ts | title | url |
---|
ts | title | url |
---|---|---|
20210226 | Issue 2123: Microsoft DirectWrite heap-based buffer overflow in fsg_ExecuteGlyph while processing variable TTF fonts | https://bugs.chromium.org/p/project-zero/issues/detail?id=2123 |
20210226 | Fuzzing native Python extensions with Atheris | https://www.youtube.com/watch?v=oM-7lt43-GA |
20210226 | Issue 2163: Package Control: Arbitrary File Write on packagecontrol.io | https://bugs.chromium.org/p/project-zero/issues/detail?id=2163 |
20210226 | OPPO 对 Android App deeplinks 安全威胁的分析 | https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1359026676922851328 |
20210226 | 49 款 JSON Parsers 解析过程的差异以及由此带来的安全威胁 | https://labs.bishopfox.com/tech-blog/an-exploration-of-json-interoperability-vulnerabilities |
20210226 | Security of the Intel Graphics Stack - Part 2 - FW <-> GuC | https://igor-blue.github.io/2021/02/24/graphics-part2.html |
20210226 | 基于 cicuta_virosa 漏洞实现 iOS 内核任意地址读写 | https://github.com/pattern-f/TQ-pre-jailbreak |
20210226 | ISC BIND server GSSAPI SPNEGO 组件 RCE 漏洞分析(CVE-2020-8625) | https://www.thezdi.com/blog/2021/2/24/cve-2020-8625-a-fifteen-year-old-rce-bug-returns-in-isc-bind-server |
20210226 | Poisoning your Cache for 1000$ - Approach to Exploitation Walkthrough | https://galnagli.com/Cache_Poisoning/ |
ts | title | url |
---|---|---|
20210226 | An Exploration of JSON Interoperability Vulnerabilities | https://labs.bishopfox.com/tech-blog/an-exploration-of-json-interoperability-vulnerabilities |
20210226 | 美军网络空间作战理论体系初探 | https://mp.weixin.qq.com/s/Im-bacvc_1GGvLPtRspicw |
ts | cve_id | title | url | cve_detail |
---|---|---|---|---|
20210226T21:35:54Z | CVE-2021-21972 | Nmap script to check vulnerability CVE-2021-21972 | https://github.com/3dcyber/CVE-2021-21972 | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). |
20210226T19:42:15Z | CVE-2021-21972 | Null | https://github.com/alt3kx/CVE-2021-21972 | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). |
20210226T16:51:36Z | CVE-2021-25281 | Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack | https://github.com/Immersive-Labs-Sec/CVE-2021-25281 | 未查询到CVE信息 |
20210226T16:28:21Z | CVE-2021-21017 | Null | https://github.com/ZeusBox/CVE-2021-21017 | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
20210226T16:20:04Z | CVE-2021-21972 | VMware vCenter 未授权RCE(CVE-2021-21972) | https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972 | |
20210226T16:11:42Z | CVE-2021-21972 | A vulnerability scanner that detects CVE-2021-21972 vulnerabilities. | https://github.com/Osyanina/westone-CVE-2021-21972-scanner | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). |
20210226T15:43:00Z | CVE-2021-21972 | CVE-2021-21972 Exploit | https://github.com/NS-Sp4ce/CVE-2021-21972 | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). |
20210226T11:37:40Z | CVE-2021-21972 | CVE-2021-21972 | https://github.com/milo2012/CVE-2021-21972 | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). |
20210226T09:46:20Z | CVE-2021-21972 | Null | https://github.com/yaunsky/CVE-2021-21972 | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). |
20210226T06:13:02Z | CVE-2021-21972 | VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本 | https://github.com/B1anda0/CVE-2021-21972 | The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2). |
ts | title | url | stars | forks |
---|---|---|---|---|
20210226T23:23:46Z | C library to support Map2Check Tool | https://github.com/hbgit/map2check-library | 0 | 0 |
20210226T14:26:42Z | KLEE Symbolic Execution Engine | https://github.com/klee/klee | 1635 | 483 |
20210226T12:35:38Z | Spring 2021 Geography 817 work folder | https://github.com/klee12/klee12.github.io | 0 | 0 |
ts | title | url | stars | forks |
---|
ts | title | url | stars | forks |
---|---|---|---|---|
20210226T23:01:40Z | Extensible framework for analyzing publicly available information about vulnerabilities | https://github.com/leonov-av/vulristics | 23 | 1 |
20210226T22:28:22Z | All Files, Scripts, and exploits can be found here | https://github.com/LMS57/TempleOfPwn | 1 | 0 |
20210226T22:07:24Z | CTF framework and exploit development library | https://github.com/Gallopsled/pwntools | 7569 | 1359 |
20210226T22:06:25Z | This is a repo for the coding done for CTFs / exploits. The writeups are here: https://github.com/dillonwu-97/csec_writeups | https://github.com/dillonwu-97/csec-code | 0 | 0 |
20210226T21:42:39Z | COMING SOON | https://github.com/rcegod/Discord-Rce-Exploit | 0 | 0 |
20210226T21:37:29Z | See every channel that exists even if you don%t have permission | https://github.com/owersite/channel-exploit | 0 | 0 |
20210226T21:36:57Z | Discord Voice DDoS Exploit | https://github.com/owersite/discord-voice-ddos | 1 | 0 |
20210226T21:36:45Z | Archive of Discord Tools & Exploits made / edited / fixed by me | https://github.com/owersite/discord-exploits | 1 | 0 |
20210226T21:36:41Z | Discord Invisible Tag Exploit | https://github.com/owersite/invisible-tag | 3 | 0 |
20210226T21:36:33Z | Another Discord Exploit! | https://github.com/owersite/edit-exploit | 1 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20210226T22:24:53Z | Fud Persistent Windows Backdoor developed purely in python | https://github.com/swagkarna/Chuvi-Botnet | 12 | 5 |
20210226T20:45:34Z | 🔌 A minecraft plugin which allow you to execute OS commands | https://github.com/L1ghtM4n/BackdoorPlugin | 1 | 0 |
20210226T15:18:45Z | Kumpulan Shell Backdoor | https://github.com/yogiganzz/Shell | 0 | 0 |
20210226T08:10:37Z | A sample app to demonstrate how to create Xamarin UITests using the Page Object architecture, Backdoor Methods and App Links (aka Deep Linking) | https://github.com/brminnick/UITestSampleApp | 33 | 25 |
20210226T01:08:20Z | Python Backdoor Generator | https://github.com/grenoxx/Back-X | 5 | 1 |
ts | title | url | stars | forks |
---|---|---|---|---|
20210226T23:17:46Z | Needed help | https://github.com/sarce77/fuzzy-dollop | 0 | 0 |
20210226T22:52:01Z | Null | https://github.com/docfate111/awful-JS-fuzzer | 0 | 0 |
20210226T22:43:05Z | Final project for BMI 540, looking at how entropy can be used to describe fuzzy c-means clustering. | https://github.com/MargaretHall/Fuzzy_cMean_entropy | 0 | 0 |
20210226T22:33:43Z | The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more! | https://github.com/AFLplusplus/AFLplusplus | 1334 | 293 |
20210226T22:33:34Z | Automatic Firmware Analysis of Embedded Linux Devices as Preparation for Security Testing / Fuzzing | https://github.com/efi4st/efi4st | 5 | 3 |
20210226T22:03:15Z | Scalable fuzzing infrastructure. | https://github.com/google/clusterfuzz | 4440 | 421 |
20210226T21:53:36Z | jimiPlugin for fuzzy matching of strings | https://github.com/z1pti3/jimiPlugin-fuzzymatch | 0 | 0 |
20210226T21:51:48Z | Null | https://github.com/ElizBth/Reactive-Navigation-Under-a-Fuzzy-Rules-Based-Scheme-and-Reinforcement-Learning | 0 | 0 |
20210226T20:49:59Z | 🏆 Collection of bugs uncovered by fuzzing Rust code | https://github.com/rust-fuzz/trophy-case | 219 | 34 |
20210226T20:42:56Z | Null | https://github.com/Iffern/FuzzyLogic | 0 | 0 |