mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
Update CVE sources 2024-07-25 21:25
This commit is contained in:
@@ -28,6 +28,7 @@ No PoCs from references.
|
||||
- https://github.com/CCIEVoice2009/oscp-survival
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/CYBER-PUBLIC-SCHOOL/linux-privilege-escalation-cheatsheet
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/DhivaKD/OSCP-Notes
|
||||
- https://github.com/DictionaryHouse/The-Security-Handbook-Kali-Linux
|
||||
@@ -57,6 +58,7 @@ No PoCs from references.
|
||||
- https://github.com/T3b0g025/PWK-CheatSheet
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/akr3ch/OSCP-Survival-Guide
|
||||
- https://github.com/aktechnohacker/OSCP-Notes
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
@@ -104,6 +106,7 @@ No PoCs from references.
|
||||
- https://github.com/kicku6/Opensource88888
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/kyuna312/Linux_menthor
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/make0day/pentest
|
||||
- https://github.com/manas3c/OSCP-note
|
||||
|
||||
@@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/VictorSum/13.1
|
||||
- https://github.com/Wernigerode23/Uiazvimosty
|
||||
- https://github.com/Zhivarev/13-01-hw
|
||||
- https://github.com/bigb0x/CVE-2024-6387
|
||||
- https://github.com/kaio6fellipe/ssh-enum
|
||||
- https://github.com/scmanjarrez/CVEScannerV2
|
||||
- https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems
|
||||
|
||||
17
2012/CVE-2012-0816.md
Normal file
17
2012/CVE-2012-0816.md
Normal file
@@ -0,0 +1,17 @@
|
||||
### [CVE-2012-0816](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0816)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/bigb0x/CVE-2024-6387
|
||||
|
||||
@@ -22,6 +22,7 @@ The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.
|
||||
- https://github.com/Kiosec/Windows-Exploitation
|
||||
- https://github.com/Qftm/Information_Collection_Handbook
|
||||
- https://github.com/amishamunjal-az/Week16-Homework
|
||||
- https://github.com/casohub/multinmap
|
||||
- https://github.com/esteban0477/RedTeamPlaybook
|
||||
- https://github.com/jlashay/Penetration-Testing-1
|
||||
- https://github.com/joneswu456/rt-n56u
|
||||
|
||||
@@ -15,6 +15,7 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/0day666/Vulnerability-verification
|
||||
- https://github.com/20142995/Goby
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
- https://github.com/4ARMED/nmap-nse-scripts
|
||||
- https://github.com/7hang/cyber-security-interview
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
|
||||
@@ -18,5 +18,6 @@ No PoCs from references.
|
||||
- https://github.com/akircanski/coinbugs
|
||||
- https://github.com/dmp1ce/eloipool-docker
|
||||
- https://github.com/fmerg/pymerkle
|
||||
- https://github.com/slowmist/Cryptocurrency-Security-Audit-Guide
|
||||
- https://github.com/uvhw/conchimgiangnang
|
||||
|
||||
|
||||
@@ -30,6 +30,7 @@ libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
||||
@@ -14,4 +14,5 @@ Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/gnarkill78/CSA_S2_2024
|
||||
|
||||
|
||||
@@ -14,4 +14,5 @@ Cross-site scripting (XSS) vulnerability in libs/xing.php in the 2 Click Social
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/gnarkill78/CSA_S2_2024
|
||||
|
||||
|
||||
@@ -14,4 +14,5 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/gnarkill78/CSA_S2_2024
|
||||
|
||||
|
||||
@@ -13,6 +13,7 @@ Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/SinghNanak/apache-dos
|
||||
- https://github.com/h0ussni/pwnloris
|
||||
- https://github.com/nsdhanoa/apache-dos
|
||||
|
||||
|
||||
Reference in New Issue
Block a user