Skip to content

Commit 33ccded

Browse files
committed
fix some bugs:crystal_ball:
1 parent 9b5882a commit 33ccded

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

71 files changed

+745
-1867
lines changed

README.CN.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ http://kernelhub.ascotbe.com
3838
| [CVE-2021-36934](./CVE-2021-36934) | Windows Elevation | Windows 10 |
3939
| [CVE-2021-34527](./TestFailure/CVE-2021-34527) | Windows Print Spooler Remote Code Execution | Windows 7/8/10/2008/2012/2016/2019/2022/Server |
4040
| [CVE-2021-33739](./CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server |
41+
| [CVE-2021-31166](./TestFailure/CVE-2021-31166) | HTTP Protocol Stack | Windows 10/Server |
4142
| [CVE-2021-26868](./CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server |
4243
| [CVE-2021-21551](./TestFailure/CVE-2021-21551) | None | None |
4344
| [CVE-2021-1732](./CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server |
@@ -79,7 +80,6 @@ http://kernelhub.ascotbe.com
7980
| [CVE-2018-8440](./TestFailure/CVE-2018-8440) | Windows ALPC Elevation | Windows 7/8/10/2008/2012/2016 |
8081
| [CVE-2018-8120](./CVE-2018-8120) | Win32k Elevation | Windows 7/2008 |
8182
| [CVE-2018-1038](./TestFailure/CVE-2018-1038) | Windows Kernel Elevation | Windows 7/2008 |
82-
| [CVE-2018-0743](./TestFailure/CVE-2018-0743) | Windows Subsystem for Linux Elevation | Windows 10/2016 |
8383
| [CVE-2018-0833](./CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 |
8484
| [CVE-2018-0886](./TestFailure/CVE-2018-0886) | CredSSP Remote Code Execution | Windows 7/8/10/2008/2012/2016/2019/Server |
8585
| [CVE-2018-0824](./TestFailure/CVE-2018-0824) | COM for Windows Remote Code Execution | Windows 7/8/10/2008/2012/2016/Server |
@@ -214,11 +214,11 @@ http://kernelhub.ascotbe.com
214214
| CVE-2011-0045| CVE-2011-1237| CVE-2013-0008| CVE-2013-1300| CVE-2013-5065|
215215
| CVE-2014-6321| CVE-2014-6324| CVE-2015-0002| CVE-2015-0062| CVE-2015-1725|
216216
| CVE-2016-3309| CVE-2017-0005| CVE-2017-0100| CVE-2017-0263| CVE-2017-11783|
217-
| CVE-2017-8465| CVE-2018-0743| CVE-2018-0824| CVE-2018-0886| CVE-2018-1038|
218-
| CVE-2018-8440| CVE-2019-0708| CVE-2019-0859| CVE-2019-0863| CVE-2019-0986|
219-
| CVE-2019-1040| CVE-2019-1215| CVE-2019-1253| CVE-2019-1322| CVE-2019-1422|
220-
| CVE-2020-0624| CVE-2020-0814| CVE-2020-1350| CVE-2020-1362| CVE-2020-17057|
221-
| CVE-2020-17087| CVE-2021-1709| CVE-2021-21551| CVE-2021-34527| CVE-2021-43224|
217+
| CVE-2017-8465| CVE-2018-0824| CVE-2018-0886| CVE-2018-1038| CVE-2018-8440|
218+
| CVE-2019-0708| CVE-2019-0859| CVE-2019-0863| CVE-2019-0986| CVE-2019-1040|
219+
| CVE-2019-1215| CVE-2019-1253| CVE-2019-1322| CVE-2019-1422| CVE-2020-0624|
220+
| CVE-2020-0814| CVE-2020-1350| CVE-2020-1362| CVE-2020-17057| CVE-2020-17087|
221+
| CVE-2021-1709| CVE-2021-21551| CVE-2021-31166| CVE-2021-34527| CVE-2021-43224|
222222
| CVE-2021-43883 |
223223

224224

README.md

+6-6
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@
3333
| [CVE-2021-36934](./CVE-2021-36934) | Windows Elevation | Windows 10 |
3434
| [CVE-2021-34527](./TestFailure/CVE-2021-34527) | Windows Print Spooler Remote Code Execution | Windows 7/8/10/2008/2012/2016/2019/2022/Server |
3535
| [CVE-2021-33739](./CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server |
36+
| [CVE-2021-31166](./TestFailure/CVE-2021-31166) | HTTP Protocol Stack | Windows 10/Server |
3637
| [CVE-2021-26868](./CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server |
3738
| [CVE-2021-21551](./TestFailure/CVE-2021-21551) | None | None |
3839
| [CVE-2021-1732](./CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server |
@@ -74,7 +75,6 @@
7475
| [CVE-2018-8440](./TestFailure/CVE-2018-8440) | Windows ALPC Elevation | Windows 7/8/10/2008/2012/2016 |
7576
| [CVE-2018-8120](./CVE-2018-8120) | Win32k Elevation | Windows 7/2008 |
7677
| [CVE-2018-1038](./TestFailure/CVE-2018-1038) | Windows Kernel Elevation | Windows 7/2008 |
77-
| [CVE-2018-0743](./TestFailure/CVE-2018-0743) | Windows Subsystem for Linux Elevation | Windows 10/2016 |
7878
| [CVE-2018-0833](./CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 |
7979
| [CVE-2018-0886](./TestFailure/CVE-2018-0886) | CredSSP Remote Code Execution | Windows 7/8/10/2008/2012/2016/2019/Server |
8080
| [CVE-2018-0824](./TestFailure/CVE-2018-0824) | COM for Windows Remote Code Execution | Windows 7/8/10/2008/2012/2016/Server |
@@ -210,11 +210,11 @@ The following numbers are all CVEs that failed to pass the recurrence test after
210210
| CVE-2011-0045| CVE-2011-1237| CVE-2013-0008| CVE-2013-1300| CVE-2013-5065|
211211
| CVE-2014-6321| CVE-2014-6324| CVE-2015-0002| CVE-2015-0062| CVE-2015-1725|
212212
| CVE-2016-3309| CVE-2017-0005| CVE-2017-0100| CVE-2017-0263| CVE-2017-11783|
213-
| CVE-2017-8465| CVE-2018-0743| CVE-2018-0824| CVE-2018-0886| CVE-2018-1038|
214-
| CVE-2018-8440| CVE-2019-0708| CVE-2019-0859| CVE-2019-0863| CVE-2019-0986|
215-
| CVE-2019-1040| CVE-2019-1215| CVE-2019-1253| CVE-2019-1322| CVE-2019-1422|
216-
| CVE-2020-0624| CVE-2020-0814| CVE-2020-1350| CVE-2020-1362| CVE-2020-17057|
217-
| CVE-2020-17087| CVE-2021-1709| CVE-2021-21551| CVE-2021-34527| CVE-2021-43224|
213+
| CVE-2017-8465| CVE-2018-0824| CVE-2018-0886| CVE-2018-1038| CVE-2018-8440|
214+
| CVE-2019-0708| CVE-2019-0859| CVE-2019-0863| CVE-2019-0986| CVE-2019-1040|
215+
| CVE-2019-1215| CVE-2019-1253| CVE-2019-1322| CVE-2019-1422| CVE-2020-0624|
216+
| CVE-2020-0814| CVE-2020-1350| CVE-2020-1362| CVE-2020-17057| CVE-2020-17087|
217+
| CVE-2021-1709| CVE-2021-21551| CVE-2021-31166| CVE-2021-34527| CVE-2021-43224|
218218
| CVE-2021-43883 |
219219

220220

TestFailure/CVE-2005-1983/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2005-1983
2323

2424
#### 项目来源
2525

26-
-
26+
- None
2727

2828
#### 分析文章
2929
- https://blog.csdn.net/tomqq/article/details/1951128

TestFailure/CVE-2005-1983/README_EN.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The vulnerability does not test, the root directory is stored in the network col
2323

2424
#### ProjectSource
2525

26-
-
26+
- None
2727

2828
#### Analyse
2929

TestFailure/CVE-2009-0079/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2009-0079
2727

2828
#### 项目来源
2929

30-
-
30+
- None
3131

3232
#### 分析文章
3333

TestFailure/CVE-2009-0079/README_EN.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The vulnerability does not test, the root directory is stored in the network col
2323

2424
#### ProjectSource
2525

26-
-
26+
- None
2727

2828
#### Analyse
2929

TestFailure/CVE-2010-2554/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2010-2554
2727

2828
#### 项目来源
2929

30-
-
30+
- None

TestFailure/CVE-2010-2554/README_EN.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ The vulnerability does not test, the root directory is stored in the network col
2727

2828
#### ProjectSource
2929

30-
-
30+
- None
9.92 KB
Binary file not shown.

TestFailure/CVE-2011-0045/README.md

+11-1
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,19 @@
1010
| ---------- | ---------------- | ------- | ------ | ------ |
1111
| Windows Xp | | | SP3 | |
1212

13+
#### 修复补丁
14+
15+
```
16+
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2011-0045
17+
```
18+
1319
#### 利用方式
1420

15-
暂无
21+
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC,代码状态未知
22+
23+
#### 项目来源
24+
25+
- None
1626

1727
#### 分析文章
1828
- https://blog.csdn.net/QEver/article/details/6227415
+34
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
### CVE-2011-0045
2+
3+
#### Describe
4+
5+
The Trace Events functionality in the kernel in Microsoft Windows XP SP3 does not properly perform type conversion, which causes integer truncation and insufficient memory allocation and triggers a buffer overflow, which allows local users to gain privileges via a crafted application, related to WmiTraceMessageVa, aka "Windows Kernel Integer Truncation Vulnerability."
6+
7+
#### ImpactVersion
8+
9+
| Product | CPU Architecture | Version | Update | Tested |
10+
| ---------- | ---------------- | ------- | ------ | ------ |
11+
| Windows Xp | | | SP3 | |
12+
13+
#### Patch
14+
15+
```
16+
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2011-0045
17+
```
18+
19+
#### Utilization
20+
21+
The vulnerability does not test, the root directory is stored in the network collection **[CVE number] .zip** EXP or POC, code status unknown
22+
23+
#### ProjectSource
24+
25+
- None
26+
27+
#### Analyse
28+
29+
- https://blog.csdn.net/QEver/article/details/6227415
30+
- https://www.geek-share.com/detail/2510409740.html
31+
- https://bbs.pediy.com/thread-130487.htm
32+
33+
34+
12.4 KB
Binary file not shown.

TestFailure/CVE-2013-0008/README.md

+11-1
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,16 @@
1818
| Windows Server 2012 | | | | |
1919
| Windows Vista | | | SP2 | |
2020

21+
#### 修复补丁
22+
23+
```
24+
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1215
25+
```
26+
2127
#### 利用方式
2228

23-
暂无
29+
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC,代码状态未知
30+
31+
#### 项目来源
32+
33+
- None
+36
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
### CVE-2013-0008
2+
3+
#### Describe
4+
5+
win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."
6+
7+
#### ImpactVersion
8+
9+
| Product | CPU Architecture | Version | Update | Tested |
10+
| ------------------- | ---------------- | ------- | ------ | ------ |
11+
| Windows 7 | | | | |
12+
| Windows 7 | | | SP1 | |
13+
| Windows 8 | | | | |
14+
| Windows Rt | | | | |
15+
| Windows Server 2008 | | | SP2 | |
16+
| Windows Server 2008 | | R2 | | |
17+
| Windows Server 2008 | | R2 | SP1 | |
18+
| Windows Server 2012 | | | | |
19+
| Windows Vista | | | SP2 | |
20+
21+
#### Patch
22+
23+
```
24+
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-0008
25+
```
26+
27+
#### Utilization
28+
29+
The vulnerability does not test, the root directory is stored in the network collection **[CVE number] .zip** EXP or POC, code status unknown
30+
31+
#### ProjectSource
32+
33+
- None
34+
35+
36+

0 commit comments

Comments
 (0)