The Wayback Machine - https://web.archive.org/web/20201227183822/https://github.com/topics/cve
Skip to content
#

cve

Here are 334 public repositories matching this topic...

渗透测试有关的POC、EXP、脚本、提权、小工具等,欢迎补充、完善---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

  • Updated Dec 27, 2020
  • PowerShell

Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530

  • Updated Dec 15, 2020
  • Python

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber

  • Updated Dec 15, 2020
  • C
terriko
terriko commented Dec 7, 2020

It looks like the version strings in ICU have changed so newer version numbers (e.g. 50.2) aren't being detected correctly. This probably means we need to add a signature in the icu checker (don't delete the old ones, they work for older versions still, we need to add an additional signature)

For beginners looking at this bug... the icu checker can be found here:
https://github.com/intel/cve-

Improve this page

Add a description, image, and links to the cve topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cve topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.