mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/06/28 06:29:09
This commit is contained in:
parent
ad6e6cadc7
commit
fb68245342
70 changed files with 791 additions and 217 deletions
|
@ -33,5 +33,35 @@
|
|||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 421212210,
|
||||
"name": "cve-2000-0649",
|
||||
"full_name": "stevenvegar\/cve-2000-0649",
|
||||
"owner": {
|
||||
"login": "stevenvegar",
|
||||
"id": 70730301,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4",
|
||||
"html_url": "https:\/\/github.com\/stevenvegar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649",
|
||||
"description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T23:14:04Z",
|
||||
"updated_at": "2021-12-17T07:02:21Z",
|
||||
"pushed_at": "2021-10-25T23:32:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -2,18 +2,18 @@
|
|||
{
|
||||
"id": 621193423,
|
||||
"name": "CVE-2009-0824",
|
||||
"full_name": "Exploitables\/CVE-2009-0824",
|
||||
"full_name": "expFlash\/CVE-2009-0824",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2009-0824",
|
||||
"description": "Just another write NULL exploit",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2009-0824",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-30T07:11:50Z",
|
||||
"updated_at": "2023-06-09T08:32:17Z",
|
||||
"updated_at": "2023-06-28T03:36:36Z",
|
||||
"pushed_at": "2023-04-16T03:51:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -2,18 +2,18 @@
|
|||
{
|
||||
"id": 512342338,
|
||||
"name": "CVE-2009-4049",
|
||||
"full_name": "Exploitables\/CVE-2009-4049",
|
||||
"full_name": "expFlash\/CVE-2009-4049",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2009-4049",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2009-4049",
|
||||
"description": "Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-10T04:16:16Z",
|
||||
"updated_at": "2022-07-10T12:44:21Z",
|
||||
"updated_at": "2023-06-28T03:45:28Z",
|
||||
"pushed_at": "2022-07-10T04:18:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 504370912,
|
||||
"name": "CVE-2010-4502",
|
||||
"full_name": "Exploitables\/CVE-2010-4502",
|
||||
"full_name": "expFlash\/CVE-2010-4502",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2010-4502",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2010-4502",
|
||||
"description": "Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T02:39:13Z",
|
||||
|
|
|
@ -29,6 +29,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 29933656,
|
||||
"name": "CVE-2015-0235-cookbook",
|
||||
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
|
||||
"owner": {
|
||||
"login": "mikesplain",
|
||||
"id": 881965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4",
|
||||
"html_url": "https:\/\/github.com\/mikesplain"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
|
||||
"description": "A chef cookbook to test the GHOST vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T20:34:42Z",
|
||||
"updated_at": "2017-09-29T11:32:54Z",
|
||||
"pushed_at": "2015-01-27T21:41:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 29941036,
|
||||
"name": "CVE-2015-0235-test",
|
||||
"full_name": "aaronfay\/CVE-2015-0235-test",
|
||||
"owner": {
|
||||
"login": "aaronfay",
|
||||
"id": 1033941,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1033941?v=4",
|
||||
"html_url": "https:\/\/github.com\/aaronfay"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
|
||||
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-27T23:45:22Z",
|
||||
"updated_at": "2023-03-07T20:55:14Z",
|
||||
"pushed_at": "2015-01-29T03:33:29Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 29942046,
|
||||
"name": "ghost",
|
||||
|
@ -149,6 +209,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 30004399,
|
||||
"name": "cfengine-CVE_2015_0235",
|
||||
"full_name": "nickanderson\/cfengine-CVE_2015_0235",
|
||||
"owner": {
|
||||
"login": "nickanderson",
|
||||
"id": 202896,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
|
||||
"html_url": "https:\/\/github.com\/nickanderson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
|
||||
"description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-29T04:58:54Z",
|
||||
"updated_at": "2016-02-13T01:41:47Z",
|
||||
"pushed_at": "2015-01-29T21:23:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 30008427,
|
||||
"name": "cookbook-update-glibc",
|
||||
"full_name": "koudaiii-archives\/cookbook-update-glibc",
|
||||
"owner": {
|
||||
"login": "koudaiii-archives",
|
||||
"id": 51727289,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51727289?v=4",
|
||||
"html_url": "https:\/\/github.com\/koudaiii-archives"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc",
|
||||
"description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-29T07:14:17Z",
|
||||
"updated_at": "2023-01-28T20:14:16Z",
|
||||
"pushed_at": "2015-01-29T07:38:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 30019912,
|
||||
"name": "ghostbusters15",
|
||||
|
@ -179,6 +299,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 30066365,
|
||||
"name": "CVE-2015-0235",
|
||||
"full_name": "tobyzxj\/CVE-2015-0235",
|
||||
"owner": {
|
||||
"login": "tobyzxj",
|
||||
"id": 4661855,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4",
|
||||
"html_url": "https:\/\/github.com\/tobyzxj"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
|
||||
"description": "glibc gethostbyname bug",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-30T09:58:09Z",
|
||||
"updated_at": "2020-10-17T20:24:46Z",
|
||||
"pushed_at": "2015-01-30T10:02:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 30183649,
|
||||
"name": "CVE-2015-0235-workaround",
|
||||
|
|
|
@ -32,21 +32,21 @@
|
|||
{
|
||||
"id": 506108089,
|
||||
"name": "CVE-2015-2291",
|
||||
"full_name": "Exploitables\/CVE-2015-2291",
|
||||
"full_name": "expFlash\/CVE-2015-2291",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2015-2291",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2015-2291",
|
||||
"description": "(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-22T05:22:57Z",
|
||||
"updated_at": "2023-06-09T08:38:21Z",
|
||||
"updated_at": "2023-06-28T03:35:53Z",
|
||||
"pushed_at": "2023-06-22T19:13:55Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-27T07:54:12Z",
|
||||
"updated_at": "2023-06-28T06:04:55Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1714,
|
||||
"watchers_count": 1714,
|
||||
"stargazers_count": 1715,
|
||||
"watchers_count": 1715,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1714,
|
||||
"watchers": 1715,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -167,10 +167,10 @@
|
|||
"description": "ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T08:40:10Z",
|
||||
"updated_at": "2023-06-27T07:07:11Z",
|
||||
"updated_at": "2023-06-28T01:05:47Z",
|
||||
"pushed_at": "2022-04-02T08:55:07Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -179,7 +179,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -452,7 +452,7 @@
|
|||
"stargazers_count": 748,
|
||||
"watchers_count": 748,
|
||||
"has_discussions": false,
|
||||
"forks_count": 439,
|
||||
"forks_count": 438,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -462,7 +462,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 439,
|
||||
"forks": 438,
|
||||
"watchers": 748,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
|
@ -1150,13 +1150,13 @@
|
|||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"has_discussions": false,
|
||||
"forks_count": 75,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"forks": 74,
|
||||
"watchers": 247,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-27T07:54:12Z",
|
||||
"updated_at": "2023-06-28T06:04:55Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1714,
|
||||
"watchers_count": 1714,
|
||||
"stargazers_count": 1715,
|
||||
"watchers_count": 1715,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -76,7 +76,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1714,
|
||||
"watchers": 1715,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -258,10 +258,10 @@
|
|||
"description": "Simple C# implementation of CVE-2017-8759",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-17T22:05:56Z",
|
||||
"updated_at": "2022-10-15T14:05:47Z",
|
||||
"updated_at": "2023-06-28T00:40:31Z",
|
||||
"pushed_at": "2017-09-17T22:20:36Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -274,7 +274,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -59,6 +59,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
{
|
||||
"id": 153477523,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "hook-s3c\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "hook-s3c",
|
||||
"id": 31825993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
|
||||
"html_url": "https:\/\/github.com\/hook-s3c"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
|
||||
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T15:09:41Z",
|
||||
"updated_at": "2021-12-05T20:25:44Z",
|
||||
"pushed_at": "2018-10-17T15:09:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153506738,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "kn6869610\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "kn6869610",
|
||||
"id": 6917744,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
|
||||
"html_url": "https:\/\/github.com\/kn6869610"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
|
||||
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T18:44:05Z",
|
||||
"updated_at": "2021-12-05T20:25:52Z",
|
||||
"pushed_at": "2018-10-17T18:45:30Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153534574,
|
||||
"name": "libssh-scanner",
|
||||
|
@ -89,6 +149,101 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
{
|
||||
"id": 153562229,
|
||||
"name": "CVE-2018-10933_ssh",
|
||||
"full_name": "likescam\/CVE-2018-10933_ssh",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T04:10:25Z",
|
||||
"updated_at": "2021-12-05T20:26:01Z",
|
||||
"pushed_at": "2018-10-18T04:10:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153598283,
|
||||
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"owner": {
|
||||
"login": "likescam",
|
||||
"id": 2469038,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
||||
"html_url": "https:\/\/github.com\/likescam"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T09:27:08Z",
|
||||
"updated_at": "2021-12-05T20:26:14Z",
|
||||
"pushed_at": "2018-10-18T09:27:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153643745,
|
||||
"name": "hunt-for-cve-2018-10933",
|
||||
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"owner": {
|
||||
"login": "marco-lancini",
|
||||
"id": 1472968,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
|
||||
"html_url": "https:\/\/github.com\/marco-lancini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
|
||||
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-18T15:08:25Z",
|
||||
"updated_at": "2023-06-20T11:06:21Z",
|
||||
"pushed_at": "2018-10-18T15:11:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"elasticsearch",
|
||||
"exploit",
|
||||
"nmap",
|
||||
"pentesting"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153675108,
|
||||
"name": "cve-2018-10933",
|
||||
|
@ -149,6 +304,100 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153855090,
|
||||
"name": "CVE-2018-10933",
|
||||
"full_name": "jas502n\/CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
|
||||
"description": "libssh CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:24:04Z",
|
||||
"updated_at": "2023-05-23T04:45:13Z",
|
||||
"pushed_at": "2018-10-20T00:29:04Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153856713,
|
||||
"name": "cve-2018-10933_poc",
|
||||
"full_name": "ninp0\/cve-2018-10933_poc",
|
||||
"owner": {
|
||||
"login": "ninp0",
|
||||
"id": 1008583,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
|
||||
"html_url": "https:\/\/github.com\/ninp0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
|
||||
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T00:53:24Z",
|
||||
"updated_at": "2018-10-22T15:05:53Z",
|
||||
"pushed_at": "2018-10-20T01:53:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2018-10933",
|
||||
"exploit",
|
||||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 153878160,
|
||||
"name": "CVE-2018-10933_Scanner",
|
||||
"full_name": "pghook\/CVE-2018-10933_Scanner",
|
||||
"owner": {
|
||||
"login": "pghook",
|
||||
"id": 14160529,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
|
||||
"html_url": "https:\/\/github.com\/pghook"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-10-20T06:53:59Z",
|
||||
"updated_at": "2020-05-15T17:20:56Z",
|
||||
"pushed_at": "2018-10-20T04:54:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 153920395,
|
||||
"name": "POC-CVE-2018-10933",
|
||||
|
@ -179,6 +428,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 153975086,
|
||||
"name": "pythonprojects-CVE-2018-10933",
|
||||
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"owner": {
|
||||
"login": "shifa123",
|
||||
"id": 18241082,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
|
||||
"html_url": "https:\/\/github.com\/shifa123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
|
||||
"description": "CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-21T05:01:12Z",
|
||||
"updated_at": "2022-01-03T19:20:42Z",
|
||||
"pushed_at": "2018-10-21T05:13:13Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 154050332,
|
||||
"name": "CVE-2018-10933",
|
||||
|
|
|
@ -664,5 +664,35 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 659564459,
|
||||
"name": "lab",
|
||||
"full_name": "theerachaich\/lab",
|
||||
"owner": {
|
||||
"login": "theerachaich",
|
||||
"id": 72238539,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72238539?v=4",
|
||||
"html_url": "https:\/\/github.com\/theerachaich"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/theerachaich\/lab",
|
||||
"description": "pentesterlab_CVE-2018-11235: Git Submodule RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T05:31:08Z",
|
||||
"updated_at": "2023-06-28T05:31:09Z",
|
||||
"pushed_at": "2023-06-28T05:31:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -59,6 +59,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 152906288,
|
||||
"name": "MikroRoot",
|
||||
"full_name": "syrex1013\/MikroRoot",
|
||||
"owner": {
|
||||
"login": "syrex1013",
|
||||
"id": 31669127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
|
||||
"html_url": "https:\/\/github.com\/syrex1013"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
|
||||
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-13T19:17:42Z",
|
||||
"updated_at": "2021-12-06T20:08:10Z",
|
||||
"pushed_at": "2018-10-14T08:39:24Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 161894724,
|
||||
"name": "CVE-2018-14847",
|
||||
|
|
|
@ -587,10 +587,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-27T07:54:12Z",
|
||||
"updated_at": "2023-06-28T06:04:55Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1714,
|
||||
"watchers_count": 1714,
|
||||
"stargazers_count": 1715,
|
||||
"watchers_count": 1715,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -620,7 +620,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1714,
|
||||
"watchers": 1715,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -149,6 +149,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 151921677,
|
||||
"name": "CVE-2018-2893",
|
||||
"full_name": "jas502n\/CVE-2018-2893",
|
||||
"owner": {
|
||||
"login": "jas502n",
|
||||
"id": 16593068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||||
"html_url": "https:\/\/github.com\/jas502n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893",
|
||||
"description": "CVE-2018-2893",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-07T08:41:14Z",
|
||||
"updated_at": "2023-06-02T07:03:04Z",
|
||||
"pushed_at": "2018-10-07T09:53:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 219763712,
|
||||
"name": "CVE-2018-2893",
|
||||
|
|
|
@ -1,19 +1,19 @@
|
|||
[
|
||||
{
|
||||
"id": 508145181,
|
||||
"name": "CVE-2018-3990-TALOS-2018-0658",
|
||||
"full_name": "Exploitables\/CVE-2018-3990-TALOS-2018-0658",
|
||||
"name": "CVE-2018-3990",
|
||||
"full_name": "expFlash\/CVE-2018-3990",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2018-3990-TALOS-2018-0658",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2018-3990",
|
||||
"description": "An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-28T03:48:09Z",
|
||||
"updated_at": "2023-06-09T08:38:28Z",
|
||||
"updated_at": "2023-06-28T03:51:30Z",
|
||||
"pushed_at": "2022-06-29T10:53:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-15107 Webmin RCE (unauthorized)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-19T07:43:16Z",
|
||||
"updated_at": "2023-04-23T20:17:49Z",
|
||||
"updated_at": "2023-06-28T02:05:55Z",
|
||||
"pushed_at": "2019-09-02T16:06:19Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 512342756,
|
||||
"name": "CVE-2019-18845",
|
||||
"full_name": "Exploitables\/CVE-2019-18845",
|
||||
"full_name": "expFlash\/CVE-2019-18845",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2019-18845",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2019-18845",
|
||||
"description": "The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\\SYSTEM privileges, by mapping \\Device\\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-10T04:19:35Z",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2023-06-27T21:29:33Z",
|
||||
"updated_at": "2023-06-28T01:51:03Z",
|
||||
"pushed_at": "2022-04-14T18:23:38Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"has_discussions": false,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 301,
|
||||
"watchers": 302,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -908,10 +908,10 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T23:13:00Z",
|
||||
"updated_at": "2023-02-10T10:18:43Z",
|
||||
"updated_at": "2023-06-28T02:47:15Z",
|
||||
"pushed_at": "2020-03-25T16:48:30Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -920,7 +920,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 58,
|
||||
"watchers": 57,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-27T07:54:12Z",
|
||||
"updated_at": "2023-06-28T06:04:55Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1714,
|
||||
"watchers_count": 1714,
|
||||
"stargazers_count": 1715,
|
||||
"watchers_count": 1715,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -226,7 +226,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1714,
|
||||
"watchers": 1715,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2023-06-18T18:04:24Z",
|
||||
"updated_at": "2023-06-28T00:44:32Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"has_discussions": false,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 205,
|
||||
"watchers": 206,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 579880808,
|
||||
"name": "CVE-2020-17382",
|
||||
"full_name": "Exploitables\/CVE-2020-17382",
|
||||
"full_name": "expFlash\/CVE-2020-17382",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2020-17382",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2020-17382",
|
||||
"description": "The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-19T07:02:18Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-06-27T07:54:12Z",
|
||||
"updated_at": "2023-06-28T06:04:55Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1714,
|
||||
"watchers_count": 1714,
|
||||
"stargazers_count": 1715,
|
||||
"watchers_count": 1715,
|
||||
"has_discussions": false,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 327,
|
||||
"watchers": 1714,
|
||||
"watchers": 1715,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit to SYSTEM for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:23:38Z",
|
||||
"updated_at": "2023-06-13T00:56:20Z",
|
||||
"updated_at": "2023-06-28T05:04:47Z",
|
||||
"pushed_at": "2021-05-20T20:33:09Z",
|
||||
"stargazers_count": 236,
|
||||
"watchers_count": 236,
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 236,
|
||||
"watchers": 237,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-06-27T03:19:31Z",
|
||||
"updated_at": "2023-06-28T06:06:01Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -77,14 +77,14 @@
|
|||
{
|
||||
"id": 512343252,
|
||||
"name": "CVE-2021-27965",
|
||||
"full_name": "Exploitables\/CVE-2021-27965",
|
||||
"full_name": "expFlash\/CVE-2021-27965",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-27965",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2021-27965",
|
||||
"description": "The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-10T04:22:55Z",
|
||||
|
|
|
@ -32,14 +32,14 @@
|
|||
{
|
||||
"id": 643396878,
|
||||
"name": "CVE-2021-3438",
|
||||
"full_name": "Exploitables\/CVE-2021-3438",
|
||||
"full_name": "expFlash\/CVE-2021-3438",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-3438",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2021-3438",
|
||||
"description": "A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-21T02:58:10Z",
|
||||
|
|
|
@ -174,7 +174,7 @@
|
|||
"stargazers_count": 972,
|
||||
"watchers_count": 972,
|
||||
"has_discussions": false,
|
||||
"forks_count": 316,
|
||||
"forks_count": 315,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -184,7 +184,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 316,
|
||||
"forks": 315,
|
||||
"watchers": 972,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-06-23T12:16:59Z",
|
||||
"updated_at": "2023-06-28T01:37:46Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 601,
|
||||
"watchers_count": 601,
|
||||
"stargazers_count": 602,
|
||||
"watchers_count": 602,
|
||||
"has_discussions": false,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 601,
|
||||
"watchers": 602,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-06-27T03:27:20Z",
|
||||
"updated_at": "2023-06-28T01:36:41Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1223,
|
||||
"watchers_count": 1223,
|
||||
"stargazers_count": 1224,
|
||||
"watchers_count": 1224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 314,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 314,
|
||||
"watchers": 1223,
|
||||
"watchers": 1224,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-06-27T08:55:55Z",
|
||||
"updated_at": "2023-06-28T06:05:50Z",
|
||||
"pushed_at": "2023-02-08T23:41:04Z",
|
||||
"stargazers_count": 1605,
|
||||
"watchers_count": 1605,
|
||||
"stargazers_count": 1606,
|
||||
"watchers_count": 1606,
|
||||
"has_discussions": false,
|
||||
"forks_count": 471,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 471,
|
||||
"watchers": 1605,
|
||||
"watchers": 1606,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
},
|
||||
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-06-27T21:26:15Z",
|
||||
"updated_at": "2023-06-28T04:32:22Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 692,
|
||||
"watchers_count": 692,
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 692,
|
||||
"watchers": 694,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -3703,7 +3703,7 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-06-27T08:56:06Z",
|
||||
"updated_at": "2023-06-28T04:35:55Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3260,
|
||||
"watchers_count": 3260,
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 617286129,
|
||||
"name": "CVE-2021-44852",
|
||||
"full_name": "Exploitables\/CVE-2021-44852",
|
||||
"full_name": "expFlash\/CVE-2021-44852",
|
||||
"owner": {
|
||||
"login": "Exploitables",
|
||||
"login": "expFlash",
|
||||
"id": 101071411,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
|
||||
"html_url": "https:\/\/github.com\/Exploitables"
|
||||
"html_url": "https:\/\/github.com\/expFlash"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-44852",
|
||||
"html_url": "https:\/\/github.com\/expFlash\/CVE-2021-44852",
|
||||
"description": "An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T04:11:03Z",
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"has_discussions": false,
|
||||
"forks_count": 75,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"forks": 74,
|
||||
"watchers": 247,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
@ -138,13 +138,13 @@
|
|||
"stargazers_count": 1046,
|
||||
"watchers_count": 1046,
|
||||
"has_discussions": false,
|
||||
"forks_count": 221,
|
||||
"forks_count": 220,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"forks": 220,
|
||||
"watchers": 1046,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -183,6 +183,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T10:25:59Z",
|
||||
"updated_at": "2023-06-27T21:58:35Z",
|
||||
"updated_at": "2023-06-28T00:39:15Z",
|
||||
"pushed_at": "2023-05-27T15:39:41Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"has_discussions": false,
|
||||
"forks_count": 40,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"forks": 41,
|
||||
"watchers": 221,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
"windows-boot"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"forks": 44,
|
||||
"watchers": 224,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
|
|
|
@ -98,13 +98,13 @@
|
|||
"stargazers_count": 367,
|
||||
"watchers_count": 367,
|
||||
"has_discussions": false,
|
||||
"forks_count": 99,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"forks": 98,
|
||||
"watchers": 367,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-06-27T03:19:31Z",
|
||||
"updated_at": "2023-06-28T06:06:01Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"has_discussions": false,
|
||||
"forks_count": 121,
|
||||
"allow_forking": true,
|
||||
|
@ -785,9 +785,9 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 121,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
"subscribers_count": 10
|
||||
},
|
||||
{
|
||||
"id": 554685669,
|
||||
|
|
|
@ -207,7 +207,7 @@
|
|||
"forks": 11,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 476300392,
|
||||
|
|
|
@ -765,10 +765,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T09:19:02Z",
|
||||
"updated_at": "2023-06-11T16:49:19Z",
|
||||
"updated_at": "2023-06-28T06:05:56Z",
|
||||
"pushed_at": "2022-06-07T10:35:18Z",
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -777,7 +777,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 284,
|
||||
"watchers": 285,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 15,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
"subscribers_count": 8
|
||||
}
|
||||
]
|
|
@ -117,6 +117,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 109,
|
||||
"watchers": 689,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
"subscribers_count": 26
|
||||
},
|
||||
{
|
||||
"id": 482929231,
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 39,
|
||||
"watchers": 136,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
"subscribers_count": 7
|
||||
},
|
||||
{
|
||||
"id": 594075430,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Docker CVE-2022-37708",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-22T23:06:08Z",
|
||||
"updated_at": "2023-06-26T15:02:13Z",
|
||||
"updated_at": "2023-06-28T03:22:48Z",
|
||||
"pushed_at": "2022-09-23T00:07:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -30,6 +30,6 @@
|
|||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -463,7 +463,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 557616560,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Vulnerability Details for CVE-2022-41218",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T07:12:23Z",
|
||||
"updated_at": "2023-06-05T08:44:12Z",
|
||||
"updated_at": "2023-06-28T04:03:32Z",
|
||||
"pushed_at": "2022-10-09T05:26:03Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -1347,6 +1347,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,7 +27,7 @@
|
|||
"forks": 39,
|
||||
"watchers": 248,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 596917149,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Binwalk Remote Command Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-06T20:53:49Z",
|
||||
"updated_at": "2023-06-27T14:15:24Z",
|
||||
"updated_at": "2023-06-28T04:23:19Z",
|
||||
"pushed_at": "2023-02-06T20:54:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -57,6 +57,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-16T10:05:13Z",
|
||||
"updated_at": "2023-06-27T07:01:23Z",
|
||||
"updated_at": "2023-06-28T02:54:34Z",
|
||||
"pushed_at": "2023-05-31T16:06:34Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T12:22:57Z",
|
||||
"updated_at": "2023-06-27T11:20:51Z",
|
||||
"updated_at": "2023-06-28T01:40:14Z",
|
||||
"pushed_at": "2023-06-18T12:41:52Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-13T13:17:23Z",
|
||||
"updated_at": "2023-06-27T14:36:07Z",
|
||||
"updated_at": "2023-06-28T02:49:07Z",
|
||||
"pushed_at": "2023-06-13T14:39:17Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 193,
|
||||
"watchers": 194,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-13T03:42:27Z",
|
||||
"updated_at": "2023-06-27T09:16:29Z",
|
||||
"updated_at": "2023-06-28T04:10:25Z",
|
||||
"pushed_at": "2023-04-23T17:54:49Z",
|
||||
"stargazers_count": 585,
|
||||
"watchers_count": 585,
|
||||
"stargazers_count": 586,
|
||||
"watchers_count": 586,
|
||||
"has_discussions": false,
|
||||
"forks_count": 94,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,8 +29,8 @@
|
|||
"weblogic"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 585,
|
||||
"forks": 95,
|
||||
"watchers": 586,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2023-06-27T18:00:44Z",
|
||||
"updated_at": "2023-06-28T06:21:51Z",
|
||||
"pushed_at": "2023-06-03T19:35:51Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-16T20:15:36Z",
|
||||
"updated_at": "2023-06-27T20:00:59Z",
|
||||
"updated_at": "2023-06-28T05:43:21Z",
|
||||
"pushed_at": "2023-06-20T21:32:56Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 34,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-16T05:58:03Z",
|
||||
"updated_at": "2023-06-27T15:05:28Z",
|
||||
"updated_at": "2023-06-28T04:46:40Z",
|
||||
"pushed_at": "2023-06-20T06:58:04Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -90,7 +90,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 643690357,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
45
README.md
45
README.md
|
@ -8813,7 +8813,7 @@
|
|||
</code>
|
||||
|
||||
- [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438)
|
||||
- [Exploitables/CVE-2021-3438](https://github.com/Exploitables/CVE-2021-3438)
|
||||
- [expFlash/CVE-2021-3438](https://github.com/expFlash/CVE-2021-3438)
|
||||
|
||||
### CVE-2021-3441 (2021-10-29)
|
||||
|
||||
|
@ -10521,7 +10521,7 @@
|
|||
|
||||
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
|
||||
- [Jeromeyoung/CVE-2021-27965](https://github.com/Jeromeyoung/CVE-2021-27965)
|
||||
- [Exploitables/CVE-2021-27965](https://github.com/Exploitables/CVE-2021-27965)
|
||||
- [expFlash/CVE-2021-27965](https://github.com/expFlash/CVE-2021-27965)
|
||||
|
||||
### CVE-2021-28079 (2021-04-26)
|
||||
|
||||
|
@ -13834,7 +13834,7 @@
|
|||
<code>An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.
|
||||
</code>
|
||||
|
||||
- [Exploitables/CVE-2021-44852](https://github.com/Exploitables/CVE-2021-44852)
|
||||
- [expFlash/CVE-2021-44852](https://github.com/expFlash/CVE-2021-44852)
|
||||
|
||||
### CVE-2021-45007 (2022-02-20)
|
||||
|
||||
|
@ -17852,7 +17852,7 @@
|
|||
</code>
|
||||
|
||||
- [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382)
|
||||
- [Exploitables/CVE-2020-17382](https://github.com/Exploitables/CVE-2020-17382)
|
||||
- [expFlash/CVE-2020-17382](https://github.com/expFlash/CVE-2020-17382)
|
||||
- [houseofxyz/CVE-2020-17382](https://github.com/houseofxyz/CVE-2020-17382)
|
||||
|
||||
### CVE-2020-17453 (2021-04-05)
|
||||
|
@ -22545,7 +22545,7 @@
|
|||
<code>The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
|
||||
</code>
|
||||
|
||||
- [Exploitables/CVE-2019-18845](https://github.com/Exploitables/CVE-2019-18845)
|
||||
- [expFlash/CVE-2019-18845](https://github.com/expFlash/CVE-2019-18845)
|
||||
|
||||
### CVE-2019-18873 (2019-11-11)
|
||||
|
||||
|
@ -23345,6 +23345,7 @@
|
|||
- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
|
||||
- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
|
||||
- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
|
||||
- [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893)
|
||||
- [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893)
|
||||
|
||||
### CVE-2018-2894 (2018-07-18)
|
||||
|
@ -23457,7 +23458,7 @@
|
|||
<code>An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.
|
||||
</code>
|
||||
|
||||
- [Exploitables/CVE-2018-3990-TALOS-2018-0658](https://github.com/Exploitables/CVE-2018-3990-TALOS-2018-0658)
|
||||
- [expFlash/CVE-2018-3990](https://github.com/expFlash/CVE-2018-3990)
|
||||
|
||||
### CVE-2018-4013 (2018-10-19)
|
||||
|
||||
|
@ -24706,10 +24707,19 @@
|
|||
|
||||
- [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933)
|
||||
- [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933)
|
||||
- [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933)
|
||||
- [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933)
|
||||
- [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner)
|
||||
- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
|
||||
- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
|
||||
- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
|
||||
- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
|
||||
- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
|
||||
- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
|
||||
- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
|
||||
- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
|
||||
- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
|
||||
- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
|
||||
- [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
|
||||
- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
|
||||
- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
|
||||
|
@ -24771,6 +24781,7 @@
|
|||
- [twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration](https://github.com/twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration)
|
||||
- [SenSecurity/exploit](https://github.com/SenSecurity/exploit)
|
||||
- [EmaVirgRep/CVE-2018-11235](https://github.com/EmaVirgRep/CVE-2018-11235)
|
||||
- [theerachaich/lab](https://github.com/theerachaich/lab)
|
||||
|
||||
### CVE-2018-11311 (2018-05-20)
|
||||
|
||||
|
@ -24887,6 +24898,13 @@
|
|||
|
||||
- [anmuxi-bai/CVE-2018-11790](https://github.com/anmuxi-bai/CVE-2018-11790)
|
||||
|
||||
### CVE-2018-12018 (2018-07-04)
|
||||
|
||||
<code>The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue.
|
||||
</code>
|
||||
|
||||
- [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018)
|
||||
|
||||
### CVE-2018-12031 (2018-06-07)
|
||||
|
||||
<code>Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
|
||||
|
@ -25198,6 +25216,7 @@
|
|||
|
||||
- [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC)
|
||||
- [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit)
|
||||
- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
|
||||
- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
|
||||
- [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
|
||||
- [Tr33-He11/winboxPOC](https://github.com/Tr33-He11/winboxPOC)
|
||||
|
@ -29656,11 +29675,16 @@
|
|||
</code>
|
||||
|
||||
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
|
||||
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
|
||||
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
|
||||
- [piyokango/ghost](https://github.com/piyokango/ghost)
|
||||
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
|
||||
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
|
||||
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
|
||||
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
|
||||
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
|
||||
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
|
||||
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
|
||||
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
|
||||
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
|
||||
- [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc)
|
||||
|
@ -29890,7 +29914,7 @@
|
|||
</code>
|
||||
|
||||
- [Tare05/Intel-CVE-2015-2291](https://github.com/Tare05/Intel-CVE-2015-2291)
|
||||
- [Exploitables/CVE-2015-2291](https://github.com/Exploitables/CVE-2015-2291)
|
||||
- [expFlash/CVE-2015-2291](https://github.com/expFlash/CVE-2015-2291)
|
||||
|
||||
### CVE-2015-2315 (2015-03-17)
|
||||
|
||||
|
@ -32248,7 +32272,7 @@
|
|||
<code>Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.
|
||||
</code>
|
||||
|
||||
- [Exploitables/CVE-2010-4502](https://github.com/Exploitables/CVE-2010-4502)
|
||||
- [expFlash/CVE-2010-4502](https://github.com/expFlash/CVE-2010-4502)
|
||||
|
||||
### CVE-2010-4804 (2011-06-09)
|
||||
|
||||
|
@ -32306,7 +32330,7 @@
|
|||
<code>Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier, as distributed in SlySoft AnyDVD before 6.5.2.6, Virtual CloneDrive 5.4.2.3 and earlier, CloneDVD 2.9.2.0 and earlier, and CloneCD 5.3.1.3 and earlier, uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to cause a denial of service (system crash) via a crafted IOCTL call.
|
||||
</code>
|
||||
|
||||
- [Exploitables/CVE-2009-0824](https://github.com/Exploitables/CVE-2009-0824)
|
||||
- [expFlash/CVE-2009-0824](https://github.com/expFlash/CVE-2009-0824)
|
||||
|
||||
### CVE-2009-1151 (2009-03-26)
|
||||
|
||||
|
@ -32395,7 +32419,7 @@
|
|||
<code>Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024.
|
||||
</code>
|
||||
|
||||
- [Exploitables/CVE-2009-4049](https://github.com/Exploitables/CVE-2009-4049)
|
||||
- [expFlash/CVE-2009-4049](https://github.com/expFlash/CVE-2009-4049)
|
||||
|
||||
### CVE-2009-4092 (2009-11-27)
|
||||
|
||||
|
@ -33096,6 +33120,7 @@
|
|||
</code>
|
||||
|
||||
- [rafaelh/CVE-2000-0649](https://github.com/rafaelh/CVE-2000-0649)
|
||||
- [stevenvegar/cve-2000-0649](https://github.com/stevenvegar/cve-2000-0649)
|
||||
|
||||
### CVE-2000-0979 (2001-01-22)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue