ts | title | url |
---|
ts | title | url |
---|
ts | cve_id | title | url | cve_detail |
---|---|---|---|---|
20230113T23:48:54Z | CVE-2023-21599 | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21599 | |
20230113T23:48:50Z | CVE-2023-21598 | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21598 | |
20230113T23:48:47Z | CVE-2023-21597 | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21597 | |
20230113T23:48:43Z | CVE-2023-21596 | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21596 | |
20230113T23:48:39Z | CVE-2023-21595 | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21595 | |
20230113T23:48:34Z | CVE-2023-21594 | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21594 | |
20230113T23:48:30Z | CVE-2022-45299 | An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2022-45299 | |
20230113T23:48:24Z | CVE-2022-42136 | Authenticated mail users, under specific circumstances, could add files with unsanitized content in public folders where the IIS user had permission to access. That action, could lead an attacker to store arbitrary code on that files and execute RCE commands. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2022-42136 | |
20230113T23:48:20Z | CVE-2021-36204 | Under some circumstances an Insufficiently Protected Credentials vulnerability in Johnson Controls Metasys ADS/ADX/OAS 10 versions prior to 10.1.6 and 11 versions prior to 11.0.3 allows API calls to expose credentials in plain text. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2021-36204 | |
20230113T23:48:07Z | CVE-2022-32294 | ** DISPUTED ** Zimbra Collaboration Open Source 8.8.15 does not encrypt the initial-login randomly created password (from the "zmprove ca" command). It is visible in cleartext on port UDP 514 (aka the syslog port). NOTE: a third party reports that this cannot be reproduced. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2022-32294 |
ts | title | url | stars | forks |
---|---|---|---|---|
20230113T14:56:21Z | contains the code and data to accompany the publication of the pyKleeBarcode software (https://github.com/WandrilleD/pyKleeBarcode) | https://github.com/WandrilleD/pyKleeBarcode-publication-supporting-code-and-data | 0 | 0 |
20230113T11:49:42Z | Collection of Kicad 6.0 symbols, footprints and 3D models useful in keyboard creation | https://github.com/crides/kleeb | 68 | 6 |
20230113T06:15:38Z | Symbiotic is a tool for finding bugs in computer programs based on instrumentation, program slicing and KLEE | https://github.com/staticafi/symbiotic | 268 | 50 |
20230113T04:15:18Z | An open-source Simplified Chinese font derived from Klee One. | https://github.com/lxgw/LxgwWenkaiGB | 188 | 1 |
20230113T00:14:42Z | Null | https://github.com/klee2024/klee2024.github.io | 0 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20230113T18:45:53Z | Null | https://github.com/turbocanary/turbotest_r6aikmfr_s2e79up1 | 0 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20230113T23:51:19Z | A bot which identify and exploit arbitrages on the Osmosis AMM DeFi plateform | https://github.com/FocSon/OsmosisArbitrage | 0 | 0 |
20230113T23:48:54Z | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21599 | 0 | 0 |
20230113T23:48:50Z | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21598 | 0 | 0 |
20230113T23:48:47Z | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21597 | 0 | 0 |
20230113T23:48:43Z | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21596 | 0 | 0 |
20230113T23:48:39Z | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21595 | 0 | 0 |
20230113T23:48:34Z | Adobe InCopy versions 18.0 (and earlier), 17.4 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. CVE project by @Sn0wAlice | https://github.com/Live-Hack-CVE/CVE-2023-21594 | 0 | 0 |
20230113T20:59:32Z | One of the BEST up to date iReady hacks. Similar to iReady Overload. | https://github.com/notplu/Nullify | 19 | 19 |
20230113T13:35:42Z | GitOps Repository | https://github.com/redhat-appstudio-qe/multi-component-application-pbQoQ-enable-exploit | 0 | 0 |
20230113T13:31:45Z | A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation. | https://github.com/skahwah/SQLRecon | 263 | 63 |
ts | title | url | stars | forks |
---|---|---|---|---|
20230113T14:03:21Z | Kernel rk | https://github.com/carloslack/KoviD | 105 | 25 |
20230113T13:47:03Z | Null | https://github.com/guowei-cn/universal-defence-of-backdoor-attack | 0 | 0 |
20230113T10:59:14Z | This tool is used for backdoor and shellcode generation for various architecture devices | https://github.com/doudoudedi/hackEmbedded | 24 | 2 |
20230113T07:01:09Z | Null | https://github.com/sunbing7/backdoors | 1 | 0 |
20230113T05:43:56Z | Null | https://github.com/fatih98/backdoor | 1 | 0 |
20230113T04:09:57Z | A curated list of trustworthy deep learning papers. Daily updating... | https://github.com/MinghuiChen43/awesome-trustworthy-deep-learning | 103 | 13 |
ts | title | url | stars | forks |
---|---|---|---|---|
20230113T19:30:43Z | Symbolic execution tool | https://github.com/trailofbits/manticore | 3270 | 462 |
20230113T19:27:32Z | The symbolic execution engine powering the K Framework | https://github.com/runtimeverification/haskell-backend | 182 | 42 |
20230113T02:35:48Z | FuzzBALL: Vine-based Binary Symbolic Execution | https://github.com/bitblaze-fuzzball/fuzzball | 208 | 54 |
20230113T01:32:12Z | ToolChain using Symbolic Execution for Malware Analysis. | https://github.com/csvl/SEMA-ToolChain | 12 | 7 |
ts | title | url | stars | forks |
---|---|---|---|---|
20230113T21:10:57Z | DroneSecurity (NDSS 2023) | https://github.com/RUB-SysSec/DroneSecurity | 1 | 0 |
20230113T08:31:43Z | Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS%23). | https://github.com/dongtsi/OWAD | 4 | 0 |
ts | title | url | stars | forks |
---|---|---|---|---|
20230113T23:28:28Z | OSS-Fuzz - continuous fuzzing for open source software. | https://github.com/google/oss-fuzz | 8272 | 1803 |
20230113T22:35:39Z | Scalable fuzzing infrastructure. | https://github.com/google/clusterfuzz | 4921 | 509 |
20230113T20:26:15Z | Null | https://github.com/gabriel-furquim/fuzzy-succotash | 0 | 0 |
20230113T20:19:23Z | Null | https://github.com/Krystian120413/air-quality-fuzzy-driver | 0 | 0 |
20230113T17:02:23Z | Null | https://github.com/Emerald-Lake/fuzzy-friends | 0 | 7 |
20230113T13:15:24Z | A full-featured open-source Wi-Fi fuzzer | https://github.com/efchatz/WPAxFuzz | 10 | 0 |
20230113T12:44:31Z | A fuzzer for full VM kernel/driver targets | https://github.com/IntelLabs/kAFL | 406 | 71 |
20230113T12:27:04Z | Ethereum smart contract fuzzer | https://github.com/crytic/echidna | 1865 | 240 |
20230113T12:24:53Z | Differential fuzzer for testing different versions of the Kotlin compiler | https://github.com/ciselab/kotlin-compiler-fuzzer | 0 | 0 |
20230113T10:41:12Z | A grammar based feedback Fuzzer | https://github.com/nautilus-fuzz/nautilus | 336 | 49 |