-
Notifications
You must be signed in to change notification settings - Fork 855
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
a7fb81c
commit 3ca66ef
Showing
95 changed files
with
1,100 additions
and
27 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-1999-0199](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0199) | ||
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) | ||
|
||
### Description | ||
|
||
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999. | ||
|
||
### POC | ||
|
||
#### Reference | ||
No PoCs from references. | ||
|
||
#### Github | ||
- https://github.com/u91738/cvematch | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-14629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629) | ||
![](https://img.shields.io/static/v1?label=Product&message=samba&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400&color=brighgreen) | ||
|
||
### Description | ||
|
||
A denial of service vulnerability was discovered in Samba's LDAP server before versions 4.7.12, 4.8.7, and 4.9.3. A CNAME loop could lead to infinite recursion in the server. An unprivileged local attacker could create such an entry, leading to denial of service. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://usn.ubuntu.com/3827-2/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-16841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841) | ||
![](https://img.shields.io/static/v1?label=Product&message=samba&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416&color=brighgreen) | ||
|
||
### Description | ||
|
||
Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://usn.ubuntu.com/3827-2/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-16851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851) | ||
![](https://img.shields.io/static/v1?label=Product&message=samba&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-476&color=brighgreen) | ||
|
||
### Description | ||
|
||
Samba from version 4.0.0 and before versions 4.7.12, 4.8.7, 4.9.3 is vulnerable to a denial of service. During the processing of an LDAP search before Samba's AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process. There is no further vulnerability associated with this issue, merely a denial of service. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://usn.ubuntu.com/3827-2/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-21124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21124) | ||
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) | ||
|
||
### Description | ||
|
||
NETGEAR WAC510 devices before 5.0.0.17 are affected by privilege escalation. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://kb.netgear.com/000060234/Security-Advisory-for-a-Vertical-Privilege-Escalation-on-WAC510-PSV-2018-0260 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-25055](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25055) | ||
![](https://img.shields.io/static/v1?label=Product&message=FarCry%20Solr%20Pro%20Plugin&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://github.com/jeffcoughlin/farcrysolrpro/issues/78 | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2021-39236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39236) | ||
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Ozone&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=1.0%3C%3D%201.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%20Incorrect%20Authorization&color=brighgreen) | ||
|
||
### Description | ||
|
||
In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user. | ||
|
||
### POC | ||
|
||
#### Reference | ||
No PoCs from references. | ||
|
||
#### Github | ||
- https://github.com/fkie-cad/nvd-json-data-feeds | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-0329](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0329) | ||
![](https://img.shields.io/static/v1?label=Product&message=Elementor%20Website%20Builder&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.12.2%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen) | ||
|
||
### Description | ||
|
||
The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-26035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26035) | ||
![](https://img.shields.io/static/v1?label=Product&message=zoneminder&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.36.33%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%3A%20Missing%20Authorization&color=brighgreen) | ||
|
||
### Description | ||
|
||
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-31230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31230) | ||
![](https://img.shields.io/static/v1?label=Product&message=Baidu%20Tongji%20generator&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%3C%3D%201.0.2%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) | ||
|
||
### Description | ||
|
||
Cross-Site Request Forgery (CSRF) vulnerability in Haoqisir Baidu Tongji generator allows Stored XSS.This issue affects Baidu Tongji generator: from n/a through 1.0.2. | ||
|
||
### POC | ||
|
||
#### Reference | ||
No PoCs from references. | ||
|
||
#### Github | ||
- https://github.com/hackintoanetwork/hackintoanetwork | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-31754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31754) | ||
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) | ||
|
||
### Description | ||
|
||
Optimizely CMS UI before v12.16.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Admin panel. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-32741](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32741) | ||
![](https://img.shields.io/static/v1?label=Product&message=Contact%20Form%20to%20Any%20API&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brighgreen) | ||
|
||
### Description | ||
|
||
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in IT Path Solutions PVT LTD Contact Form to Any API allows SQL Injection.This issue affects Contact Form to Any API: from n/a through 1.1.2. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- http://packetstormsecurity.com/files/175654/WordPress-Contact-Form-To-Any-API-1.1.2-SQL-Injection.html | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-32832](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32832) | ||
![](https://img.shields.io/static/v1?label=Product&message=MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8797%2C%20MT8798&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Android%2012.0%2C%2013.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) | ||
|
||
### Description | ||
|
||
In video, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08235273; Issue ID: ALPS08235273. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- http://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-32837](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32837) | ||
![](https://img.shields.io/static/v1?label=Product&message=MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT8797%2C%20MT8798&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Android%2012.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) | ||
|
||
### Description | ||
|
||
In video, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08235273; Issue ID: ALPS08250357. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- http://packetstormsecurity.com/files/175665/mtk-jpeg-Driver-Out-Of-Bounds-Read-Write.html | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2023-35877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35877) | ||
![](https://img.shields.io/static/v1?label=Product&message=Extra%20User%20Details&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) | ||
|
||
### Description | ||
|
||
Cross-Site Request Forgery (CSRF) vulnerability in Vadym K. Extra User Details allows Stored XSS.This issue affects Extra User Details: from n/a through 0.5. | ||
|
||
### POC | ||
|
||
#### Reference | ||
No PoCs from references. | ||
|
||
#### Github | ||
- https://github.com/hackintoanetwork/hackintoanetwork | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
### [CVE-2023-36576](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36576) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2021H2&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2022H2&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2021H2&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%2011%20version%2022H2&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue) | ||
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202022&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.14393.6351%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.17763.4974%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19041.3570%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.19045.3570%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.20348.2031%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22000.2538%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%3C%2010.0.22621.2428%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
Windows Kernel Information Disclosure Vulnerability | ||
|
||
### POC | ||
|
||
#### Reference | ||
- http://packetstormsecurity.com/files/175659/Windows-Kernel-Containerized-Registry-Escape.html | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.