mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/04/12 00:30:56
This commit is contained in:
parent
fe71d2b206
commit
26a2982b63
25 changed files with 75 additions and 154 deletions
|
@ -1,43 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 98817608,
|
||||
"name": "jenkins-cve-2016-0792",
|
||||
"full_name": "jpiechowka\/jenkins-cve-2016-0792",
|
||||
"owner": {
|
||||
"login": "jpiechowka",
|
||||
"id": 9040085,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9040085?v=4",
|
||||
"html_url": "https:\/\/github.com\/jpiechowka"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jpiechowka\/jenkins-cve-2016-0792",
|
||||
"description": "Exploit for Jenkins serialization vulnerability - CVE-2016-0792",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-30T18:39:24Z",
|
||||
"updated_at": "2022-06-25T01:31:15Z",
|
||||
"pushed_at": "2017-08-02T23:51:34Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2016-0792",
|
||||
"deserialization",
|
||||
"exploit",
|
||||
"jenkins-serialization-vulnerability",
|
||||
"python",
|
||||
"serialization",
|
||||
"vulnerability",
|
||||
"vulnerability-detection"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 125023802,
|
||||
"name": "java-deserialization-exploits",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 97992350,
|
||||
"name": "CVE-2016-6271",
|
||||
"full_name": "gteissier\/CVE-2016-6271",
|
||||
"owner": {
|
||||
"login": "gteissier",
|
||||
"id": 201614,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/201614?v=4",
|
||||
"html_url": "https:\/\/github.com\/gteissier"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gteissier\/CVE-2016-6271",
|
||||
"description": "Proof of concept for ZRTP man-in-the-middle",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-21T22:57:04Z",
|
||||
"updated_at": "2023-02-01T03:25:22Z",
|
||||
"pushed_at": "2017-07-22T00:06:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2023-04-10T16:49:25Z",
|
||||
"updated_at": "2023-04-11T20:34:32Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2940,13 +2940,13 @@
|
|||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 24,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal \/ Authenticated Arbitrary File Deletion in Python3",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-24T10:58:53Z",
|
||||
"updated_at": "2023-03-08T19:48:13Z",
|
||||
"updated_at": "2023-04-11T18:39:18Z",
|
||||
"pushed_at": "2023-02-27T16:32:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 632,
|
||||
"watchers_count": 632,
|
||||
"has_discussions": false,
|
||||
"forks_count": 160,
|
||||
"forks_count": 159,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 160,
|
||||
"forks": 159,
|
||||
"watchers": 632,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -141,7 +141,7 @@
|
|||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -151,7 +151,7 @@
|
|||
"nmap-script"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"forks": 8,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -143,13 +143,13 @@
|
|||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"forks": 54,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -913,7 +913,7 @@
|
|||
"stargazers_count": 768,
|
||||
"watchers_count": 768,
|
||||
"has_discussions": false,
|
||||
"forks_count": 159,
|
||||
"forks_count": 158,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -921,7 +921,7 @@
|
|||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 159,
|
||||
"forks": 158,
|
||||
"watchers": 768,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,10 +105,10 @@
|
|||
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T23:15:05Z",
|
||||
"updated_at": "2023-03-29T02:29:02Z",
|
||||
"updated_at": "2023-04-11T22:24:13Z",
|
||||
"pushed_at": "2022-01-13T12:35:19Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 255,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1175,10 +1175,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-04-07T04:23:05Z",
|
||||
"updated_at": "2023-04-12T00:02:53Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"has_discussions": false,
|
||||
"forks_count": 119,
|
||||
"allow_forking": true,
|
||||
|
@ -1187,7 +1187,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 119,
|
||||
"watchers": 388,
|
||||
"watchers": 389,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-09T15:53:48Z",
|
||||
"updated_at": "2023-04-11T17:46:05Z",
|
||||
"updated_at": "2023-04-11T21:32:28Z",
|
||||
"pushed_at": "2023-03-02T19:43:36Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-04-09T03:30:35Z",
|
||||
"updated_at": "2023-04-11T22:24:13Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"stargazers_count": 700,
|
||||
"watchers_count": 700,
|
||||
"has_discussions": false,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 151,
|
||||
"watchers": 699,
|
||||
"watchers": 700,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1366,10 +1366,10 @@
|
|||
"description": "Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-15T10:06:15Z",
|
||||
"updated_at": "2023-03-12T05:26:01Z",
|
||||
"updated_at": "2023-04-11T18:37:11Z",
|
||||
"pushed_at": "2022-07-21T14:24:29Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -1378,7 +1378,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -249,10 +249,10 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2023-04-09T03:18:06Z",
|
||||
"updated_at": "2023-04-12T00:00:56Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"has_discussions": false,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
|
@ -261,7 +261,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 345,
|
||||
"watchers": 344,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"forks": 37,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Docker CVE-2022-37708",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-22T23:06:08Z",
|
||||
"updated_at": "2023-02-04T16:25:16Z",
|
||||
"updated_at": "2023-04-11T19:04:00Z",
|
||||
"pushed_at": "2022-09-23T00:07:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "针对(CVE-2023-0179)漏洞利用 该漏洞被分配为CVE-2023-0179,影响了从5.5到6.2-rc3的所有Linux版本,该漏洞在6.1.6上被测试。 漏洞的细节和文章可以在os-security上找到。",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T02:20:52Z",
|
||||
"updated_at": "2023-04-11T17:27:49Z",
|
||||
"updated_at": "2023-04-12T00:24:53Z",
|
||||
"pushed_at": "2023-03-16T02:22:28Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 94,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,10 +97,10 @@
|
|||
"html_url": "https:\/\/github.com\/yosef0x01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yosef0x01\/CVE-2023-0669-Analysis",
|
||||
"description": null,
|
||||
"description": "CVE analysis for CVE-2023-0669",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-26T02:33:54Z",
|
||||
"updated_at": "2023-03-14T22:22:19Z",
|
||||
"updated_at": "2023-04-11T21:16:29Z",
|
||||
"pushed_at": "2023-03-12T17:37:44Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -49,10 +49,10 @@
|
|||
"description": "Detection and sanitization for Acropalypse Now - CVE-2023-21036",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-22T14:59:42Z",
|
||||
"updated_at": "2023-04-09T13:09:04Z",
|
||||
"updated_at": "2023-04-11T21:07:15Z",
|
||||
"pushed_at": "2023-03-23T18:10:24Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -168,10 +168,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:43:39Z",
|
||||
"updated_at": "2023-04-11T14:13:54Z",
|
||||
"updated_at": "2023-04-11T21:12:14Z",
|
||||
"pushed_at": "2023-03-17T07:47:40Z",
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -180,7 +180,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 285,
|
||||
"watchers": 286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -615,10 +615,10 @@
|
|||
"description": "CVE-2023-23752",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-06T12:15:50Z",
|
||||
"updated_at": "2023-04-06T12:27:14Z",
|
||||
"updated_at": "2023-04-11T18:35:20Z",
|
||||
"pushed_at": "2023-04-06T12:28:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -627,7 +627,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "VM Escape for Parallels Desktop <18.1.1",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-20T11:47:54Z",
|
||||
"updated_at": "2023-04-10T00:45:16Z",
|
||||
"updated_at": "2023-04-11T18:47:46Z",
|
||||
"pushed_at": "2023-03-20T12:51:29Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
}
|
||||
]
|
21
README.md
21
README.md
|
@ -2518,7 +2518,7 @@ Spring Security versions 5.5.x prior to 5.5.7, 5.6.x prior to 5.6.4, and earlier
|
|||
### CVE-2022-22978 (2022-05-19)
|
||||
|
||||
<code>
|
||||
In Spring Security versions 5.5.6 and 5.6.3 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass
|
||||
In spring security versions prior to 5.4.11+, 5.5.7+ , 5.6.4+ and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
|
||||
</code>
|
||||
|
||||
- [DeEpinGh0st/CVE-2022-22978](https://github.com/DeEpinGh0st/CVE-2022-22978)
|
||||
|
@ -4968,7 +4968,7 @@ Power Distribution Units running on Powertek firmware (multiple brands) before 3
|
|||
### CVE-2022-33679 (2022-09-13)
|
||||
|
||||
<code>
|
||||
Windows Kerberos Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-33647.
|
||||
Windows Kerberos Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Bdenneu/CVE-2022-33679](https://github.com/Bdenneu/CVE-2022-33679)
|
||||
|
@ -5058,7 +5058,7 @@ Windows Network File System Remote Code Execution Vulnerability.
|
|||
### CVE-2022-34718 (2022-09-13)
|
||||
|
||||
<code>
|
||||
Windows TCP/IP Remote Code Execution Vulnerability.
|
||||
Windows TCP/IP Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [SecLabResearchBV/CVE-2022-34718-PoC](https://github.com/SecLabResearchBV/CVE-2022-34718-PoC)
|
||||
|
@ -5066,7 +5066,7 @@ Windows TCP/IP Remote Code Execution Vulnerability.
|
|||
### CVE-2022-34729 (2022-09-13)
|
||||
|
||||
<code>
|
||||
Windows GDI Elevation of Privilege Vulnerability.
|
||||
Windows GDI Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [Pwnrin/CVE-2022-34729](https://github.com/Pwnrin/CVE-2022-34729)
|
||||
|
@ -5216,7 +5216,7 @@ SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds over
|
|||
### CVE-2022-35841 (2022-09-13)
|
||||
|
||||
<code>
|
||||
Windows Enterprise App Management Service Remote Code Execution Vulnerability.
|
||||
Windows Enterprise App Management Service Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [Wack0/CVE-2022-35841](https://github.com/Wack0/CVE-2022-35841)
|
||||
|
@ -5557,7 +5557,7 @@ Docker version 20.10.15, build fd82621 is vulnerable to Insecure Permissions. Un
|
|||
### CVE-2022-37969 (2022-09-13)
|
||||
|
||||
<code>
|
||||
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35803.
|
||||
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [fortra/CVE-2022-37969](https://github.com/fortra/CVE-2022-37969)
|
||||
|
@ -29194,7 +29194,6 @@ Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.
|
|||
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
|
||||
</code>
|
||||
|
||||
- [jpiechowka/jenkins-cve-2016-0792](https://github.com/jpiechowka/jenkins-cve-2016-0792)
|
||||
- [R0B1NL1N/java-deserialization-exploits](https://github.com/R0B1NL1N/java-deserialization-exploits)
|
||||
|
||||
### CVE-2016-0793 (2016-04-01)
|
||||
|
@ -29827,14 +29826,6 @@ sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password has
|
|||
|
||||
- [justlce/CVE-2016-6210-Exploit](https://github.com/justlce/CVE-2016-6210-Exploit)
|
||||
|
||||
### CVE-2016-6271 (2017-01-18)
|
||||
|
||||
<code>
|
||||
The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle attackers to conduct spoofing attacks by leveraging a missing HVI check on DHPart2 packet reception.
|
||||
</code>
|
||||
|
||||
- [gteissier/CVE-2016-6271](https://github.com/gteissier/CVE-2016-6271)
|
||||
|
||||
### CVE-2016-6317 (2016-09-07)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue