Auto Update 2022/10/26 06:18:45

This commit is contained in:
motikan2010-bot 2022-10-26 15:18:45 +09:00
parent 0a3904d803
commit 0cad6bf4cd
31 changed files with 163 additions and 134 deletions

View file

@ -685,10 +685,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-25T16:05:16Z",
"updated_at": "2022-10-25T16:06:54Z",
"updated_at": "2022-10-26T01:24:16Z",
"pushed_at": "2022-10-25T16:08:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -696,7 +696,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -448,13 +448,13 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 359,
"watchers_count": 359,
"forks_count": 115,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 115,
"forks": 116,
"watchers": 359,
"score": 0
},

View file

@ -69,10 +69,10 @@
"description": "CVE-2018-8581",
"fork": false,
"created_at": "2019-01-24T06:08:23Z",
"updated_at": "2022-10-21T08:29:00Z",
"updated_at": "2022-10-26T03:41:24Z",
"pushed_at": "2022-10-21T08:29:33Z",
"stargazers_count": 343,
"watchers_count": 343,
"stargazers_count": 344,
"watchers_count": 344,
"forks_count": 79,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 343,
"watchers": 344,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
"fork": false,
"created_at": "2019-10-14T17:27:37Z",
"updated_at": "2022-10-12T16:30:58Z",
"updated_at": "2022-10-26T02:31:37Z",
"pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 94,
"watchers": 95,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 359,
"watchers_count": 359,
"forks_count": 115,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 115,
"forks": 116,
"watchers": 359,
"score": 0
},

View file

@ -74,10 +74,10 @@
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false,
"created_at": "2020-05-19T18:59:26Z",
"updated_at": "2022-10-25T22:23:02Z",
"updated_at": "2022-10-26T02:32:25Z",
"pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 98,
"watchers": 99,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ",
"fork": false,
"created_at": "2020-09-25T20:53:48Z",
"updated_at": "2022-10-25T22:23:21Z",
"updated_at": "2022-10-26T04:47:11Z",
"pushed_at": "2020-09-25T20:55:17Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 11,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 26,
"forks": 12,
"watchers": 34,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2021-08-24T15:02:19Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 24,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD",
"fork": false,
"created_at": "2021-04-14T20:37:38Z",
"updated_at": "2022-07-08T00:56:33Z",
"updated_at": "2022-10-26T03:33:29Z",
"pushed_at": "2021-04-14T21:36:08Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -148,13 +148,13 @@
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 77,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"forks": 78,
"watchers": 205,
"score": 0
},
@ -769,11 +769,11 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-10-25T14:49:48Z",
"updated_at": "2022-10-26T06:15:26Z",
"pushed_at": "2022-10-20T02:06:54Z",
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 57,
"stargazers_count": 550,
"watchers_count": 550,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -786,8 +786,8 @@
"vcenter"
],
"visibility": "public",
"forks": 57,
"watchers": 547,
"forks": 58,
"watchers": 550,
"score": 0
}
]

View file

@ -412,10 +412,10 @@
"description": " cve-2021-43798 Grafana 8.3.0 - Directory Traversal and Arbitrary File Read",
"fork": false,
"created_at": "2022-10-25T12:24:02Z",
"updated_at": "2022-10-26T00:01:33Z",
"updated_at": "2022-10-26T06:13:16Z",
"pushed_at": "2022-10-26T00:01:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -423,7 +423,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -520,10 +520,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-10-19T18:05:24Z",
"updated_at": "2022-10-26T03:14:00Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 835,
"watchers_count": 835,
"stargazers_count": 836,
"watchers_count": 836,
"forks_count": 180,
"allow_forking": true,
"is_template": false,
@ -544,7 +544,7 @@
],
"visibility": "public",
"forks": 180,
"watchers": 835,
"watchers": 836,
"score": 0
},
{
@ -1325,10 +1325,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-10-25T13:35:53Z",
"updated_at": "2022-10-26T03:36:20Z",
"pushed_at": "2022-10-20T15:37:44Z",
"stargazers_count": 3083,
"watchers_count": 3083,
"stargazers_count": 3084,
"watchers_count": 3084,
"forks_count": 730,
"allow_forking": true,
"is_template": false,
@ -1336,7 +1336,7 @@
"topics": [],
"visibility": "public",
"forks": 730,
"watchers": 3083,
"watchers": 3084,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC",
"fork": false,
"created_at": "2022-03-06T00:03:31Z",
"updated_at": "2022-10-18T09:26:09Z",
"updated_at": "2022-10-26T03:24:52Z",
"pushed_at": "2022-03-06T07:01:15Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 83,
"watchers": 84,
"score": 0
},
{

View file

@ -349,10 +349,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-05-09T14:01:38Z",
"updated_at": "2022-10-20T06:00:57Z",
"updated_at": "2022-10-26T01:36:19Z",
"pushed_at": "2022-05-09T14:20:40Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -363,7 +363,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 28,
"watchers": 29,
"score": 0
},
{
@ -1578,10 +1578,10 @@
"description": "cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-10-25T12:29:54Z",
"updated_at": "2022-10-25T12:41:21Z",
"updated_at": "2022-10-26T01:23:44Z",
"pushed_at": "2022-10-25T12:41:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1589,7 +1589,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-25T13:15:20Z",
"updated_at": "2022-10-25T13:16:12Z",
"updated_at": "2022-10-26T01:24:10Z",
"pushed_at": "2022-10-25T13:17:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-09-09T12:42:19Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 5,
"score": 0
}

View file

@ -69,18 +69,18 @@
"description": null,
"fork": false,
"created_at": "2022-02-03T11:25:14Z",
"updated_at": "2022-10-25T08:18:36Z",
"updated_at": "2022-10-26T04:29:39Z",
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 177,
"watchers_count": 177,
"forks_count": 47,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 177,
"forks": 48,
"watchers": 179,
"score": 0
},
{

View file

@ -688,11 +688,11 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-10-25T14:49:48Z",
"updated_at": "2022-10-26T06:15:26Z",
"pushed_at": "2022-10-20T02:06:54Z",
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 57,
"stargazers_count": 550,
"watchers_count": 550,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -705,8 +705,8 @@
"vcenter"
],
"visibility": "public",
"forks": 57,
"watchers": 547,
"forks": 58,
"watchers": 550,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-07-14T14:55:24Z",
"stargazers_count": 302,
"watchers_count": 302,
"forks_count": 101,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"tomcat"
],
"visibility": "public",
"forks": 101,
"forks": 102,
"watchers": 302,
"score": 0
},

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-09-24T16:43:58Z",
"stargazers_count": 356,
"watchers_count": 356,
"forks_count": 46,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 46,
"forks": 47,
"watchers": 356,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-10-25T13:21:22Z",
"updated_at": "2022-10-26T05:53:00Z",
"pushed_at": "2022-09-29T05:09:10Z",
"stargazers_count": 832,
"watchers_count": 832,
"stargazers_count": 834,
"watchers_count": 834,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 146,
"watchers": 832,
"watchers": 834,
"score": 0
},
{
@ -311,10 +311,10 @@
"description": "[CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.",
"fork": false,
"created_at": "2022-06-04T11:16:28Z",
"updated_at": "2022-10-18T23:16:59Z",
"updated_at": "2022-10-26T03:36:45Z",
"pushed_at": "2022-06-18T09:27:31Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -327,7 +327,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-25T12:59:31Z",
"updated_at": "2022-10-25T13:01:33Z",
"updated_at": "2022-10-26T01:23:52Z",
"pushed_at": "2022-10-25T13:07:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-22T01:14:29Z",
"updated_at": "2022-08-18T13:39:13Z",
"updated_at": "2022-10-26T01:11:38Z",
"pushed_at": "2022-07-22T01:14:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-09-09T12:39:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-12T13:24:46Z",
"updated_at": "2022-10-24T20:30:07Z",
"updated_at": "2022-10-26T04:57:12Z",
"pushed_at": "2022-10-12T16:57:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
"fork": false,
"created_at": "2022-07-21T13:09:50Z",
"updated_at": "2022-10-25T15:02:31Z",
"updated_at": "2022-10-26T01:51:57Z",
"pushed_at": "2022-07-21T13:44:32Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 89,
"watchers": 90,
"score": 0
},
{

View file

@ -329,10 +329,10 @@
"description": "CVE-2022-39197 RCE POC",
"fork": false,
"created_at": "2022-10-22T10:11:37Z",
"updated_at": "2022-10-25T17:50:19Z",
"updated_at": "2022-10-26T06:15:01Z",
"pushed_at": "2022-10-22T11:13:59Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -340,7 +340,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -434,5 +434,33 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 557616560,
"name": "CVE-2022-40684",
"full_name": "qingsiweisan\/CVE-2022-40684",
"owner": {
"login": "qingsiweisan",
"id": 56376918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56376918?v=4",
"html_url": "https:\/\/github.com\/qingsiweisan"
},
"html_url": "https:\/\/github.com\/qingsiweisan\/CVE-2022-40684",
"description": null,
"fork": false,
"created_at": "2022-10-26T01:48:14Z",
"updated_at": "2022-10-26T02:13:51Z",
"pushed_at": "2022-10-26T02:16:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "cve-2022-41352 poc",
"fork": false,
"created_at": "2022-10-10T13:04:34Z",
"updated_at": "2022-10-23T06:51:23Z",
"updated_at": "2022-10-26T03:48:30Z",
"pushed_at": "2022-10-10T13:12:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -52,7 +52,7 @@
"pushed_at": "2022-10-20T11:56:13Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -63,7 +63,7 @@
"poc"
],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 28,
"score": 0
},
@ -137,10 +137,10 @@
"description": "Dockerized POC for CVE-2022-42889 Text4Shell",
"fork": false,
"created_at": "2022-10-18T09:58:00Z",
"updated_at": "2022-10-25T09:31:34Z",
"updated_at": "2022-10-26T05:45:44Z",
"pushed_at": "2022-10-18T10:00:27Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -156,7 +156,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 53,
"watchers": 54,
"score": 0
},
{
@ -681,10 +681,10 @@
"description": "CVE-2022-42889 aka Text4Shell research & PoC",
"fork": false,
"created_at": "2022-10-23T13:42:23Z",
"updated_at": "2022-10-25T10:04:28Z",
"updated_at": "2022-10-26T01:27:24Z",
"pushed_at": "2022-10-25T13:32:18Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -696,7 +696,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
},
{
@ -749,10 +749,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-25T13:11:24Z",
"updated_at": "2022-10-25T13:11:24Z",
"updated_at": "2022-10-26T01:24:05Z",
"pushed_at": "2022-10-25T13:15:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -760,7 +760,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -4042,6 +4042,7 @@ An authentication bypass using an alternate path or channel [CWE-288] in Fortine
- [puckiestyle/CVE-2022-40684](https://github.com/puckiestyle/CVE-2022-40684)
- [jsongmax/Fortinet-CVE-2022-40684](https://github.com/jsongmax/Fortinet-CVE-2022-40684)
- [und3sc0n0c1d0/CVE-2022-40684](https://github.com/und3sc0n0c1d0/CVE-2022-40684)
- [qingsiweisan/CVE-2022-40684](https://github.com/qingsiweisan/CVE-2022-40684)
### CVE-2022-40916
- [whitej3rry/CVE-2022-40916](https://github.com/whitej3rry/CVE-2022-40916)