Auto Update 2022/05/11 00:18:44

This commit is contained in:
motikan2010-bot 2022-05-11 09:18:44 +09:00
parent 12472bc690
commit 22b5e4f887
22 changed files with 235 additions and 132 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-01-04T02:50:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -1615,6 +1615,33 @@
"watchers": 3,
"score": 0
},
{
"id": 421096576,
"name": "ShellShock",
"full_name": "aphiliotis1\/ShellShock",
"owner": {
"login": "aphiliotis1",
"id": 66454005,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66454005?v=4",
"html_url": "https:\/\/github.com\/aphiliotis1"
},
"html_url": "https:\/\/github.com\/aphiliotis1\/ShellShock",
"description": "A python script intended to automate cgi-bin based exploitation of the ShellSchock vulnerability (CVE-2014-6271)",
"fork": false,
"created_at": "2021-10-25T16:13:48Z",
"updated_at": "2021-11-27T17:59:13Z",
"pushed_at": "2021-10-28T14:09:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 459666650,
"name": "ShellShock",

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-02-22T07:02:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,7 +13,7 @@
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
"fork": false,
"created_at": "2017-11-13T21:33:55Z",
"updated_at": "2022-05-10T13:35:16Z",
"updated_at": "2022-05-10T19:12:37Z",
"pushed_at": "2017-11-14T10:26:28Z",
"stargazers_count": 161,
"watchers_count": 161,

View file

@ -13,7 +13,7 @@
"description": "Webkit uxss exploit (CVE-2017-7089)",
"fork": false,
"created_at": "2017-10-03T12:13:43Z",
"updated_at": "2022-05-10T13:34:30Z",
"updated_at": "2022-05-10T19:12:43Z",
"pushed_at": "2017-10-03T12:23:43Z",
"stargazers_count": 62,
"watchers_count": 62,

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2022-03-23T22:27:07Z",
"updated_at": "2022-05-10T19:01:36Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 218,
"watchers_count": 218,
"stargazers_count": 219,
"watchers_count": 219,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 218,
"watchers": 219,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
"updated_at": "2022-05-09T16:02:15Z",
"updated_at": "2022-05-10T20:49:43Z",
"pushed_at": "2019-05-21T14:52:36Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 104,
"watchers": 105,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)",
"fork": false,
"created_at": "2020-06-11T15:42:18Z",
"updated_at": "2022-03-24T01:18:08Z",
"updated_at": "2022-05-10T20:40:33Z",
"pushed_at": "2020-06-11T16:21:01Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 9,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 9,
"watchers": 25,
"forks": 10,
"watchers": 26,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-05-07T18:02:21Z",
"updated_at": "2022-05-10T21:13:39Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1449,
"watchers_count": 1449,
"stargazers_count": 1450,
"watchers_count": 1450,
"forks_count": 332,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 332,
"watchers": 1449,
"watchers": 1450,
"score": 0
},
{

View file

@ -378,17 +378,17 @@
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
"fork": false,
"created_at": "2021-01-05T14:41:13Z",
"updated_at": "2022-05-07T11:33:53Z",
"updated_at": "2022-05-10T19:33:08Z",
"pushed_at": "2021-07-29T09:28:20Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 100,
"watchers": 101,
"score": 0
},
{

View file

@ -1,31 +1,4 @@
[
{
"id": 435936211,
"name": "cve-2021-38314",
"full_name": "phrantom\/cve-2021-38314",
"owner": {
"login": "phrantom",
"id": 52974841,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52974841?v=4",
"html_url": "https:\/\/github.com\/phrantom"
},
"html_url": "https:\/\/github.com\/phrantom\/cve-2021-38314",
"description": null,
"fork": false,
"created_at": "2021-12-07T15:39:04Z",
"updated_at": "2021-12-07T16:21:22Z",
"pushed_at": "2021-12-07T16:21:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 439038372,
"name": "CVE-2021-38314",

View file

@ -13,17 +13,17 @@
"description": "PwnKit-Hunter is here to help you check if your systems are vulnerable to CVE-2021-4043, a.k.a. PwnKit",
"fork": false,
"created_at": "2022-01-30T13:42:16Z",
"updated_at": "2022-04-14T18:18:37Z",
"updated_at": "2022-05-10T20:08:03Z",
"pushed_at": "2022-02-01T12:18:42Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

29
2021/CVE-2021-42183.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 488989628,
"name": "CVE-2021-42183",
"full_name": "0xRaw\/CVE-2021-42183",
"owner": {
"login": "0xRaw",
"id": 76697978,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76697978?v=4",
"html_url": "https:\/\/github.com\/0xRaw"
},
"html_url": "https:\/\/github.com\/0xRaw\/CVE-2021-42183",
"description": null,
"fork": false,
"created_at": "2022-05-05T13:45:43Z",
"updated_at": "2022-05-05T13:45:43Z",
"pushed_at": "2022-05-10T21:27:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-05-07T07:20:31Z",
"updated_at": "2022-05-10T20:50:26Z",
"pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 334,
"watchers_count": 334,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 333,
"watchers": 334,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-12-15T06:18:15Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 11,
"score": 0
},
@ -367,14 +367,14 @@
"pushed_at": "2022-02-24T12:04:51Z",
"stargazers_count": 982,
"watchers_count": 982,
"forks_count": 434,
"forks_count": 435,
"allow_forking": true,
"is_template": false,
"topics": [
"log4shell"
],
"visibility": "public",
"forks": 434,
"forks": 435,
"watchers": 982,
"score": 0
},
@ -853,10 +853,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-05-10T07:47:03Z",
"updated_at": "2022-05-10T20:56:57Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1347,
"watchers_count": 1347,
"stargazers_count": 1349,
"watchers_count": 1349,
"forks_count": 367,
"allow_forking": true,
"is_template": false,
@ -868,7 +868,7 @@
],
"visibility": "public",
"forks": 367,
"watchers": 1347,
"watchers": 1349,
"score": 0
},
{
@ -8678,7 +8678,7 @@
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-21T22:14:24Z",
"updated_at": "2022-04-27T14:05:21Z",
"updated_at": "2022-05-10T21:09:57Z",
"pushed_at": "2022-01-10T19:13:04Z",
"stargazers_count": 58,
"watchers_count": 58,

View file

@ -634,10 +634,10 @@
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-09T02:47:08Z",
"updated_at": "2022-03-24T02:48:41Z",
"updated_at": "2022-05-10T22:37:41Z",
"pushed_at": "2022-03-09T02:47:32Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -646,7 +646,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 20,
"watchers": 21,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0995 exploit",
"fork": false,
"created_at": "2022-03-26T21:46:09Z",
"updated_at": "2022-05-02T18:34:07Z",
"updated_at": "2022-05-10T22:58:52Z",
"pushed_at": "2022-03-27T09:07:01Z",
"stargazers_count": 462,
"watchers_count": 462,
"stargazers_count": 463,
"watchers_count": 463,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 462,
"watchers": 463,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
"fork": false,
"created_at": "2022-05-05T10:35:35Z",
"updated_at": "2022-05-10T15:36:25Z",
"updated_at": "2022-05-10T19:29:55Z",
"pushed_at": "2022-05-09T21:09:45Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 45,
"watchers": 46,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2022-05-10T16:01:46Z",
"updated_at": "2022-05-10T23:09:22Z",
"pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 56,
"watchers": 57,
"score": 0
},
{
@ -175,17 +175,17 @@
"description": "PoC for CVE-2022-1388_F5_BIG-IP",
"fork": false,
"created_at": "2022-05-09T07:39:55Z",
"updated_at": "2022-05-10T16:19:24Z",
"updated_at": "2022-05-10T23:46:50Z",
"pushed_at": "2022-05-09T10:23:11Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 36,
"watchers": 39,
"score": 0
},
{
@ -256,17 +256,17 @@
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
"fork": false,
"created_at": "2022-05-09T10:34:38Z",
"updated_at": "2022-05-10T13:15:34Z",
"updated_at": "2022-05-10T21:38:44Z",
"pushed_at": "2022-05-10T16:08:38Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 37,
"watchers": 38,
"score": 0
},
{
@ -310,17 +310,17 @@
"description": "Exploit and Check Script for CVE 2022-1388",
"fork": false,
"created_at": "2022-05-09T11:30:09Z",
"updated_at": "2022-05-10T18:15:11Z",
"updated_at": "2022-05-10T20:56:49Z",
"pushed_at": "2022-05-09T17:58:13Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 10,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 20,
"forks": 12,
"watchers": 21,
"score": 0
},
{
@ -337,17 +337,17 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2022-05-10T17:58:11Z",
"updated_at": "2022-05-11T00:19:29Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 93,
"watchers": 99,
"score": 0
},
{
@ -395,7 +395,7 @@
"pushed_at": "2022-05-09T14:20:40Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
@ -403,7 +403,7 @@
"f5-big-ip-icontrol-rest-rce"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 9,
"score": 0
},
@ -421,17 +421,17 @@
"description": "F5 BIG-IP iControl REST身份验证绕过漏洞",
"fork": false,
"created_at": "2022-05-09T14:02:34Z",
"updated_at": "2022-05-10T15:12:49Z",
"updated_at": "2022-05-10T20:14:53Z",
"pushed_at": "2022-05-09T14:06:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -529,17 +529,17 @@
"description": "CVE-2022-1388 POC exploit",
"fork": false,
"created_at": "2022-05-09T15:42:55Z",
"updated_at": "2022-05-09T16:22:23Z",
"updated_at": "2022-05-10T21:07:51Z",
"pushed_at": "2022-05-10T04:53:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -645,17 +645,17 @@
"description": "Reverse Shell for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-10T04:44:05Z",
"updated_at": "2022-05-10T09:50:15Z",
"updated_at": "2022-05-10T20:29:39Z",
"pushed_at": "2022-05-10T05:00:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -942,5 +942,59 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 490856318,
"name": "CVE-2022-1388",
"full_name": "0xAgun\/CVE-2022-1388",
"owner": {
"login": "0xAgun",
"id": 78228966,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78228966?v=4",
"html_url": "https:\/\/github.com\/0xAgun"
},
"html_url": "https:\/\/github.com\/0xAgun\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-10T20:49:12Z",
"updated_at": "2022-05-10T20:50:02Z",
"pushed_at": "2022-05-10T20:49:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 490900227,
"name": "CVE-2022-1388",
"full_name": "ExploitPwner\/CVE-2022-1388",
"owner": {
"login": "ExploitPwner",
"id": 103929208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
"html_url": "https:\/\/github.com\/ExploitPwner"
},
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-1388",
"description": "On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all 12.1.x and 11.6.x versions, undisclosed requests may bypass iControl REST authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated ",
"fork": false,
"created_at": "2022-05-11T00:15:07Z",
"updated_at": "2022-05-11T00:15:07Z",
"pushed_at": "2022-05-11T00:15:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Atlassian Bitbucket Data Center反序列化漏洞(CVE-2022-26133)批量验证和利用脚本",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-05-10T15:06:28Z",
"updated_at": "2022-05-10T23:44:58Z",
"pushed_at": "2022-05-10T06:18:39Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 15,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-05-10T09:50:06Z",
"updated_at": "2022-05-10T19:12:49Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 655,
"watchers_count": 655,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-05-10T16:39:00Z",
"updated_at": "2022-05-10T16:39:00Z",
"updated_at": "2022-05-10T21:54:21Z",
"pushed_at": "2022-05-10T17:13:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -311,6 +311,8 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
- [thatonesecguy/CVE-2022-1388-Exploit](https://github.com/thatonesecguy/CVE-2022-1388-Exploit)
- [bandit92/CVE2022-1388_TestAPI](https://github.com/bandit92/CVE2022-1388_TestAPI)
- [aodsec/CVE-2022-1388-PocExp](https://github.com/aodsec/CVE-2022-1388-PocExp)
- [0xAgun/CVE-2022-1388](https://github.com/0xAgun/CVE-2022-1388)
- [ExploitPwner/CVE-2022-1388](https://github.com/ExploitPwner/CVE-2022-1388)
### CVE-2022-2333
- [shirouQwQ/CVE-2022-2333](https://github.com/shirouQwQ/CVE-2022-2333)
@ -1403,13 +1405,23 @@ A Remote Code Execution (RCE) vulnerability exists in Pixelimity 1.0 via admin/a
- [jcarabantes/CVE-2022-28590](https://github.com/jcarabantes/CVE-2022-28590)
### CVE-2022-28601
### CVE-2022-28601 (2022-05-10)
<code>
A Two-Factor Authentication (2FA) bypass vulnerability in &quot;Simple 2FA Plugin for Moodle&quot; by LMS Doctor allows remote attackers to overwrite the phone number used for confirmation via the profile.php file. Therefore, allowing them to bypass the phone verification mechanism.
</code>
- [FlaviuPopescu/CVE-2022-28601](https://github.com/FlaviuPopescu/CVE-2022-28601)
### CVE-2022-28944
- [gerr-re/cve-2022-28944](https://github.com/gerr-re/cve-2022-28944)
### CVE-2022-28986
### CVE-2022-28986 (2022-05-10)
<code>
LMS Doctor Simple 2 Factor Authentication Plugin For Moodle Affected: 2021072900 has an Insecure direct object references (IDOR) vulnerability, which allows remote attackers to update sensitive records such as email, password and phone number of other user accounts.
</code>
- [FlaviuPopescu/CVE-2022-28986](https://github.com/FlaviuPopescu/CVE-2022-28986)
### CVE-2022-29072 (2022-04-15)
@ -4332,7 +4344,6 @@ A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Sec
The Gutenberg Template Library &amp; Redux Framework plugin &lt;= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of sites `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
</code>
- [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314)
- [shubhayu-64/CVE-2021-38314](https://github.com/shubhayu-64/CVE-2021-38314)
### CVE-2021-38560 (2022-02-01)
@ -4661,6 +4672,14 @@ Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compro
- [minhnq22/CVE-2021-42171](https://github.com/minhnq22/CVE-2021-42171)
### CVE-2021-42183 (2022-05-05)
<code>
MasaCMS 7.2.1 is affected by a path traversal vulnerability in /index.cfm/_api/asset/image/.
</code>
- [0xRaw/CVE-2021-42183](https://github.com/0xRaw/CVE-2021-42183)
### CVE-2021-42230 (2022-04-15)
<code>
@ -23515,6 +23534,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- [MuirlandOracle/CVE-2014-6271-IPFire](https://github.com/MuirlandOracle/CVE-2014-6271-IPFire)
- [mochizuki875/CVE-2014-6271-Apache-Debian](https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian)
- [b4keSn4ke/CVE-2014-6271](https://github.com/b4keSn4ke/CVE-2014-6271)
- [aphiliotis1/ShellShock](https://github.com/aphiliotis1/ShellShock)
- [0bfxgh0st-secondary/ShellShock](https://github.com/0bfxgh0st-secondary/ShellShock)
- [akr3ch/CVE-2014-6271](https://github.com/akr3ch/CVE-2014-6271)
- [0xkasra/CVE-2014-6271](https://github.com/0xkasra/CVE-2014-6271)