update stencil plate &CVE-2022-34718

This commit is contained in:
Ascotbe
2023-01-17 13:37:54 +08:00
parent a30ae4be2e
commit 4e8a45117c
5 changed files with 229 additions and 0 deletions

71
StencilPlate/README.md Normal file
View File

@@ -0,0 +1,71 @@
### CVE-
#### 描述
#### 影响版本
| Product | CPU Architecture | Version | Update | Tested |
| ------------------- | ---------------- | ------- | ------ | ------ |
| Windows XP | x86 | | SP1 | |
| Windows XP | x86 | | SP2 | |
| Windows XP | x86 | | SP3 | |
| Windows Vista | x86/x64 | | | |
| Windows Vista | x86/x64 | | SP1 | |
| Windows Vista | x86/x64 | | SP2 | |
| Windows 7 | x86/x64 | | | |
| Windows 7 | x86/x64 | | SP1 | |
| Windows RT | x86/x64 | | | |
| Windows 8.1 | x86/x64 | | | |
| Windows 10 | x86/x64 | | | |
| Windows 10 | x86/x64 | 1511 | | |
| Windows 10 | x86/x64 | 1607 | | |
| Windows 10 | x86/x64 | 1703 | | |
| Windows 10 | x86/x64 | 1709 | | |
| Windows 10 | x86/x64/ARM64 | 1803 | | |
| Windows 10 | x86/x64/ARM64 | 1809 | | |
| Windows 10 | x86/x64/ARM64 | 1903 | | |
| Windows 10 | x86/x64/ARM64 | 1909 | | |
| Windows 10 | x86/x64/ARM64 | 2004 | | |
| Windows 10 | x86/x64/ARM64 | 20H2 | | |
| Windows 10 | x86/x64/ARM64 | 21H1 | | |
| Windows 10 | x86/x64/ARM64 | 21H2 | | |
| Windows 10 | x86/x64/ARM64 | 22H2 | | |
| Windows 11 | x64/ARM64 | 21H2 | | |
| Windows 11 | x64/ARM64 | 22H2 | | |
| Windows Server 2000 | x86 | | | |
| Windows Server 2000 | x86 | | SP1 | |
| Windows Server 2000 | x86 | | SP2 | |
| Windows Server 2000 | x86 | | SP3 | |
| Windows Server 2000 | x86 | | SP4 | |
| Windows Server 2003 | x86/x64 | | | |
| Windows Server 2003 | x86/x64 | | SP1 | |
| Windows Server 2003 | x86/x64 | | SP2 | |
| Windows Server 2003 | x86/x64 | R2 | | |
| Windows Server 2008 | x86/x64 | | SP1 | |
| Windows Server 2008 | x86/x64 | | SP2 | |
| Windows Server 2008 | x86/x64 | R2 | SP1 | |
| Windows Server 2012 | x86/x64 | | | |
| Windows Server 2012 | x86/x64 | R2 | | |
| Windows Server 2016 | x86/x64 | | | |
| Windows Server 2019 | x86/x64 | | | |
| Windows Server 2022 | x86/x64 | | | |
#### 修复补丁
```
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
```
#### 利用方式
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC代码状态未知
#### 项目来源
- []()
#### 分析文章
-

72
StencilPlate/README_EN.md Normal file
View File

@@ -0,0 +1,72 @@
### CVE-
#### Describe
#### ImpactVersion
| Product | CPU Architecture | Version | Update | Tested |
| ------------------- | ---------------- | ------- | ------ | ------ |
| Windows XP | x86 | | SP1 | |
| Windows XP | x86 | | SP2 | |
| Windows XP | x86 | | SP3 | |
| Windows Vista | x86/x64 | | | |
| Windows Vista | x86/x64 | | SP1 | |
| Windows Vista | x86/x64 | | SP2 | |
| Windows 7 | x86/x64 | | | |
| Windows 7 | x86/x64 | | SP1 | |
| Windows RT | x86/x64 | | | |
| Windows 8.1 | x86/x64 | | | |
| Windows 10 | x86/x64 | | | |
| Windows 10 | x86/x64 | 1511 | | |
| Windows 10 | x86/x64 | 1607 | | |
| Windows 10 | x86/x64 | 1703 | | |
| Windows 10 | x86/x64 | 1709 | | |
| Windows 10 | x86/x64/ARM64 | 1803 | | |
| Windows 10 | x86/x64/ARM64 | 1809 | | |
| Windows 10 | x86/x64/ARM64 | 1903 | | |
| Windows 10 | x86/x64/ARM64 | 1909 | | |
| Windows 10 | x86/x64/ARM64 | 2004 | | |
| Windows 10 | x86/x64/ARM64 | 20H2 | | |
| Windows 10 | x86/x64/ARM64 | 21H1 | | |
| Windows 10 | x86/x64/ARM64 | 21H2 | | |
| Windows 10 | x86/x64/ARM64 | 22H2 | | |
| Windows 11 | x64/ARM64 | 21H2 | | |
| Windows 11 | x64/ARM64 | 22H2 | | |
| Windows Server 2000 | x86 | | | |
| Windows Server 2000 | x86 | | SP1 | |
| Windows Server 2000 | x86 | | SP2 | |
| Windows Server 2000 | x86 | | SP3 | |
| Windows Server 2000 | x86 | | SP4 | |
| Windows Server 2003 | x86/x64 | | | |
| Windows Server 2003 | x86/x64 | | SP1 | |
| Windows Server 2003 | x86/x64 | | SP2 | |
| Windows Server 2003 | x86/x64 | R2 | | |
| Windows Server 2008 | x86/x64 | | SP1 | |
| Windows Server 2008 | x86/x64 | | SP2 | |
| Windows Server 2008 | x86/x64 | R2 | SP1 | |
| Windows Server 2012 | x86/x64 | | | |
| Windows Server 2012 | x86/x64 | R2 | | |
| Windows Server 2016 | x86/x64 | | | |
| Windows Server 2019 | x86/x64 | | | |
| Windows Server 2022 | x86/x64 | | | |
#### Patch
```
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/
```
#### Utilization
The vulnerability does not test, the root directory is stored in the network collection **[CVE number] .zip** EXP or POC, code status unknown
#### ProjectSource
- []()
#### Analyse
-

Binary file not shown.

View File

@@ -0,0 +1,42 @@
### CVE-2022-34718
#### 描述
Windows TCP/IP 远程命令执行
#### 影响版本
| Product | CPU Architecture | Version | Update | Tested |
| ------------------- | ---------------- | ------- | ------ | ------ |
| Windows 7 | x86/x64 | | SP1 | |
| Windows Rt | | | | |
| Windows 8.1 | x86/x64 | | | |
| Windows 10 | x86/x64 | | | |
| Windows 10 | x86/x64 | 1607 | | |
| Windows 10 | x86/x64/arm64 | 1809 | | |
| Windows 10 | x86/x64/arm64 | 20h2 | | |
| Windows 10 | x86/x64/arm64 | 21H1 | | |
| Windows 10 | x86/x64/arm64 | 21H2 | | |
| Windows 11 | x64/arm64 | 21H2 | | |
| Windows Server 2008 | x64 | R2 | SP1 | |
| Windows Server 2008 | x86/x64 | | SP2 | |
| Windows Server 2012 | | R2 | | |
| Windows Server 2012 | | | | |
| Windows Server 2016 | | | | |
| Windows Server 2019 | | | | |
| Windows Server 2022 | | | | |
#### 修复补丁
```
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34718
```
#### 利用方式
该漏洞并未进行测试,根目录留存着网络收集**[CVE编号].zip**的EXP或者POC代码状态未知
#### 项目来源
- [SecLabResearchBV](https://github.com/SecLabResearchBV/CVE-2022-34718-PoC)

View File

@@ -0,0 +1,44 @@
### CVE-2022-34718
#### Describe
Windows TCP/IP Remote Code Execution Vulnerability.
#### ImpactVersion
| Product | CPU Architecture | Version | Update | Tested |
| ------------------- | ---------------- | ------- | ------ | ------ |
| Windows 7 | x86/x64 | | SP1 | |
| Windows Rt | | | | |
| Windows 8.1 | x86/x64 | | | |
| Windows 10 | x86/x64 | | | |
| Windows 10 | x86/x64 | 1607 | | |
| Windows 10 | x86/x64/arm64 | 1809 | | |
| Windows 10 | x86/x64/arm64 | 20h2 | | |
| Windows 10 | x86/x64/arm64 | 21H1 | | |
| Windows 10 | x86/x64/arm64 | 21H2 | | |
| Windows 11 | x64/arm64 | 21H2 | | |
| Windows Server 2008 | x64 | R2 | SP1 | |
| Windows Server 2008 | x86/x64 | | SP2 | |
| Windows Server 2012 | | R2 | | |
| Windows Server 2012 | | | | |
| Windows Server 2016 | | | | |
| Windows Server 2019 | | | | |
| Windows Server 2022 | | | | |
#### Patch
```
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34718
```
#### Utilization
The vulnerability does not test, the root directory is stored in the network collection **[CVE number] .zip** EXP or POC, code status unknown
#### ProjectSource
- [SecLabResearchBV](https://github.com/SecLabResearchBV/CVE-2022-34718-PoC)