z",
|
||||
"pushed_at": "2024-03-29T04:31:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-24T07:53:52Z",
|
||||
"updated_at": "2024-03-24T07:56:54Z",
|
||||
"updated_at": "2024-03-29T12:55:04Z",
|
||||
"pushed_at": "2024-03-24T08:00:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-06T03:15:03Z",
|
||||
"updated_at": "2024-03-26T07:59:38Z",
|
||||
"updated_at": "2024-03-29T13:25:37Z",
|
||||
"pushed_at": "2024-03-11T07:57:40Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -98,7 +98,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-02-24T19:21:00Z",
|
||||
"updated_at": "2024-03-05T14:45:29Z",
|
||||
"pushed_at": "2024-02-24T19:53:47Z",
|
||||
"pushed_at": "2024-03-29T17:01:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WallEscape vulnerability in util-linux",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T00:15:03Z",
|
||||
"updated_at": "2024-03-29T11:34:25Z",
|
||||
"updated_at": "2024-03-29T14:19:04Z",
|
||||
"pushed_at": "2024-03-12T00:28:14Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 16,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T10:14:39Z",
|
||||
"updated_at": "2024-03-29T10:11:09Z",
|
||||
"updated_at": "2024-03-29T16:23:57Z",
|
||||
"pushed_at": "2024-03-25T12:56:16Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 42,
|
||||
"forks": 9,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
32
2024/CVE-2024-3094.json
Normal file
32
2024/CVE-2024-3094.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 779364261,
|
||||
"name": "CVE-2024-3094-info",
|
||||
"full_name": "byinarie\/CVE-2024-3094-info",
|
||||
"owner": {
|
||||
"login": "byinarie",
|
||||
"id": 20119926,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20119926?v=4",
|
||||
"html_url": "https:\/\/github.com\/byinarie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/byinarie\/CVE-2024-3094-info",
|
||||
"description": "Information for CVE-2024-3094",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-29T17:03:01Z",
|
||||
"updated_at": "2024-03-29T17:06:14Z",
|
||||
"pushed_at": "2024-03-29T18:25:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -25,6 +25,13 @@
|
|||
- [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204)
|
||||
- [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204)
|
||||
|
||||
### CVE-2024-0582 (2024-01-16)
|
||||
|
||||
<code>A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
|
||||
</code>
|
||||
|
||||
- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
|
||||
|
||||
### CVE-2024-0679 (2024-01-20)
|
||||
|
||||
<code>The ColorMag theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the plugin_action_callback() function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to install and activate arbitrary plugins.
|
||||
|
@ -188,6 +195,9 @@
|
|||
### CVE-2024-2432
|
||||
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
|
||||
|
||||
### CVE-2024-3094
|
||||
- [byinarie/CVE-2024-3094-info](https://github.com/byinarie/CVE-2024-3094-info)
|
||||
|
||||
### CVE-2024-12883
|
||||
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
|
||||
|
||||
|
@ -5051,6 +5061,7 @@
|
|||
- [synfinner/CVE-2023-35078](https://github.com/synfinner/CVE-2023-35078)
|
||||
- [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit)
|
||||
- [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078)
|
||||
- [0nsec/CVE-2023-35078](https://github.com/0nsec/CVE-2023-35078)
|
||||
|
||||
### CVE-2023-35080 (2023-11-14)
|
||||
|
||||
|
@ -26617,7 +26628,6 @@
|
|||
- [Ravaan21/Bluekeep-Hunter](https://github.com/Ravaan21/Bluekeep-Hunter)
|
||||
- [davidfortytwo/bluekeep](https://github.com/davidfortytwo/bluekeep)
|
||||
- [tranqtruong/Detect-BlueKeep](https://github.com/tranqtruong/Detect-BlueKeep)
|
||||
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
|
||||
|
||||
### CVE-2019-0709 (2019-06-12)
|
||||
|
||||
|
@ -33766,7 +33776,6 @@
|
|||
- [NatteeSetobol/Etern-blue-Windows-7-Checker](https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker)
|
||||
- [c0d3cr4f73r/MS17-010_CVE-2017-0143](https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143)
|
||||
- [SampatDhakal/Metasploit-Attack-Report](https://github.com/SampatDhakal/Metasploit-Attack-Report)
|
||||
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
|
||||
|
||||
### CVE-2017-0144 (2017-03-16)
|
||||
|
||||
|
@ -37520,7 +37529,6 @@
|
|||
- [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701)
|
||||
- [Anonymous-Family/CVE-2015-1701](https://github.com/Anonymous-Family/CVE-2015-1701)
|
||||
- [Anonymous-Family/CVE-2015-1701-download](https://github.com/Anonymous-Family/CVE-2015-1701-download)
|
||||
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
|
||||
|
||||
### CVE-2015-1769 (2015-08-14)
|
||||
|
||||
|
@ -38639,13 +38647,6 @@
|
|||
- [sam-b/CVE-2014-4113](https://github.com/sam-b/CVE-2014-4113)
|
||||
- [wikiZ/cve-2014-4113](https://github.com/wikiZ/cve-2014-4113)
|
||||
|
||||
### CVE-2014-4114 (2014-10-15)
|
||||
|
||||
<code>Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
|
||||
</code>
|
||||
|
||||
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
|
||||
|
||||
### CVE-2014-4140 (2014-10-15)
|
||||
|
||||
<code>Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."
|
||||
|
@ -39503,7 +39504,6 @@
|
|||
</code>
|
||||
|
||||
- [k0keoyo/CVE-2012-0003_eXP](https://github.com/k0keoyo/CVE-2012-0003_eXP)
|
||||
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
|
||||
|
||||
### CVE-2012-0056 (2012-01-27)
|
||||
|
||||
|
@ -40062,7 +40062,6 @@
|
|||
|
||||
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
|
||||
- [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction)
|
||||
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
|
||||
|
||||
### CVE-2010-3490 (2010-09-28)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue