Skip to content
#

cve

Here are 403 public repositories matching this topic...

有关渗透测试的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

  • Updated Jun 4, 2021
  • PowerShell

Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber

  • Updated Apr 17, 2021
  • C
terriko
terriko commented Mar 23, 2021

I merged a few pull requests that didn't have SPDX headers on the new files (checker files and test files) because I forgot that I should be asking for that during code review now. This bug is mostly a reminder to me to go find those, but if anyone else wants a super easy bug, look at .py files added in the last couple of commits and add the three lines from https://github.com/intel/cve-bin-tool/

Improve this page

Add a description, image, and links to the cve topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cve topic, visit your repo's landing page and select "manage topics."

Learn more