Skip to content

Instantly share code, notes, and snippets.

-----BEGIN PGP PUBLIC KEY BLOCK-----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@x9090
x9090 / gist:09de31427d017a54c94b977b6d95f8dd
Created January 23, 2024 06:23
Netgear IoT firmware vulnerabilities
Stack Buffer Overflows in DGN2200/DGN2200B - https://www.fortiguard.com/zeroday/FG-VD-18-019
Stack Buffer Overflow in DGN2200 UPNP Handler - https://www.fortiguard.com/zeroday/FG-VD-18-020
Stack Buffer Overflow in DGN2200 SOAP Handler - https://www.fortiguard.com/zeroday/FG-VD-18-022
Netgear R8000 Command Injection in CGI Handler - https://www.fortiguard.com/zeroday/FG-VD-18-046
Netgear R8500 Stack Buffer Overflow in CGI Handler - fortiguard.com/zeroday/FG-VD-18-047
Netgear R8500 Stack Buffer Overflow in ASP Handler - https://www.fortiguard.com/zeroday/FG-VD-18-051
Netgear Orbi Pro Persistent Cross-Site Scripting - https://www.fortiguard.com/zeroday/FG-VD-18-052
Netgear Orbi Denial of Service in SOAP handler - https://www.fortiguard.com/zeroday/FG-VD-18-059
Netgear R7800 Stack Buffer Overflow in CGI Handler - https://www.fortiguard.com/zeroday/FG-VD-18-062
Netgear Bridge Mode Cross-Site Scripting - https://www.fortiguard.com/zeroday/FG-VD-18-075
00:00:05.094535 VirtualBox VM 7.0.12 r159484 win.amd64 (Oct 12 2023 19:53:29) release log
00:00:05.094537 Log opened 2023-12-27T13:53:04.334390100Z
00:00:05.094537 Build Type: release
00:00:05.094541 OS Product: Windows 10
00:00:05.094542 OS Release: 10.0.19044
00:00:05.094542 OS Service Pack:
00:00:05.241568 DMI Product Name: All Series
00:00:05.245250 DMI Product Version: System Version
00:00:05.245262 Firmware type: UEFI
00:00:05.245706 Secure Boot: VERR_PRIVILEGE_NOT_HELD
@x9090
x9090 / gist:c15cee24376d1c58c7d54cf5f7448320
Created October 2, 2020 09:19
makefile.unix.honggfuzz
# This makefile is a simpler alternative to the autoconf-based build
# system, for simple local building of the libraries and tools.
# It will not install the libraries system-wide, but just create the 'cwebp'
# and 'dwebp' tools in the examples/ directory, along with the static
# libraries 'src/libwebp.a', 'src/libwebpdecoder.a', 'src/mux/libwebpmux.a',
# 'src/demux/libwebpdemux.a' and 'extras/libwebpextras.a'.
#
# To build the library and examples, use:
# make -f makefile.unix
# from this top directory.
@x9090
x9090 / gist:c464c4cecd25981fafe876f1bf5fe99c
Last active July 20, 2023 16:07
Breaking AV self-defense
http://www.fortiguard.com/zeroday/FG-VD-17-037 - Kaspersky Self-Defence Bypass
http://www.fortiguard.com/zeroday/FG-VD-17-019 - Bitdefender Kernel Driver Self-Protection Bypass
http://www.fortiguard.com/zeroday/FG-VD-17-018 - Bitdefender AVC3 Driver Local Privilege Escalation
http://www.fortiguard.com/zeroday/FG-VD-17-004 - Bypass Malwarebytes Self-Protection Module to Disable MBAMService
http://www.fortiguard.com/zeroday/FG-VD-17-003 - Malwarebytes Local Privilege Escalation Vulnerability
http://www.fortiguard.com/zeroday/FG-VD-16-080 - AVIRA IPC Server Multiple Out-of-bounds Write Vulnerabilities
http://www.fortiguard.com/zeroday/FG-VD-16-063 - AVIRA Self-Protection Bypass via registry removal
http://www.fortiguard.com/zeroday/FG-VD-16-062 - AVG Self-protection Bypass by disabling AV update
http://www.fortiguard.com/zeroday/FG-VD-16-061 - Multiple Denial-of-Service Vulnerabilities in AvastSvc Core Service
http://www.fortiguard.com/zeroday/FG-VD-16-060 - Avast Security Product Registry Bypass Vulnerability