mirror of
https://mirror.skon.top/github.com/Ascotbe/Kernelhub
synced 2026-04-30 13:51:16 +08:00
update stencil plate &CVE-2022-34718
This commit is contained in:
71
StencilPlate/README.md
Normal file
71
StencilPlate/README.md
Normal file
@@ -0,0 +1,71 @@
|
||||
### CVE-
|
||||
|
||||
#### 描述
|
||||
|
||||
|
||||
|
||||
#### 影响版本
|
||||
|
||||
| Product | CPU Architecture | Version | Update | Tested |
|
||||
| ------------------- | ---------------- | ------- | ------ | ------ |
|
||||
| Windows XP | x86 | | SP1 | |
|
||||
| Windows XP | x86 | | SP2 | |
|
||||
| Windows XP | x86 | | SP3 | |
|
||||
| Windows Vista | x86/x64 | | | |
|
||||
| Windows Vista | x86/x64 | | SP1 | |
|
||||
| Windows Vista | x86/x64 | | SP2 | |
|
||||
| Windows 7 | x86/x64 | | | |
|
||||
| Windows 7 | x86/x64 | | SP1 | |
|
||||
| Windows RT | x86/x64 | | | |
|
||||
| Windows 8.1 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | 1511 | | |
|
||||
| Windows 10 | x86/x64 | 1607 | | |
|
||||
| Windows 10 | x86/x64 | 1703 | | |
|
||||
| Windows 10 | x86/x64 | 1709 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1803 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1809 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1903 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1909 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 2004 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 20H2 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 21H1 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 21H2 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 22H2 | | |
|
||||
| Windows 11 | x64/ARM64 | 21H2 | | |
|
||||
| Windows 11 | x64/ARM64 | 22H2 | | |
|
||||
| Windows Server 2000 | x86 | | | |
|
||||
| Windows Server 2000 | x86 | | SP1 | |
|
||||
| Windows Server 2000 | x86 | | SP2 | |
|
||||
| Windows Server 2000 | x86 | | SP3 | |
|
||||
| Windows Server 2000 | x86 | | SP4 | |
|
||||
| Windows Server 2003 | x86/x64 | | | |
|
||||
| Windows Server 2003 | x86/x64 | | SP1 | |
|
||||
| Windows Server 2003 | x86/x64 | | SP2 | |
|
||||
| Windows Server 2003 | x86/x64 | R2 | | |
|
||||
| Windows Server 2008 | x86/x64 | | SP1 | |
|
||||
| Windows Server 2008 | x86/x64 | | SP2 | |
|
||||
| Windows Server 2008 | x86/x64 | R2 | SP1 | |
|
||||
| Windows Server 2012 | x86/x64 | | | |
|
||||
| Windows Server 2012 | x86/x64 | R2 | | |
|
||||
| Windows Server 2016 | x86/x64 | | | |
|
||||
| Windows Server 2019 | x86/x64 | | | |
|
||||
| Windows Server 2022 | x86/x64 | | | |
|
||||
|
||||
#### 修复补丁
|
||||
|
||||
```
|
||||
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
|
||||
```
|
||||
|
||||
#### 利用方式
|
||||
|
||||
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC,代码状态未知
|
||||
|
||||
#### 项目来源
|
||||
|
||||
- []()
|
||||
|
||||
#### 分析文章
|
||||
|
||||
-
|
||||
72
StencilPlate/README_EN.md
Normal file
72
StencilPlate/README_EN.md
Normal file
@@ -0,0 +1,72 @@
|
||||
### CVE-
|
||||
|
||||
#### Describe
|
||||
|
||||
|
||||
|
||||
#### ImpactVersion
|
||||
|
||||
| Product | CPU Architecture | Version | Update | Tested |
|
||||
| ------------------- | ---------------- | ------- | ------ | ------ |
|
||||
| Windows XP | x86 | | SP1 | |
|
||||
| Windows XP | x86 | | SP2 | |
|
||||
| Windows XP | x86 | | SP3 | |
|
||||
| Windows Vista | x86/x64 | | | |
|
||||
| Windows Vista | x86/x64 | | SP1 | |
|
||||
| Windows Vista | x86/x64 | | SP2 | |
|
||||
| Windows 7 | x86/x64 | | | |
|
||||
| Windows 7 | x86/x64 | | SP1 | |
|
||||
| Windows RT | x86/x64 | | | |
|
||||
| Windows 8.1 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | 1511 | | |
|
||||
| Windows 10 | x86/x64 | 1607 | | |
|
||||
| Windows 10 | x86/x64 | 1703 | | |
|
||||
| Windows 10 | x86/x64 | 1709 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1803 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1809 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1903 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 1909 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 2004 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 20H2 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 21H1 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 21H2 | | |
|
||||
| Windows 10 | x86/x64/ARM64 | 22H2 | | |
|
||||
| Windows 11 | x64/ARM64 | 21H2 | | |
|
||||
| Windows 11 | x64/ARM64 | 22H2 | | |
|
||||
| Windows Server 2000 | x86 | | | |
|
||||
| Windows Server 2000 | x86 | | SP1 | |
|
||||
| Windows Server 2000 | x86 | | SP2 | |
|
||||
| Windows Server 2000 | x86 | | SP3 | |
|
||||
| Windows Server 2000 | x86 | | SP4 | |
|
||||
| Windows Server 2003 | x86/x64 | | | |
|
||||
| Windows Server 2003 | x86/x64 | | SP1 | |
|
||||
| Windows Server 2003 | x86/x64 | | SP2 | |
|
||||
| Windows Server 2003 | x86/x64 | R2 | | |
|
||||
| Windows Server 2008 | x86/x64 | | SP1 | |
|
||||
| Windows Server 2008 | x86/x64 | | SP2 | |
|
||||
| Windows Server 2008 | x86/x64 | R2 | SP1 | |
|
||||
| Windows Server 2012 | x86/x64 | | | |
|
||||
| Windows Server 2012 | x86/x64 | R2 | | |
|
||||
| Windows Server 2016 | x86/x64 | | | |
|
||||
| Windows Server 2019 | x86/x64 | | | |
|
||||
| Windows Server 2022 | x86/x64 | | | |
|
||||
|
||||
#### Patch
|
||||
|
||||
```
|
||||
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
|
||||
```
|
||||
|
||||
#### Utilization
|
||||
|
||||
The vulnerability does not test, the root directory is stored in the network collection **[CVE number] .zip** EXP or POC, code status unknown
|
||||
|
||||
#### ProjectSource
|
||||
|
||||
- []()
|
||||
|
||||
#### Analyse
|
||||
|
||||
-
|
||||
|
||||
BIN
TestFailure/CVE-2022-34718/CVE-2022-34718.zip
Normal file
BIN
TestFailure/CVE-2022-34718/CVE-2022-34718.zip
Normal file
Binary file not shown.
42
TestFailure/CVE-2022-34718/README.md
Normal file
42
TestFailure/CVE-2022-34718/README.md
Normal file
@@ -0,0 +1,42 @@
|
||||
### CVE-2022-34718
|
||||
|
||||
#### 描述
|
||||
|
||||
Windows TCP/IP 远程命令执行
|
||||
|
||||
#### 影响版本
|
||||
|
||||
| Product | CPU Architecture | Version | Update | Tested |
|
||||
| ------------------- | ---------------- | ------- | ------ | ------ |
|
||||
| Windows 7 | x86/x64 | | SP1 | |
|
||||
| Windows Rt | | | | |
|
||||
| Windows 8.1 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | 1607 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 1809 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 20h2 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 21H1 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 21H2 | | |
|
||||
| Windows 11 | x64/arm64 | 21H2 | | |
|
||||
| Windows Server 2008 | x64 | R2 | SP1 | |
|
||||
| Windows Server 2008 | x86/x64 | | SP2 | |
|
||||
| Windows Server 2012 | | R2 | | |
|
||||
| Windows Server 2012 | | | | |
|
||||
| Windows Server 2016 | | | | |
|
||||
| Windows Server 2019 | | | | |
|
||||
| Windows Server 2022 | | | | |
|
||||
|
||||
#### 修复补丁
|
||||
|
||||
```
|
||||
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34718
|
||||
```
|
||||
|
||||
#### 利用方式
|
||||
|
||||
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC,代码状态未知
|
||||
|
||||
#### 项目来源
|
||||
|
||||
- [SecLabResearchBV](https://github.com/SecLabResearchBV/CVE-2022-34718-PoC)
|
||||
|
||||
44
TestFailure/CVE-2022-34718/README_EN.md
Normal file
44
TestFailure/CVE-2022-34718/README_EN.md
Normal file
@@ -0,0 +1,44 @@
|
||||
### CVE-2022-34718
|
||||
|
||||
#### Describe
|
||||
|
||||
Windows TCP/IP Remote Code Execution Vulnerability.
|
||||
|
||||
#### ImpactVersion
|
||||
|
||||
| Product | CPU Architecture | Version | Update | Tested |
|
||||
| ------------------- | ---------------- | ------- | ------ | ------ |
|
||||
| Windows 7 | x86/x64 | | SP1 | |
|
||||
| Windows Rt | | | | |
|
||||
| Windows 8.1 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | | | |
|
||||
| Windows 10 | x86/x64 | 1607 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 1809 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 20h2 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 21H1 | | |
|
||||
| Windows 10 | x86/x64/arm64 | 21H2 | | |
|
||||
| Windows 11 | x64/arm64 | 21H2 | | |
|
||||
| Windows Server 2008 | x64 | R2 | SP1 | |
|
||||
| Windows Server 2008 | x86/x64 | | SP2 | |
|
||||
| Windows Server 2012 | | R2 | | |
|
||||
| Windows Server 2012 | | | | |
|
||||
| Windows Server 2016 | | | | |
|
||||
| Windows Server 2019 | | | | |
|
||||
| Windows Server 2022 | | | | |
|
||||
|
||||
#### Patch
|
||||
|
||||
```
|
||||
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34718
|
||||
```
|
||||
|
||||
#### Utilization
|
||||
|
||||
The vulnerability does not test, the root directory is stored in the network collection **[CVE number] .zip** EXP or POC, code status unknown
|
||||
|
||||
#### ProjectSource
|
||||
|
||||
- [SecLabResearchBV](https://github.com/SecLabResearchBV/CVE-2022-34718-PoC)
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user