misc
Name | misc |
---|---|
Registration | 10/25/2016 |
Community Points | 4409 |
Submits | 51 |
Commits | 1525 |
Posts | 21 |
Votes | 0 |
Community Rank | Master |
Activity Badges | 👴 Long-time User (8x) 💻 Digital Nomad (4x) 🔬 Researcher (5x) 🚨 Staying Alert 🖖 Community Member (88x) 👋 Regular Visitor (11x) 📤 Submitter (9x) 📝 Editor (151x) 💬 Commentator (4x) |
Submits (51)
Timeline
The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.
Commits (1525)
Timeline
The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.
Posts (21)
Timeline
The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.
Date | Entry | Comment | V | Status |
---|---|---|---|---|
10/11/2023 | 231296 | Python script to check if a service is vulnerable: https://github.com/BishopFox/CVE-2023-27997-check | 0 | Accepted |
06/30/2021 | 176473 | There is another proof of concept based on impacked: https://github.com/cube0x0/CVE-2021-1675 | 2 | Accepted |
03/12/2021 | 170592 | There are 2 different exploits at the moment, one written in python and another in go. The exploit code of Jang was removed by GitHub, and was later made available on Web Archive and GitLab. Here are two links to the exploit code: https://git.blackmarble.s… | 0 | Accepted |
03/09/2021 | 170592 | Nmap script from Microsoft to detect if an Exchange Server is vulnerable: https://github.com/microsoft/CSS-Exchange/blob/main/Security/http-vuln-cve2021-26855.nse | 1 | Accepted |
01/31/2021 | 168695 | The exploit in the previous comment is also available on GitHub: https://github.com/blasty/CVE-2021-3156 | 1 | Accepted |
01/31/2021 | 168695 | There is another exploit available under the URL https://haxx.in/CVE-2021-3156.tar.gz. | 1 | Accepted |
09/14/2020 | 159502 | And here is another exploit from dirkjanm: https://github.com/dirkjanm/CVE-2020-1472/blob/master/cve-2020-1472-exploit.py | 0 | Accepted |
09/14/2020 | 159502 | After SecuraBV had published a testing script, there is now a proof of concept exploit from BlackArrow: https://github.com/blackarrowsec/redteam-research/blob/master/CVE-2020-1472/CVE-2020-1472.py | 0 | Accepted |
08/12/2020 | 159525 | There is another exploit for this vulnerability: https://github.com/sailay1996/cve-2020-1337-poc | 1 | Accepted |
01/12/2020 | 147804 | Additional exploit and scanner from TrustedSec: https://github.com/trustedsec/cve-2019-19781 | 1 | Accepted |
01/05/2020 | 133407 | The exploit is available in Metasploit as well: "https://www.rapid7.com/db/modules/exploit/windows/http/tomcat_cgi_cmdlineargs" | 0 | Accepted |
01/05/2020 | 136570 | The exploit is available in Metasploit as well: "https://www.rapid7.com/db/modules/exploit/linux/local/servu_ftp_server_prepareinstallation_priv_esc" | 0 | Accepted |
12/30/2019 | 143087 | There is now a Metasploit module for this vulnerability (https://www.rapid7.com/db/modules/exploit/windows/local/comahawk). | 0 | Accepted |
12/30/2019 | 145369 | There is now a Metasploit module for this vulnerability (https://www.rapid7.com/db/modules/exploit/windows/local/comahawk). | 0 | Accepted |
12/30/2019 | 147035 | There is now a Metasploit module for this vulnerability (https://www.rapid7.com/db/modules/exploit/openbsd/local/dynamic_loader_chpass_privesc) | 0 | Accepted |
12/17/2019 | 94127 | There is another exploit for this vulnerability: https://www.exploit-db.com/exploits/47782 | 0 | Accepted |
12/15/2019 | 146798 | The exploit is available in Metasploit as well: https://www.exploit-db.com/exploits/47772 | 0 | Accepted |
11/21/2019 | 125954 | There is now an exploit available in Metasploit called "Xorg X11 Server Local Privilege Escalation", see https://www.exploit-db.com/exploits/47701 | 1 | Accepted |
11/08/2019 | 144257 | The exploit was ported to Metasploit Framework as "rConfig install Command Execution" on 2019-11-08. | 0 | Accepted |
10/29/2019 | 142917 | Additional exploit on GitHub available: https://github.com/dorkerdevil/CVE-2019-11932. This exploit is based on the work of awakened1712. | 0 | Accepted |
10/26/2019 | 138210 | The exploit is also now part of the Metasploit Framework. | 0 | Accepted |