Auto Update 2023/06/28 06:29:09

This commit is contained in:
motikan2010-bot 2023-06-28 15:29:09 +09:00
parent ad6e6cadc7
commit fb68245342
70 changed files with 791 additions and 217 deletions

View file

@ -33,5 +33,35 @@
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 421212210,
"name": "cve-2000-0649",
"full_name": "stevenvegar\/cve-2000-0649",
"owner": {
"login": "stevenvegar",
"id": 70730301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4",
"html_url": "https:\/\/github.com\/stevenvegar"
},
"html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649",
"description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers",
"fork": false,
"created_at": "2021-10-25T23:14:04Z",
"updated_at": "2021-12-17T07:02:21Z",
"pushed_at": "2021-10-25T23:32:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -2,18 +2,18 @@
{
"id": 621193423,
"name": "CVE-2009-0824",
"full_name": "Exploitables\/CVE-2009-0824",
"full_name": "expFlash\/CVE-2009-0824",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2009-0824",
"description": "Just another write NULL exploit",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2009-0824",
"description": null,
"fork": false,
"created_at": "2023-03-30T07:11:50Z",
"updated_at": "2023-06-09T08:32:17Z",
"updated_at": "2023-06-28T03:36:36Z",
"pushed_at": "2023-04-16T03:51:45Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -2,18 +2,18 @@
{
"id": 512342338,
"name": "CVE-2009-4049",
"full_name": "Exploitables\/CVE-2009-4049",
"full_name": "expFlash\/CVE-2009-4049",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2009-4049",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2009-4049",
"description": "Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024.",
"fork": false,
"created_at": "2022-07-10T04:16:16Z",
"updated_at": "2022-07-10T12:44:21Z",
"updated_at": "2023-06-28T03:45:28Z",
"pushed_at": "2022-07-10T04:18:22Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -2,14 +2,14 @@
{
"id": 504370912,
"name": "CVE-2010-4502",
"full_name": "Exploitables\/CVE-2010-4502",
"full_name": "expFlash\/CVE-2010-4502",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2010-4502",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2010-4502",
"description": "Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.",
"fork": false,
"created_at": "2022-06-17T02:39:13Z",

View file

@ -29,6 +29,66 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 29933656,
"name": "CVE-2015-0235-cookbook",
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
"owner": {
"login": "mikesplain",
"id": 881965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/881965?v=4",
"html_url": "https:\/\/github.com\/mikesplain"
},
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
"description": "A chef cookbook to test the GHOST vulnerability",
"fork": false,
"created_at": "2015-01-27T20:34:42Z",
"updated_at": "2017-09-29T11:32:54Z",
"pushed_at": "2015-01-27T21:41:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 29941036,
"name": "CVE-2015-0235-test",
"full_name": "aaronfay\/CVE-2015-0235-test",
"owner": {
"login": "aaronfay",
"id": 1033941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1033941?v=4",
"html_url": "https:\/\/github.com\/aaronfay"
},
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-27T23:45:22Z",
"updated_at": "2023-03-07T20:55:14Z",
"pushed_at": "2015-01-29T03:33:29Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},
{
"id": 29942046,
"name": "ghost",
@ -149,6 +209,66 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 30004399,
"name": "cfengine-CVE_2015_0235",
"full_name": "nickanderson\/cfengine-CVE_2015_0235",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
"description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
"fork": false,
"created_at": "2015-01-29T04:58:54Z",
"updated_at": "2016-02-13T01:41:47Z",
"pushed_at": "2015-01-29T21:23:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 30008427,
"name": "cookbook-update-glibc",
"full_name": "koudaiii-archives\/cookbook-update-glibc",
"owner": {
"login": "koudaiii-archives",
"id": 51727289,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51727289?v=4",
"html_url": "https:\/\/github.com\/koudaiii-archives"
},
"html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc",
"description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
"fork": false,
"created_at": "2015-01-29T07:14:17Z",
"updated_at": "2023-01-28T20:14:16Z",
"pushed_at": "2015-01-29T07:38:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 30019912,
"name": "ghostbusters15",
@ -179,6 +299,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 30066365,
"name": "CVE-2015-0235",
"full_name": "tobyzxj\/CVE-2015-0235",
"owner": {
"login": "tobyzxj",
"id": 4661855,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4",
"html_url": "https:\/\/github.com\/tobyzxj"
},
"html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
"description": "glibc gethostbyname bug",
"fork": false,
"created_at": "2015-01-30T09:58:09Z",
"updated_at": "2020-10-17T20:24:46Z",
"pushed_at": "2015-01-30T10:02:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 30183649,
"name": "CVE-2015-0235-workaround",

View file

@ -32,21 +32,21 @@
{
"id": 506108089,
"name": "CVE-2015-2291",
"full_name": "Exploitables\/CVE-2015-2291",
"full_name": "expFlash\/CVE-2015-2291",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2015-2291",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2015-2291",
"description": "(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.",
"fork": false,
"created_at": "2022-06-22T05:22:57Z",
"updated_at": "2023-06-09T08:38:21Z",
"updated_at": "2023-06-28T03:35:53Z",
"pushed_at": "2023-06-22T19:13:55Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 13,
"watchers": 12,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-06-27T07:54:12Z",
"updated_at": "2023-06-28T06:04:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1714,
"watchers_count": 1714,
"stargazers_count": 1715,
"watchers_count": 1715,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1714,
"watchers": 1715,
"score": 0,
"subscribers_count": 34
},

View file

@ -167,10 +167,10 @@
"description": "ActiveMQ系列漏洞探测利用工具包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞CVE-2016-3088支持批量探测利用。",
"fork": false,
"created_at": "2022-04-02T08:40:10Z",
"updated_at": "2023-06-27T07:07:11Z",
"updated_at": "2023-06-28T01:05:47Z",
"pushed_at": "2022-04-02T08:55:07Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -179,7 +179,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -452,7 +452,7 @@
"stargazers_count": 748,
"watchers_count": 748,
"has_discussions": false,
"forks_count": 439,
"forks_count": 438,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -462,7 +462,7 @@
"exploit"
],
"visibility": "public",
"forks": 439,
"forks": 438,
"watchers": 748,
"score": 0,
"subscribers_count": 11
@ -1150,13 +1150,13 @@
"stargazers_count": 247,
"watchers_count": 247,
"has_discussions": false,
"forks_count": 75,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 75,
"forks": 74,
"watchers": 247,
"score": 0,
"subscribers_count": 4

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-06-27T07:54:12Z",
"updated_at": "2023-06-28T06:04:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1714,
"watchers_count": 1714,
"stargazers_count": 1715,
"watchers_count": 1715,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1714,
"watchers": 1715,
"score": 0,
"subscribers_count": 34
},

View file

@ -258,10 +258,10 @@
"description": "Simple C# implementation of CVE-2017-8759",
"fork": false,
"created_at": "2017-09-17T22:05:56Z",
"updated_at": "2022-10-15T14:05:47Z",
"updated_at": "2023-06-28T00:40:31Z",
"pushed_at": "2017-09-17T22:20:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -274,7 +274,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -59,6 +59,66 @@
"score": 0,
"subscribers_count": 22
},
{
"id": 153477523,
"name": "CVE-2018-10933",
"full_name": "hook-s3c\/CVE-2018-10933",
"owner": {
"login": "hook-s3c",
"id": 31825993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825993?v=4",
"html_url": "https:\/\/github.com\/hook-s3c"
},
"html_url": "https:\/\/github.com\/hook-s3c\/CVE-2018-10933",
"description": "CVE-2018-10933 sshlib user authentication attack - docker lab, test and exploit",
"fork": false,
"created_at": "2018-10-17T15:09:41Z",
"updated_at": "2021-12-05T20:25:44Z",
"pushed_at": "2018-10-17T15:09:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 153506738,
"name": "CVE-2018-10933",
"full_name": "kn6869610\/CVE-2018-10933",
"owner": {
"login": "kn6869610",
"id": 6917744,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6917744?v=4",
"html_url": "https:\/\/github.com\/kn6869610"
},
"html_url": "https:\/\/github.com\/kn6869610\/CVE-2018-10933",
"description": "Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already occurred without a problem. The server expects the message SSH2_MSG_USERAUTH_REQUEST to start the authentication procedure, but by skipping it an attacker can log in without showing any credentials.",
"fork": false,
"created_at": "2018-10-17T18:44:05Z",
"updated_at": "2021-12-05T20:25:52Z",
"pushed_at": "2018-10-17T18:45:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
{
"id": 153534574,
"name": "libssh-scanner",
@ -89,6 +149,101 @@
"score": 0,
"subscribers_count": 18
},
{
"id": 153562229,
"name": "CVE-2018-10933_ssh",
"full_name": "likescam\/CVE-2018-10933_ssh",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933_ssh",
"description": null,
"fork": false,
"created_at": "2018-10-18T04:10:25Z",
"updated_at": "2021-12-05T20:26:01Z",
"pushed_at": "2018-10-18T04:10:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 153598283,
"name": "CVE-2018-10933-libSSH-Authentication-Bypass",
"full_name": "likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"owner": {
"login": "likescam",
"id": 2469038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
"html_url": "https:\/\/github.com\/likescam"
},
"html_url": "https:\/\/github.com\/likescam\/CVE-2018-10933-libSSH-Authentication-Bypass",
"description": null,
"fork": false,
"created_at": "2018-10-18T09:27:08Z",
"updated_at": "2021-12-05T20:26:14Z",
"pushed_at": "2018-10-18T09:27:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 153643745,
"name": "hunt-for-cve-2018-10933",
"full_name": "marco-lancini\/hunt-for-cve-2018-10933",
"owner": {
"login": "marco-lancini",
"id": 1472968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1472968?v=4",
"html_url": "https:\/\/github.com\/marco-lancini"
},
"html_url": "https:\/\/github.com\/marco-lancini\/hunt-for-cve-2018-10933",
"description": "Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)",
"fork": false,
"created_at": "2018-10-18T15:08:25Z",
"updated_at": "2023-06-20T11:06:21Z",
"pushed_at": "2018-10-18T15:11:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"elasticsearch",
"exploit",
"nmap",
"pentesting"
],
"visibility": "public",
"forks": 4,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 153675108,
"name": "cve-2018-10933",
@ -149,6 +304,100 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 153855090,
"name": "CVE-2018-10933",
"full_name": "jas502n\/CVE-2018-10933",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-10933",
"description": "libssh CVE-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:24:04Z",
"updated_at": "2023-05-23T04:45:13Z",
"pushed_at": "2018-10-20T00:29:04Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},
{
"id": 153856713,
"name": "cve-2018-10933_poc",
"full_name": "ninp0\/cve-2018-10933_poc",
"owner": {
"login": "ninp0",
"id": 1008583,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008583?v=4",
"html_url": "https:\/\/github.com\/ninp0"
},
"html_url": "https:\/\/github.com\/ninp0\/cve-2018-10933_poc",
"description": "Variant of hackerhouse-opensource\/cve-2018-10933",
"fork": false,
"created_at": "2018-10-20T00:53:24Z",
"updated_at": "2018-10-22T15:05:53Z",
"pushed_at": "2018-10-20T01:53:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2018-10933",
"exploit",
"poc"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 153878160,
"name": "CVE-2018-10933_Scanner",
"full_name": "pghook\/CVE-2018-10933_Scanner",
"owner": {
"login": "pghook",
"id": 14160529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14160529?v=4",
"html_url": "https:\/\/github.com\/pghook"
},
"html_url": "https:\/\/github.com\/pghook\/CVE-2018-10933_Scanner",
"description": null,
"fork": false,
"created_at": "2018-10-20T06:53:59Z",
"updated_at": "2020-05-15T17:20:56Z",
"pushed_at": "2018-10-20T04:54:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 153920395,
"name": "POC-CVE-2018-10933",
@ -179,6 +428,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 153975086,
"name": "pythonprojects-CVE-2018-10933",
"full_name": "shifa123\/pythonprojects-CVE-2018-10933",
"owner": {
"login": "shifa123",
"id": 18241082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4",
"html_url": "https:\/\/github.com\/shifa123"
},
"html_url": "https:\/\/github.com\/shifa123\/pythonprojects-CVE-2018-10933",
"description": "CVE-2018-10933",
"fork": false,
"created_at": "2018-10-21T05:01:12Z",
"updated_at": "2022-01-03T19:20:42Z",
"pushed_at": "2018-10-21T05:13:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 154050332,
"name": "CVE-2018-10933",

View file

@ -664,5 +664,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 659564459,
"name": "lab",
"full_name": "theerachaich\/lab",
"owner": {
"login": "theerachaich",
"id": 72238539,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72238539?v=4",
"html_url": "https:\/\/github.com\/theerachaich"
},
"html_url": "https:\/\/github.com\/theerachaich\/lab",
"description": "pentesterlab_CVE-2018-11235: Git Submodule RCE",
"fork": false,
"created_at": "2023-06-28T05:31:08Z",
"updated_at": "2023-06-28T05:31:09Z",
"pushed_at": "2023-06-28T05:31:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 152906288,
"name": "MikroRoot",
"full_name": "syrex1013\/MikroRoot",
"owner": {
"login": "syrex1013",
"id": 31669127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
"html_url": "https:\/\/github.com\/syrex1013"
},
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
"fork": false,
"created_at": "2018-10-13T19:17:42Z",
"updated_at": "2021-12-06T20:08:10Z",
"pushed_at": "2018-10-14T08:39:24Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 15,
"score": 0,
"subscribers_count": 3
},
{
"id": 161894724,
"name": "CVE-2018-14847",

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-06-27T07:54:12Z",
"updated_at": "2023-06-28T06:04:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1714,
"watchers_count": 1714,
"stargazers_count": 1715,
"watchers_count": 1715,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1714,
"watchers": 1715,
"score": 0,
"subscribers_count": 34
},

View file

@ -149,6 +149,36 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 151921677,
"name": "CVE-2018-2893",
"full_name": "jas502n\/CVE-2018-2893",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-2893",
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-10-07T08:41:14Z",
"updated_at": "2023-06-02T07:03:04Z",
"pushed_at": "2018-10-07T09:53:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 219763712,
"name": "CVE-2018-2893",

View file

@ -1,19 +1,19 @@
[
{
"id": 508145181,
"name": "CVE-2018-3990-TALOS-2018-0658",
"full_name": "Exploitables\/CVE-2018-3990-TALOS-2018-0658",
"name": "CVE-2018-3990",
"full_name": "expFlash\/CVE-2018-3990",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2018-3990-TALOS-2018-0658",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2018-3990",
"description": "An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.",
"fork": false,
"created_at": "2022-06-28T03:48:09Z",
"updated_at": "2023-06-09T08:38:28Z",
"updated_at": "2023-06-28T03:51:30Z",
"pushed_at": "2022-06-29T10:53:31Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-15107 Webmin RCE (unauthorized)",
"fork": false,
"created_at": "2019-08-19T07:43:16Z",
"updated_at": "2023-04-23T20:17:49Z",
"updated_at": "2023-06-28T02:05:55Z",
"pushed_at": "2019-09-02T16:06:19Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 57,
"watchers": 58,
"score": 0,
"subscribers_count": 3
},

View file

@ -2,14 +2,14 @@
{
"id": 512342756,
"name": "CVE-2019-18845",
"full_name": "Exploitables\/CVE-2019-18845",
"full_name": "expFlash\/CVE-2019-18845",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2019-18845",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2019-18845",
"description": "The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\\SYSTEM privileges, by mapping \\Device\\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.",
"fork": false,
"created_at": "2022-07-10T04:19:35Z",

View file

@ -43,10 +43,10 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2023-06-27T21:29:33Z",
"updated_at": "2023-06-28T01:51:03Z",
"pushed_at": "2022-04-14T18:23:38Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 301,
"watchers": 302,
"score": 0,
"subscribers_count": 12
},

View file

@ -908,10 +908,10 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T23:13:00Z",
"updated_at": "2023-02-10T10:18:43Z",
"updated_at": "2023-06-28T02:47:15Z",
"pushed_at": "2020-03-25T16:48:30Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -920,7 +920,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 58,
"watchers": 57,
"score": 0,
"subscribers_count": 13
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-06-27T07:54:12Z",
"updated_at": "2023-06-28T06:04:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1714,
"watchers_count": 1714,
"stargazers_count": 1715,
"watchers_count": 1715,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1714,
"watchers": 1715,
"score": 0,
"subscribers_count": 34
}

View file

@ -13,10 +13,10 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2023-06-18T18:04:24Z",
"updated_at": "2023-06-28T00:44:32Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 206,
"watchers_count": 206,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 205,
"watchers": 206,
"score": 0,
"subscribers_count": 10
},

View file

@ -32,14 +32,14 @@
{
"id": 579880808,
"name": "CVE-2020-17382",
"full_name": "Exploitables\/CVE-2020-17382",
"full_name": "expFlash\/CVE-2020-17382",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2020-17382",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2020-17382",
"description": "The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).",
"fork": false,
"created_at": "2022-12-19T07:02:18Z",

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-06-27T07:54:12Z",
"updated_at": "2023-06-28T06:04:55Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1714,
"watchers_count": 1714,
"stargazers_count": 1715,
"watchers_count": 1715,
"has_discussions": false,
"forks_count": 327,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 327,
"watchers": 1714,
"watchers": 1715,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
"updated_at": "2023-06-13T00:56:20Z",
"updated_at": "2023-06-28T05:04:47Z",
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 236,
"watchers_count": 236,
"stargazers_count": 237,
"watchers_count": 237,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 236,
"watchers": 237,
"score": 0,
"subscribers_count": 10
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-06-27T03:19:31Z",
"updated_at": "2023-06-28T06:06:01Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 121,
"watchers": 949,
"watchers": 950,
"score": 0,
"subscribers_count": 9
}

View file

@ -77,14 +77,14 @@
{
"id": 512343252,
"name": "CVE-2021-27965",
"full_name": "Exploitables\/CVE-2021-27965",
"full_name": "expFlash\/CVE-2021-27965",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-27965",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2021-27965",
"description": "The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.",
"fork": false,
"created_at": "2022-07-10T04:22:55Z",

View file

@ -32,14 +32,14 @@
{
"id": 643396878,
"name": "CVE-2021-3438",
"full_name": "Exploitables\/CVE-2021-3438",
"full_name": "expFlash\/CVE-2021-3438",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-3438",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2021-3438",
"description": "A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.",
"fork": false,
"created_at": "2023-05-21T02:58:10Z",

View file

@ -174,7 +174,7 @@
"stargazers_count": 972,
"watchers_count": 972,
"has_discussions": false,
"forks_count": 316,
"forks_count": 315,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -184,7 +184,7 @@
"poc"
],
"visibility": "public",
"forks": 316,
"forks": 315,
"watchers": 972,
"score": 0,
"subscribers_count": 15

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-06-23T12:16:59Z",
"updated_at": "2023-06-28T01:37:46Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 601,
"watchers_count": 601,
"stargazers_count": 602,
"watchers_count": 602,
"has_discussions": false,
"forks_count": 107,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 601,
"watchers": 602,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-06-27T03:27:20Z",
"updated_at": "2023-06-28T01:36:41Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1223,
"watchers_count": 1223,
"stargazers_count": 1224,
"watchers_count": 1224,
"has_discussions": false,
"forks_count": 314,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 314,
"watchers": 1223,
"watchers": 1224,
"score": 0,
"subscribers_count": 26
},

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-06-27T08:55:55Z",
"updated_at": "2023-06-28T06:05:50Z",
"pushed_at": "2023-02-08T23:41:04Z",
"stargazers_count": 1605,
"watchers_count": 1605,
"stargazers_count": 1606,
"watchers_count": 1606,
"has_discussions": false,
"forks_count": 471,
"allow_forking": true,
@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 471,
"watchers": 1605,
"watchers": 1606,
"score": 0,
"subscribers_count": 25
},
@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-06-27T21:26:15Z",
"updated_at": "2023-06-28T04:32:22Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 692,
"watchers_count": 692,
"stargazers_count": 694,
"watchers_count": 694,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 692,
"watchers": 694,
"score": 0,
"subscribers_count": 10
},
@ -3703,7 +3703,7 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-06-27T08:56:06Z",
"updated_at": "2023-06-28T04:35:55Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3260,
"watchers_count": 3260,

View file

@ -2,14 +2,14 @@
{
"id": 617286129,
"name": "CVE-2021-44852",
"full_name": "Exploitables\/CVE-2021-44852",
"full_name": "expFlash\/CVE-2021-44852",
"owner": {
"login": "Exploitables",
"login": "expFlash",
"id": 101071411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4",
"html_url": "https:\/\/github.com\/Exploitables"
"html_url": "https:\/\/github.com\/expFlash"
},
"html_url": "https:\/\/github.com\/Exploitables\/CVE-2021-44852",
"html_url": "https:\/\/github.com\/expFlash\/CVE-2021-44852",
"description": "An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.",
"fork": false,
"created_at": "2023-03-22T04:11:03Z",

View file

@ -108,13 +108,13 @@
"stargazers_count": 247,
"watchers_count": 247,
"has_discussions": false,
"forks_count": 75,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 75,
"forks": 74,
"watchers": 247,
"score": 0,
"subscribers_count": 4
@ -138,13 +138,13 @@
"stargazers_count": 1046,
"watchers_count": 1046,
"has_discussions": false,
"forks_count": 221,
"forks_count": 220,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 221,
"forks": 220,
"watchers": 1046,
"score": 0,
"subscribers_count": 17

View file

@ -27,6 +27,6 @@
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
"subscribers_count": 0
}
]

View file

@ -183,6 +183,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2023-06-27T21:58:35Z",
"updated_at": "2023-06-28T00:39:15Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 4
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 221,
"watchers_count": 221,
"has_discussions": false,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 221,
"score": 0,
"subscribers_count": 8

View file

@ -18,7 +18,7 @@
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 45,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"windows-boot"
],
"visibility": "public",
"forks": 45,
"forks": 44,
"watchers": 224,
"score": 0,
"subscribers_count": 9

View file

@ -98,13 +98,13 @@
"stargazers_count": 367,
"watchers_count": 367,
"has_discussions": false,
"forks_count": 99,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 99,
"forks": 98,
"watchers": 367,
"score": 0,
"subscribers_count": 10

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-06-27T03:19:31Z",
"updated_at": "2023-06-28T06:06:01Z",
"pushed_at": "2023-05-14T12:08:39Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -785,9 +785,9 @@
],
"visibility": "public",
"forks": 121,
"watchers": 949,
"watchers": 950,
"score": 0,
"subscribers_count": 9
"subscribers_count": 10
},
{
"id": 554685669,

View file

@ -207,7 +207,7 @@
"forks": 11,
"watchers": 21,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 476300392,

View file

@ -765,10 +765,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
"updated_at": "2023-06-11T16:49:19Z",
"updated_at": "2023-06-28T06:05:56Z",
"pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 284,
"watchers_count": 284,
"stargazers_count": 285,
"watchers_count": 285,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -777,7 +777,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 284,
"watchers": 285,
"score": 0,
"subscribers_count": 7
},

View file

@ -27,6 +27,6 @@
"forks": 15,
"watchers": 55,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
}
]

View file

@ -117,6 +117,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,7 +27,7 @@
"forks": 109,
"watchers": 689,
"score": 0,
"subscribers_count": 25
"subscribers_count": 26
},
{
"id": 482929231,

View file

@ -27,7 +27,7 @@
"forks": 39,
"watchers": 136,
"score": 0,
"subscribers_count": 6
"subscribers_count": 7
},
{
"id": 594075430,

View file

@ -13,7 +13,7 @@
"description": "Docker CVE-2022-37708",
"fork": false,
"created_at": "2022-09-22T23:06:08Z",
"updated_at": "2023-06-26T15:02:13Z",
"updated_at": "2023-06-28T03:22:48Z",
"pushed_at": "2022-09-23T00:07:17Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -30,6 +30,6 @@
"forks": 6,
"watchers": 18,
"score": 0,
"subscribers_count": 2
"subscribers_count": 4
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -463,7 +463,7 @@
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 557616560,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
}
]

View file

@ -13,10 +13,10 @@
"description": "Vulnerability Details for CVE-2022-41218",
"fork": false,
"created_at": "2022-09-30T07:12:23Z",
"updated_at": "2023-06-05T08:44:12Z",
"updated_at": "2023-06-28T04:03:32Z",
"pushed_at": "2022-10-09T05:26:03Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 2
}

View file

@ -1347,6 +1347,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,7 +27,7 @@
"forks": 39,
"watchers": 248,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 596917149,

View file

@ -13,10 +13,10 @@
"description": "Binwalk Remote Command Execution",
"fork": false,
"created_at": "2023-02-06T20:53:49Z",
"updated_at": "2023-06-27T14:15:24Z",
"updated_at": "2023-06-28T04:23:19Z",
"pushed_at": "2023-02-06T20:54:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -57,6 +57,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user",
"fork": false,
"created_at": "2023-04-16T10:05:13Z",
"updated_at": "2023-06-27T07:01:23Z",
"updated_at": "2023-06-28T02:54:34Z",
"pushed_at": "2023-05-31T16:06:34Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-18T12:22:57Z",
"updated_at": "2023-06-27T11:20:51Z",
"updated_at": "2023-06-28T01:40:14Z",
"pushed_at": "2023-06-18T12:41:52Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 72,
"watchers": 73,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)",
"fork": false,
"created_at": "2023-06-13T13:17:23Z",
"updated_at": "2023-06-27T14:36:07Z",
"updated_at": "2023-06-28T02:49:07Z",
"pushed_at": "2023-06-13T14:39:17Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 194,
"watchers_count": 194,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 193,
"watchers": 194,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,12 +13,12 @@
"description": "Weblogic CVE-2023-21839 \/ CVE-2023-21931 \/ CVE-2023-21979 一键检测",
"fork": false,
"created_at": "2023-02-13T03:42:27Z",
"updated_at": "2023-06-27T09:16:29Z",
"updated_at": "2023-06-28T04:10:25Z",
"pushed_at": "2023-04-23T17:54:49Z",
"stargazers_count": 585,
"watchers_count": 585,
"stargazers_count": 586,
"watchers_count": 586,
"has_discussions": false,
"forks_count": 94,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"weblogic"
],
"visibility": "public",
"forks": 94,
"watchers": 585,
"forks": 95,
"watchers": 586,
"score": 0,
"subscribers_count": 6
},

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2023-06-27T18:00:44Z",
"updated_at": "2023-06-28T06:21:51Z",
"pushed_at": "2023-06-03T19:35:51Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 133,
"watchers": 134,
"score": 0,
"subscribers_count": 3
}

View file

@ -103,10 +103,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2023-06-27T20:00:59Z",
"updated_at": "2023-06-28T05:43:21Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 34,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233",
"fork": false,
"created_at": "2023-05-16T05:58:03Z",
"updated_at": "2023-06-27T15:05:28Z",
"updated_at": "2023-06-28T04:46:40Z",
"pushed_at": "2023-06-20T06:58:04Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 23,
"watchers": 26,
"score": 0,
"subscribers_count": 2
}

View file

@ -90,7 +90,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 643690357,

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -108,13 +108,13 @@
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 55,
"score": 0,
"subscribers_count": 3

View file

@ -8813,7 +8813,7 @@
</code>
- [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438)
- [Exploitables/CVE-2021-3438](https://github.com/Exploitables/CVE-2021-3438)
- [expFlash/CVE-2021-3438](https://github.com/expFlash/CVE-2021-3438)
### CVE-2021-3441 (2021-10-29)
@ -10521,7 +10521,7 @@
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
- [Jeromeyoung/CVE-2021-27965](https://github.com/Jeromeyoung/CVE-2021-27965)
- [Exploitables/CVE-2021-27965](https://github.com/Exploitables/CVE-2021-27965)
- [expFlash/CVE-2021-27965](https://github.com/expFlash/CVE-2021-27965)
### CVE-2021-28079 (2021-04-26)
@ -13834,7 +13834,7 @@
<code>An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.
</code>
- [Exploitables/CVE-2021-44852](https://github.com/Exploitables/CVE-2021-44852)
- [expFlash/CVE-2021-44852](https://github.com/expFlash/CVE-2021-44852)
### CVE-2021-45007 (2022-02-20)
@ -17852,7 +17852,7 @@
</code>
- [uf0o/CVE-2020-17382](https://github.com/uf0o/CVE-2020-17382)
- [Exploitables/CVE-2020-17382](https://github.com/Exploitables/CVE-2020-17382)
- [expFlash/CVE-2020-17382](https://github.com/expFlash/CVE-2020-17382)
- [houseofxyz/CVE-2020-17382](https://github.com/houseofxyz/CVE-2020-17382)
### CVE-2020-17453 (2021-04-05)
@ -22545,7 +22545,7 @@
<code>The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
</code>
- [Exploitables/CVE-2019-18845](https://github.com/Exploitables/CVE-2019-18845)
- [expFlash/CVE-2019-18845](https://github.com/expFlash/CVE-2019-18845)
### CVE-2019-18873 (2019-11-11)
@ -23345,6 +23345,7 @@
- [bigsizeme/CVE-2018-2893](https://github.com/bigsizeme/CVE-2018-2893)
- [pyn3rd/CVE-2018-2893](https://github.com/pyn3rd/CVE-2018-2893)
- [qianl0ng/CVE-2018-2893](https://github.com/qianl0ng/CVE-2018-2893)
- [jas502n/CVE-2018-2893](https://github.com/jas502n/CVE-2018-2893)
- [ianxtianxt/CVE-2018-2893](https://github.com/ianxtianxt/CVE-2018-2893)
### CVE-2018-2894 (2018-07-18)
@ -23457,7 +23458,7 @@
<code>An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.
</code>
- [Exploitables/CVE-2018-3990-TALOS-2018-0658](https://github.com/Exploitables/CVE-2018-3990-TALOS-2018-0658)
- [expFlash/CVE-2018-3990](https://github.com/expFlash/CVE-2018-3990)
### CVE-2018-4013 (2018-10-19)
@ -24706,10 +24707,19 @@
- [SoledaD208/CVE-2018-10933](https://github.com/SoledaD208/CVE-2018-10933)
- [blacknbunny/CVE-2018-10933](https://github.com/blacknbunny/CVE-2018-10933)
- [hook-s3c/CVE-2018-10933](https://github.com/hook-s3c/CVE-2018-10933)
- [kn6869610/CVE-2018-10933](https://github.com/kn6869610/CVE-2018-10933)
- [leapsecurity/libssh-scanner](https://github.com/leapsecurity/libssh-scanner)
- [likescam/CVE-2018-10933_ssh](https://github.com/likescam/CVE-2018-10933_ssh)
- [likescam/CVE-2018-10933-libSSH-Authentication-Bypass](https://github.com/likescam/CVE-2018-10933-libSSH-Authentication-Bypass)
- [marco-lancini/hunt-for-cve-2018-10933](https://github.com/marco-lancini/hunt-for-cve-2018-10933)
- [hackerhouse-opensource/cve-2018-10933](https://github.com/hackerhouse-opensource/cve-2018-10933)
- [cve-2018/cve-2018-10933](https://github.com/cve-2018/cve-2018-10933)
- [jas502n/CVE-2018-10933](https://github.com/jas502n/CVE-2018-10933)
- [ninp0/cve-2018-10933_poc](https://github.com/ninp0/cve-2018-10933_poc)
- [pghook/CVE-2018-10933_Scanner](https://github.com/pghook/CVE-2018-10933_Scanner)
- [Virgula0/POC-CVE-2018-10933](https://github.com/Virgula0/POC-CVE-2018-10933)
- [shifa123/pythonprojects-CVE-2018-10933](https://github.com/shifa123/pythonprojects-CVE-2018-10933)
- [xFreed0m/CVE-2018-10933](https://github.com/xFreed0m/CVE-2018-10933)
- [Bifrozt/CVE-2018-10933](https://github.com/Bifrozt/CVE-2018-10933)
- [r3dxpl0it/CVE-2018-10933](https://github.com/r3dxpl0it/CVE-2018-10933)
@ -24771,6 +24781,7 @@
- [twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration](https://github.com/twseptian/cve-2018-11235-git-submodule-ce-and-docker-ngrok-configuration)
- [SenSecurity/exploit](https://github.com/SenSecurity/exploit)
- [EmaVirgRep/CVE-2018-11235](https://github.com/EmaVirgRep/CVE-2018-11235)
- [theerachaich/lab](https://github.com/theerachaich/lab)
### CVE-2018-11311 (2018-05-20)
@ -24887,6 +24898,13 @@
- [anmuxi-bai/CVE-2018-11790](https://github.com/anmuxi-bai/CVE-2018-11790)
### CVE-2018-12018 (2018-07-04)
<code>The GetBlockHeadersMsg handler in the LES protocol implementation in Go Ethereum (aka geth) before 1.8.11 may lead to an access violation because of an integer signedness error for the array index, which allows attackers to launch a Denial of Service attack by sending a packet with a -1 query.Skip value. The vulnerable remote node would be crashed by such an attack immediately, aka the EPoD (Ethereum Packet of Death) issue.
</code>
- [k3v142/CVE-2018-12018](https://github.com/k3v142/CVE-2018-12018)
### CVE-2018-12031 (2018-06-07)
<code>Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
@ -25198,6 +25216,7 @@
- [BasuCert/WinboxPoC](https://github.com/BasuCert/WinboxPoC)
- [msterusky/WinboxExploit](https://github.com/msterusky/WinboxExploit)
- [syrex1013/MikroRoot](https://github.com/syrex1013/MikroRoot)
- [jas502n/CVE-2018-14847](https://github.com/jas502n/CVE-2018-14847)
- [mahmoodsabir/mikrotik-beast](https://github.com/mahmoodsabir/mikrotik-beast)
- [Tr33-He11/winboxPOC](https://github.com/Tr33-He11/winboxPOC)
@ -29656,11 +29675,16 @@
</code>
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
- [piyokango/ghost](https://github.com/piyokango/ghost)
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
- [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc)
@ -29890,7 +29914,7 @@
</code>
- [Tare05/Intel-CVE-2015-2291](https://github.com/Tare05/Intel-CVE-2015-2291)
- [Exploitables/CVE-2015-2291](https://github.com/Exploitables/CVE-2015-2291)
- [expFlash/CVE-2015-2291](https://github.com/expFlash/CVE-2015-2291)
### CVE-2015-2315 (2015-03-17)
@ -32248,7 +32272,7 @@
<code>Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.
</code>
- [Exploitables/CVE-2010-4502](https://github.com/Exploitables/CVE-2010-4502)
- [expFlash/CVE-2010-4502](https://github.com/expFlash/CVE-2010-4502)
### CVE-2010-4804 (2011-06-09)
@ -32306,7 +32330,7 @@
<code>Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier, as distributed in SlySoft AnyDVD before 6.5.2.6, Virtual CloneDrive 5.4.2.3 and earlier, CloneDVD 2.9.2.0 and earlier, and CloneCD 5.3.1.3 and earlier, uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to cause a denial of service (system crash) via a crafted IOCTL call.
</code>
- [Exploitables/CVE-2009-0824](https://github.com/Exploitables/CVE-2009-0824)
- [expFlash/CVE-2009-0824](https://github.com/expFlash/CVE-2009-0824)
### CVE-2009-1151 (2009-03-26)
@ -32395,7 +32419,7 @@
<code>Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024.
</code>
- [Exploitables/CVE-2009-4049](https://github.com/Exploitables/CVE-2009-4049)
- [expFlash/CVE-2009-4049](https://github.com/expFlash/CVE-2009-4049)
### CVE-2009-4092 (2009-11-27)
@ -33096,6 +33120,7 @@
</code>
- [rafaelh/CVE-2000-0649](https://github.com/rafaelh/CVE-2000-0649)
- [stevenvegar/cve-2000-0649](https://github.com/stevenvegar/cve-2000-0649)
### CVE-2000-0979 (2001-01-22)