{"id":24697,"date":"2022-06-05T00:06:00","date_gmt":"2022-06-04T22:06:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=24697"},"modified":"2024-10-05T21:17:20","modified_gmt":"2024-10-05T19:17:20","slug":"riesige-sammlung-von-windows-exploits-auf-github","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/06\/05\/riesige-sammlung-von-windows-exploits-auf-github\/","title":{"rendered":"Large collection of Windows exploits on GitHub"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/?p=265901\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft patches numerous vulnerabilities in Windows (and other products) every month. Often known vulnerabilities, but not closed by updates, are used in attacks. The other day I came across a large collection of Windows vulnerabilities that can be exploited by various tools to manipulate privileges if necessary.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/6e346c0c1fd94fad8e2f5a4e565f7a2d\" alt=\"\" width=\"1\" height=\"1\" \/>I came across this issue via following <a href=\"https:\/\/twitter.com\/Dinosn\/status\/1531538315417100288\" target=\"_blank\" rel=\"noopener\">tweet<\/a> by Nicolas Krassas. A user lyshark collects these vulnerabilities (Windows exploits) on this GitHub website.<\/p>\n<p><a href=\"https:\/\/twitter.com\/Dinosn\/status\/1531538315417100288\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Collection of Windows vulnerabilities\" src=\"https:\/\/i.imgur.com\/1rvpPDB.png\" alt=\"Collection of Windows vulnerabilities\" \/><\/a><\/p>\n<p>These are vulnerabilities that have a CVE number and have long been known and patched by Microsoft. I took a look at the downloadable ZIP archive files. They are readme text files that contain the respective details about the vulnerable Windows versions. Some of the vulnerabilities refer to ancient Windows versions that have long since fallen out of support.<\/p>\n<p>The purpose is not yet clear to me, for example when I look at the details of CVE-2003-0352.<\/p>\n<blockquote><p>### CVE-2003-0352<\/p>\n<p>#### \u63cf\u8ff0<\/p>\n<p>\u67d0\u4e9bRPC\u7684DCOM\u63a5\u53e3\u4e2d\u7684\u7f13\u51b2\u533a\u6ea2\u51fa\u4f7f\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u683c\u5f0f\u9519\u8bef\u7684\u6d88\u606f\u6267\u884c\u4efb\u610f\u4ee3\u7801<\/p>\n<p>#### \u5f71\u54cd\u7248\u672c<\/p>\n<p>| Product | CPU Architecture | Version | Update | Tested |<br \/>\n| &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- | &#8212;&#8212;&#8212;&#8212;&#8212;- | &#8212;&#8212;- | &#8212;&#8212; | &#8212;&#8212;&#8212;&#8212;&#8212;&#8212; |<br \/>\n| Windows 2000 | | | | |<br \/>\n| Windows 2000 | | | SP1 | |<br \/>\n| Windows 2000 | | | SP2 | |<br \/>\n| Windows 2000 | | | SP3 | |<br \/>\n| Windows 2000 | | | SP4 | &amp;#10004; |<br \/>\n| Windows Server 2003 | | R2 | | |<br \/>\n| Windows Nt | | | SP1 | |<br \/>\n| Windows Nt | | 4.0 | SP2 | |<br \/>\n| Windows Nt | | 4.0 | SP3 | |<br \/>\n| Windows Nt | | 4.0 | SP4 | |<br \/>\n| Windows Nt | | 4.0 | SP5 | |<br \/>\n| Windows Nt | | 4.0 | Sp6a | |<br \/>\n| Windows Nt | | 4.0 | SP6 | |<br \/>\n| Windows Xp | | | SP1 | |<br \/>\n| Windows Xp | | | Gold | |<\/p>\n<p>#### \u5229\u7528\u65b9\u5f0f<\/p>\n<p>\u6d4b\u8bd5\u7cfb\u7edfWindows 2000 SP4 x86<\/p>\n<p>\"`<br \/>\nuse exploit\/windows\/dcerpc\/ms03_026_dcom<br \/>\nset RHOST 192.168.1.17<br \/>\nrun<br \/>\n\"`<\/p>\n<p>![image-20200823200752021](https:\/\/raw.github.com\/Ascotbe\/Image\/master\/Kernelhub\/CVE-2003-0352_win2000_x86_msf.png)<\/p>\n<p>\u67e5\u770b\u7cfb\u7edf\u4fe1\u606f<\/p>\n<p>![CVE-2003-0352_win2000_x86_msf2](https:\/\/raw.github.com\/Ascotbe\/Image\/master\/Kernelhub\/CVE-2003-0352_win2000_x86_msf2.png)<\/p><\/blockquote>\n<p>What do people (probably from the Chinese area) want with these old CVEs?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft patches numerous vulnerabilities in Windows (and other products) every month. Often known vulnerabilities, but not closed by updates, are used in attacks. The other day I came across a large collection of Windows vulnerabilities that can be exploited by &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/06\/05\/riesige-sammlung-von-windows-exploits-auf-github\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-24697","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=24697"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24697\/revisions"}],"predecessor-version":[{"id":35823,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24697\/revisions\/35823"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=24697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=24697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=24697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}