Auto Update 2024/03/29 18:27:25

This commit is contained in:
motikan2010-bot 2024-03-30 03:27:25 +09:00
parent 7d8afa1024
commit c3a0e96eac
35 changed files with 208 additions and 297 deletions

View file

@ -58,35 +58,5 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 779015110,
"name": "vuln-rabilit-windows7",
"full_name": "chefphenix25\/vuln-rabilit-windows7",
"owner": {
"login": "chefphenix25",
"id": 165333165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
"html_url": "https:\/\/github.com\/chefphenix25"
},
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
"fork": false,
"created_at": "2024-03-28T21:38:08Z",
"updated_at": "2024-03-28T21:38:08Z",
"pushed_at": "2024-03-28T21:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -28,35 +28,5 @@
"watchers": 2, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
},
{
"id": 779015110,
"name": "vuln-rabilit-windows7",
"full_name": "chefphenix25\/vuln-rabilit-windows7",
"owner": {
"login": "chefphenix25",
"id": 165333165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
"html_url": "https:\/\/github.com\/chefphenix25"
},
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
"fork": false,
"created_at": "2024-03-28T21:38:08Z",
"updated_at": "2024-03-28T21:38:08Z",
"pushed_at": "2024-03-28T21:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -1,32 +0,0 @@
[
{
"id": 779015110,
"name": "vuln-rabilit-windows7",
"full_name": "chefphenix25\/vuln-rabilit-windows7",
"owner": {
"login": "chefphenix25",
"id": 165333165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
"html_url": "https:\/\/github.com\/chefphenix25"
},
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
"fork": false,
"created_at": "2024-03-28T21:38:08Z",
"updated_at": "2024-03-28T21:38:08Z",
"pushed_at": "2024-03-28T21:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -91,35 +91,5 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
},
{
"id": 779015110,
"name": "vuln-rabilit-windows7",
"full_name": "chefphenix25\/vuln-rabilit-windows7",
"owner": {
"login": "chefphenix25",
"id": 165333165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
"html_url": "https:\/\/github.com\/chefphenix25"
},
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
"fork": false,
"created_at": "2024-03-28T21:38:08Z",
"updated_at": "2024-03-28T21:38:08Z",
"pushed_at": "2024-03-28T21:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -118,35 +118,5 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 779015110,
"name": "vuln-rabilit-windows7",
"full_name": "chefphenix25\/vuln-rabilit-windows7",
"owner": {
"login": "chefphenix25",
"id": 165333165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
"html_url": "https:\/\/github.com\/chefphenix25"
},
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
"fork": false,
"created_at": "2024-03-28T21:38:08Z",
"updated_at": "2024-03-28T21:38:08Z",
"pushed_at": "2024-03-28T21:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -295,8 +295,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2017-03-11T10:43:16Z", "created_at": "2017-03-11T10:43:16Z",
"updated_at": "2023-04-04T13:04:57Z", "updated_at": "2024-03-29T16:06:15Z",
"pushed_at": "2017-03-24T19:12:10Z", "pushed_at": "2024-03-29T16:06:11Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708", "description": "Proof of concept for CVE-2019-0708",
"fork": false, "fork": false,
"created_at": "2019-05-29T16:53:54Z", "created_at": "2019-05-29T16:53:54Z",
"updated_at": "2024-03-27T20:01:48Z", "updated_at": "2024-03-29T12:23:33Z",
"pushed_at": "2021-12-02T12:00:46Z", "pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1161, "stargazers_count": 1162,
"watchers_count": 1161, "watchers_count": 1162,
"has_discussions": false, "has_discussions": false,
"forks_count": 346, "forks_count": 346,
"allow_forking": true, "allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 346, "forks": 346,
"watchers": 1161, "watchers": 1162,
"score": 0, "score": 0,
"subscribers_count": 68 "subscribers_count": 68
}, },
@ -3107,10 +3107,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7", "description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false, "fork": false,
"created_at": "2020-03-15T19:33:53Z", "created_at": "2020-03-15T19:33:53Z",
"updated_at": "2024-03-26T07:21:56Z", "updated_at": "2024-03-29T12:17:26Z",
"pushed_at": "2022-03-28T04:10:20Z", "pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 118, "stargazers_count": 119,
"watchers_count": 118, "watchers_count": 119,
"has_discussions": false, "has_discussions": false,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
@ -3119,7 +3119,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 118, "watchers": 119,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },
@ -3572,35 +3572,5 @@
"watchers": 1, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 779015110,
"name": "vuln-rabilit-windows7",
"full_name": "chefphenix25\/vuln-rabilit-windows7",
"owner": {
"login": "chefphenix25",
"id": 165333165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/165333165?v=4",
"html_url": "https:\/\/github.com\/chefphenix25"
},
"html_url": "https:\/\/github.com\/chefphenix25\/vuln-rabilit-windows7",
"description": "ecrit un script python de correction de la vulnérabilités windows 7 pour réponse automatique de wazuh: CVE-2017-0143 (MS17-010 - EternalBlue) CVE-2019-0708 (BlueKeep), CVE-2019-1181 \/ CVE-2019-1182 (BlueKeep II), CVE-2015-1701 (MS15-034), CVE-2010-3333 (MS10-092), CVE-2012-0003 (MS12-020), CVE-2017-8759, CVE-2014-4114 ",
"fork": false,
"created_at": "2024-03-28T21:38:08Z",
"updated_at": "2024-03-28T21:38:08Z",
"pushed_at": "2024-03-28T21:38:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).", "description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
"fork": false, "fork": false,
"created_at": "2020-08-27T19:32:07Z", "created_at": "2020-08-27T19:32:07Z",
"updated_at": "2024-01-17T16:02:46Z", "updated_at": "2024-03-29T17:40:16Z",
"pushed_at": "2020-08-27T19:33:42Z", "pushed_at": "2020-08-27T19:33:42Z",
"stargazers_count": 48, "stargazers_count": 49,
"watchers_count": 48, "watchers_count": 49,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 48, "watchers": 49,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -13,10 +13,10 @@
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.", "description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
"fork": false, "fork": false,
"created_at": "2019-02-25T06:38:15Z", "created_at": "2019-02-25T06:38:15Z",
"updated_at": "2023-12-26T02:10:10Z", "updated_at": "2024-03-29T14:08:11Z",
"pushed_at": "2019-03-18T01:20:52Z", "pushed_at": "2019-03-18T01:20:52Z",
"stargazers_count": 72, "stargazers_count": 73,
"watchers_count": 72, "watchers_count": 73,
"has_discussions": false, "has_discussions": false,
"forks_count": 21, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 21, "forks": 21,
"watchers": 72, "watchers": 73,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation", "description": "PoC for CVE-2020-11896 Treck TCP\/IP stack and device asset investigation",
"fork": false, "fork": false,
"created_at": "2020-07-21T03:38:31Z", "created_at": "2020-07-21T03:38:31Z",
"updated_at": "2024-02-22T13:59:04Z", "updated_at": "2024-03-29T13:07:50Z",
"pushed_at": "2020-09-03T06:37:46Z", "pushed_at": "2020-09-03T06:37:46Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -12529,7 +12529,7 @@
"fork": false, "fork": false,
"created_at": "2024-03-26T18:47:20Z", "created_at": "2024-03-26T18:47:20Z",
"updated_at": "2024-03-26T18:47:20Z", "updated_at": "2024-03-26T18:47:20Z",
"pushed_at": "2024-03-28T16:46:50Z", "pushed_at": "2024-03-29T14:19:32Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.", "description": "A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.",
"fork": false, "fork": false,
"created_at": "2022-03-16T14:42:21Z", "created_at": "2022-03-16T14:42:21Z",
"updated_at": "2024-01-20T09:50:38Z", "updated_at": "2024-03-29T13:23:45Z",
"pushed_at": "2022-03-16T19:51:30Z", "pushed_at": "2022-03-16T19:51:30Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 34, "watchers": 35,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
} }

View file

@ -13,10 +13,10 @@
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
"fork": false, "fork": false,
"created_at": "2022-10-13T14:24:12Z", "created_at": "2022-10-13T14:24:12Z",
"updated_at": "2024-03-25T19:29:35Z", "updated_at": "2024-03-29T15:39:57Z",
"pushed_at": "2022-10-13T15:25:00Z", "pushed_at": "2022-10-13T15:25:00Z",
"stargazers_count": 327, "stargazers_count": 328,
"watchers_count": 327, "watchers_count": 328,
"has_discussions": false, "has_discussions": false,
"forks_count": 100, "forks_count": 100,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 100, "forks": 100,
"watchers": 327, "watchers": 328,
"score": 0, "score": 0,
"subscribers_count": 7 "subscribers_count": 7
}, },

View file

@ -13,10 +13,10 @@
"description": "Demo showing Claude Opus does not find CVE-2023-0266", "description": "Demo showing Claude Opus does not find CVE-2023-0266",
"fork": false, "fork": false,
"created_at": "2024-03-10T04:41:34Z", "created_at": "2024-03-10T04:41:34Z",
"updated_at": "2024-03-29T01:41:59Z", "updated_at": "2024-03-29T15:48:29Z",
"pushed_at": "2024-03-19T14:18:20Z", "pushed_at": "2024-03-19T14:18:20Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 10, "watchers": 11,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -193,10 +193,10 @@
"description": "Vulnerabilities Exploitation On Ubuntu 22.04", "description": "Vulnerabilities Exploitation On Ubuntu 22.04",
"fork": false, "fork": false,
"created_at": "2023-05-16T10:26:10Z", "created_at": "2023-05-16T10:26:10Z",
"updated_at": "2024-03-26T08:08:28Z", "updated_at": "2024-03-29T15:56:57Z",
"pushed_at": "2023-05-16T10:49:19Z", "pushed_at": "2023-05-16T10:49:19Z",
"stargazers_count": 25, "stargazers_count": 26,
"watchers_count": 25, "watchers_count": 26,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -207,7 +207,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 25, "watchers": 26,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -178,13 +178,13 @@
"stargazers_count": 340, "stargazers_count": 340,
"watchers_count": 340, "watchers_count": 340,
"has_discussions": false, "has_discussions": false,
"forks_count": 63, "forks_count": 62,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 63, "forks": 62,
"watchers": 340, "watchers": 340,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5

View file

@ -18,7 +18,7 @@
"stargazers_count": 31, "stargazers_count": 31,
"watchers_count": 31, "watchers_count": 31,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -27,7 +27,7 @@
"minio" "minio"
], ],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 31, "watchers": 31,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-34152", "description": "CVE-2023-34152",
"fork": false, "fork": false,
"created_at": "2023-09-27T03:37:25Z", "created_at": "2023-09-27T03:37:25Z",
"updated_at": "2024-03-14T20:52:59Z", "updated_at": "2024-03-29T17:38:43Z",
"pushed_at": "2023-09-27T03:41:30Z", "pushed_at": "2023-09-27T03:41:30Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -180,5 +180,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 779303130,
"name": "CVE-2023-35078",
"full_name": "0nsec\/CVE-2023-35078",
"owner": {
"login": "0nsec",
"id": 99223413,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99223413?v=4",
"html_url": "https:\/\/github.com\/0nsec"
},
"html_url": "https:\/\/github.com\/0nsec\/CVE-2023-35078",
"description": "CVE-2023-35078 Remote Unauthenticated API Access vulnerability has been discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. ",
"fork": false,
"created_at": "2024-03-29T14:15:49Z",
"updated_at": "2024-03-29T14:45:31Z",
"pushed_at": "2024-03-29T14:41:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.", "description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.",
"fork": false, "fork": false,
"created_at": "2024-03-26T11:01:54Z", "created_at": "2024-03-26T11:01:54Z",
"updated_at": "2024-03-26T11:03:30Z", "updated_at": "2024-03-29T16:19:38Z",
"pushed_at": "2024-03-26T17:16:23Z", "pushed_at": "2024-03-26T17:16:23Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-29T11:39:09Z", "updated_at": "2024-03-29T17:37:37Z",
"pushed_at": "2024-03-27T18:25:56Z", "pushed_at": "2024-03-29T13:34:43Z",
"stargazers_count": 233, "stargazers_count": 242,
"watchers_count": 233, "watchers_count": 242,
"has_discussions": false, "has_discussions": false,
"forks_count": 40, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 40, "forks": 42,
"watchers": 233, "watchers": 242,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -43,10 +43,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具", "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false, "fork": false,
"created_at": "2023-10-27T05:57:21Z", "created_at": "2023-10-27T05:57:21Z",
"updated_at": "2024-03-28T01:59:25Z", "updated_at": "2024-03-29T15:19:35Z",
"pushed_at": "2024-01-29T02:28:11Z", "pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 196, "stargazers_count": 197,
"watchers_count": 196, "watchers_count": 197,
"has_discussions": false, "has_discussions": false,
"forks_count": 25, "forks_count": 25,
"allow_forking": true, "allow_forking": true,
@ -55,7 +55,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 25, "forks": 25,
"watchers": 196, "watchers": 197,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -13,10 +13,10 @@
"description": "Fortinet FortiClient EMS SQL Injection", "description": "Fortinet FortiClient EMS SQL Injection",
"fork": false, "fork": false,
"created_at": "2024-03-18T20:50:48Z", "created_at": "2024-03-18T20:50:48Z",
"updated_at": "2024-03-29T03:33:46Z", "updated_at": "2024-03-29T15:40:30Z",
"pushed_at": "2024-03-20T20:42:41Z", "pushed_at": "2024-03-20T20:42:41Z",
"stargazers_count": 25, "stargazers_count": 26,
"watchers_count": 25, "watchers_count": 26,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 25, "watchers": 26,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -13,10 +13,10 @@
"description": "Authentication Bypass in GoAnywhere MFT", "description": "Authentication Bypass in GoAnywhere MFT",
"fork": false, "fork": false,
"created_at": "2024-01-23T20:16:14Z", "created_at": "2024-01-23T20:16:14Z",
"updated_at": "2024-03-20T08:55:32Z", "updated_at": "2024-03-29T14:34:35Z",
"pushed_at": "2024-01-23T20:33:30Z", "pushed_at": "2024-01-23T20:33:30Z",
"stargazers_count": 58, "stargazers_count": 59,
"watchers_count": 58, "watchers_count": 59,
"has_discussions": false, "has_discussions": false,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 58, "watchers": 59,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

32
2024/CVE-2024-0582.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 779314046,
"name": "io_uring_LPE-CVE-2024-0582",
"full_name": "ysanatomic\/io_uring_LPE-CVE-2024-0582",
"owner": {
"login": "ysanatomic",
"id": 41269324,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
"html_url": "https:\/\/github.com\/ysanatomic"
},
"html_url": "https:\/\/github.com\/ysanatomic\/io_uring_LPE-CVE-2024-0582",
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-03-29T16:31:36Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false, "fork": false,
"created_at": "2024-03-20T21:16:41Z", "created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-03-29T12:29:47Z", "updated_at": "2024-03-29T18:25:20Z",
"pushed_at": "2024-03-27T09:22:28Z", "pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 730, "stargazers_count": 792,
"watchers_count": 730, "watchers_count": 792,
"has_discussions": false, "has_discussions": false,
"forks_count": 79, "forks_count": 85,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 79, "forks": 85,
"watchers": 730, "watchers": 792,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.", "description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
"fork": false, "fork": false,
"created_at": "2024-03-29T04:11:06Z", "created_at": "2024-03-29T04:11:06Z",
"updated_at": "2024-03-29T09:27:39Z", "updated_at": "2024-03-29T17:44:55Z",
"pushed_at": "2024-03-29T04:31:31Z", "pushed_at": "2024-03-29T04:31:31Z",
"stargazers_count": 1, "stargazers_count": 4,
"watchers_count": 1, "watchers_count": 4,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 4,
"score": 0, "score": 0,
"subscribers_count": 0 "subscribers_count": 0
} }

View file

@ -13,19 +13,19 @@
"description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.", "description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.",
"fork": false, "fork": false,
"created_at": "2024-03-24T07:53:52Z", "created_at": "2024-03-24T07:53:52Z",
"updated_at": "2024-03-24T07:56:54Z", "updated_at": "2024-03-29T12:55:04Z",
"pushed_at": "2024-03-24T08:00:24Z", "pushed_at": "2024-03-24T08:00:24Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 1,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -108,13 +108,13 @@
"stargazers_count": 71, "stargazers_count": 71,
"watchers_count": 71, "watchers_count": 71,
"has_discussions": false, "has_discussions": false,
"forks_count": 12, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 13,
"watchers": 71, "watchers": 71,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4", "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false, "fork": false,
"created_at": "2024-03-06T03:15:03Z", "created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-03-26T07:59:38Z", "updated_at": "2024-03-29T13:25:37Z",
"pushed_at": "2024-03-11T07:57:40Z", "pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 108, "stargazers_count": 109,
"watchers_count": 108, "watchers_count": 109,
"has_discussions": false, "has_discussions": false,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
@ -98,7 +98,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 108, "watchers": 109,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2024-02-24T19:21:00Z", "created_at": "2024-02-24T19:21:00Z",
"updated_at": "2024-03-05T14:45:29Z", "updated_at": "2024-03-05T14:45:29Z",
"pushed_at": "2024-02-24T19:53:47Z", "pushed_at": "2024-03-29T17:01:41Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux", "description": "WallEscape vulnerability in util-linux",
"fork": false, "fork": false,
"created_at": "2024-03-11T00:15:03Z", "created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-03-29T11:34:25Z", "updated_at": "2024-03-29T14:19:04Z",
"pushed_at": "2024-03-12T00:28:14Z", "pushed_at": "2024-03-12T00:28:14Z",
"stargazers_count": 16, "stargazers_count": 18,
"watchers_count": 16, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 16, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,19 +13,19 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)", "description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false, "fork": false,
"created_at": "2024-03-11T10:14:39Z", "created_at": "2024-03-11T10:14:39Z",
"updated_at": "2024-03-29T10:11:09Z", "updated_at": "2024-03-29T16:23:57Z",
"pushed_at": "2024-03-25T12:56:16Z", "pushed_at": "2024-03-25T12:56:16Z",
"stargazers_count": 42, "stargazers_count": 46,
"watchers_count": 42, "watchers_count": 46,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 9,
"watchers": 42, "watchers": 46,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

32
2024/CVE-2024-3094.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 779364261,
"name": "CVE-2024-3094-info",
"full_name": "byinarie\/CVE-2024-3094-info",
"owner": {
"login": "byinarie",
"id": 20119926,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20119926?v=4",
"html_url": "https:\/\/github.com\/byinarie"
},
"html_url": "https:\/\/github.com\/byinarie\/CVE-2024-3094-info",
"description": "Information for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-03-29T17:06:14Z",
"pushed_at": "2024-03-29T18:25:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -25,6 +25,13 @@
- [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204) - [m-cetin/CVE-2024-0204](https://github.com/m-cetin/CVE-2024-0204)
- [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204) - [adminlove520/CVE-2024-0204](https://github.com/adminlove520/CVE-2024-0204)
### CVE-2024-0582 (2024-01-16)
<code>A memory leak flaw was found in the Linux kernels io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
</code>
- [ysanatomic/io_uring_LPE-CVE-2024-0582](https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582)
### CVE-2024-0679 (2024-01-20) ### CVE-2024-0679 (2024-01-20)
<code>The ColorMag theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the plugin_action_callback() function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to install and activate arbitrary plugins. <code>The ColorMag theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the plugin_action_callback() function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to install and activate arbitrary plugins.
@ -188,6 +195,9 @@
### CVE-2024-2432 ### CVE-2024-2432
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP) - [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
### CVE-2024-3094
- [byinarie/CVE-2024-3094-info](https://github.com/byinarie/CVE-2024-3094-info)
### CVE-2024-12883 ### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -5051,6 +5061,7 @@
- [synfinner/CVE-2023-35078](https://github.com/synfinner/CVE-2023-35078) - [synfinner/CVE-2023-35078](https://github.com/synfinner/CVE-2023-35078)
- [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit) - [emanueldosreis/nmap-CVE-2023-35078-Exploit](https://github.com/emanueldosreis/nmap-CVE-2023-35078-Exploit)
- [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078) - [Blue-number/CVE-2023-35078](https://github.com/Blue-number/CVE-2023-35078)
- [0nsec/CVE-2023-35078](https://github.com/0nsec/CVE-2023-35078)
### CVE-2023-35080 (2023-11-14) ### CVE-2023-35080 (2023-11-14)
@ -26617,7 +26628,6 @@
- [Ravaan21/Bluekeep-Hunter](https://github.com/Ravaan21/Bluekeep-Hunter) - [Ravaan21/Bluekeep-Hunter](https://github.com/Ravaan21/Bluekeep-Hunter)
- [davidfortytwo/bluekeep](https://github.com/davidfortytwo/bluekeep) - [davidfortytwo/bluekeep](https://github.com/davidfortytwo/bluekeep)
- [tranqtruong/Detect-BlueKeep](https://github.com/tranqtruong/Detect-BlueKeep) - [tranqtruong/Detect-BlueKeep](https://github.com/tranqtruong/Detect-BlueKeep)
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
### CVE-2019-0709 (2019-06-12) ### CVE-2019-0709 (2019-06-12)
@ -33766,7 +33776,6 @@
- [NatteeSetobol/Etern-blue-Windows-7-Checker](https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker) - [NatteeSetobol/Etern-blue-Windows-7-Checker](https://github.com/NatteeSetobol/Etern-blue-Windows-7-Checker)
- [c0d3cr4f73r/MS17-010_CVE-2017-0143](https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143) - [c0d3cr4f73r/MS17-010_CVE-2017-0143](https://github.com/c0d3cr4f73r/MS17-010_CVE-2017-0143)
- [SampatDhakal/Metasploit-Attack-Report](https://github.com/SampatDhakal/Metasploit-Attack-Report) - [SampatDhakal/Metasploit-Attack-Report](https://github.com/SampatDhakal/Metasploit-Attack-Report)
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
### CVE-2017-0144 (2017-03-16) ### CVE-2017-0144 (2017-03-16)
@ -37520,7 +37529,6 @@
- [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701) - [hfiref0x/CVE-2015-1701](https://github.com/hfiref0x/CVE-2015-1701)
- [Anonymous-Family/CVE-2015-1701](https://github.com/Anonymous-Family/CVE-2015-1701) - [Anonymous-Family/CVE-2015-1701](https://github.com/Anonymous-Family/CVE-2015-1701)
- [Anonymous-Family/CVE-2015-1701-download](https://github.com/Anonymous-Family/CVE-2015-1701-download) - [Anonymous-Family/CVE-2015-1701-download](https://github.com/Anonymous-Family/CVE-2015-1701-download)
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
### CVE-2015-1769 (2015-08-14) ### CVE-2015-1769 (2015-08-14)
@ -38639,13 +38647,6 @@
- [sam-b/CVE-2014-4113](https://github.com/sam-b/CVE-2014-4113) - [sam-b/CVE-2014-4113](https://github.com/sam-b/CVE-2014-4113)
- [wikiZ/cve-2014-4113](https://github.com/wikiZ/cve-2014-4113) - [wikiZ/cve-2014-4113](https://github.com/wikiZ/cve-2014-4113)
### CVE-2014-4114 (2014-10-15)
<code>Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a &quot;Sandworm&quot; attack in June through October 2014, aka &quot;Windows OLE Remote Code Execution Vulnerability.&quot;
</code>
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
### CVE-2014-4140 (2014-10-15) ### CVE-2014-4140 (2014-10-15)
<code>Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka &quot;Internet Explorer ASLR Bypass Vulnerability.&quot; <code>Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka &quot;Internet Explorer ASLR Bypass Vulnerability.&quot;
@ -39503,7 +39504,6 @@
</code> </code>
- [k0keoyo/CVE-2012-0003_eXP](https://github.com/k0keoyo/CVE-2012-0003_eXP) - [k0keoyo/CVE-2012-0003_eXP](https://github.com/k0keoyo/CVE-2012-0003_eXP)
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
### CVE-2012-0056 (2012-01-27) ### CVE-2012-0056 (2012-01-27)
@ -40062,7 +40062,6 @@
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333) - [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
- [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction) - [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction)
- [chefphenix25/vuln-rabilit-windows7](https://github.com/chefphenix25/vuln-rabilit-windows7)
### CVE-2010-3490 (2010-09-28) ### CVE-2010-3490 (2010-09-28)