Auto Update 2023/01/20 18:33:13

This commit is contained in:
motikan2010-bot 2023-01-21 03:33:13 +09:00
parent e9e58db35c
commit 59c5206ada
33 changed files with 213 additions and 319 deletions

View file

@ -49,10 +49,10 @@
"description": "Collection of \"modchip\" designs for launching payloads via the Tegra RCM bug (CVE-2018-6242) ",
"fork": false,
"created_at": "2018-05-22T01:15:14Z",
"updated_at": "2022-06-14T00:14:06Z",
"updated_at": "2023-01-20T17:28:05Z",
"pushed_at": "2018-05-22T07:44:42Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -61,7 +61,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 22,
"watchers": 21,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2023-01-13T17:10:31Z",
"updated_at": "2023-01-20T14:00:20Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 313,
"watchers_count": 313,
"stargazers_count": 314,
"watchers_count": 314,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 313,
"watchers": 314,
"score": 0
}
]

View file

@ -1204,6 +1204,35 @@
"watchers": 0,
"score": 0
},
{
"id": 278269808,
"name": "CVE-2019-19781",
"full_name": "SharpHack\/CVE-2019-19781",
"owner": {
"login": "SharpHack",
"id": 15997329,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15997329?v=4",
"html_url": "https:\/\/github.com\/SharpHack"
},
"html_url": "https:\/\/github.com\/SharpHack\/CVE-2019-19781",
"description": null,
"fork": false,
"created_at": "2020-07-09T05:17:07Z",
"updated_at": "2020-07-09T05:17:29Z",
"pushed_at": "2020-07-09T05:17:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 278386517,
"name": "CVE-2019-19781-poc",

View file

@ -146,5 +146,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 591388946,
"name": "CVE-2019-9978",
"full_name": "grimlockx\/CVE-2019-9978",
"owner": {
"login": "grimlockx",
"id": 95048484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95048484?v=4",
"html_url": "https:\/\/github.com\/grimlockx"
},
"html_url": "https:\/\/github.com\/grimlockx\/CVE-2019-9978",
"description": "Remote Code Execution in Social Warfare Plugin before 3.5.3 for Wordpress.",
"fork": false,
"created_at": "2023-01-20T16:29:18Z",
"updated_at": "2023-01-20T16:31:03Z",
"pushed_at": "2023-01-20T16:29:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2023-01-07T09:31:12Z",
"updated_at": "2023-01-20T13:38:11Z",
"pushed_at": "2021-12-23T16:28:28Z",
"stargazers_count": 317,
"watchers_count": 317,
"stargazers_count": 318,
"watchers_count": 318,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 317,
"watchers": 318,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2023-01-18T14:50:41Z",
"updated_at": "2023-01-20T14:57:48Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 654,
"watchers_count": 654,
"stargazers_count": 655,
"watchers_count": 655,
"has_discussions": false,
"forks_count": 171,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 171,
"watchers": 654,
"watchers": 655,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2023-01-17T03:41:27Z",
"updated_at": "2023-01-20T13:46:13Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 311,
"watchers_count": 311,
"stargazers_count": 312,
"watchers_count": 312,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -133,7 +133,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 311,
"watchers": 312,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 35,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "ETS5 Password Recovery Tool is a PoC for CVE-2021-36799",
"fork": false,
"created_at": "2021-07-18T13:59:43Z",
"updated_at": "2023-01-10T11:37:25Z",
"updated_at": "2023-01-20T12:51:12Z",
"pushed_at": "2022-07-23T14:08:41Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for DoS vulnerability CVE-2021-37740 in firmware v3.0.3 of SCN-IP100.03 and SCN-IP000.03 by MDT. The bug has been fixed in firmware v3.0.4.",
"fork": false,
"created_at": "2022-04-01T18:07:42Z",
"updated_at": "2022-11-09T18:15:40Z",
"updated_at": "2023-01-20T13:13:42Z",
"pushed_at": "2022-07-22T17:16:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -909,12 +909,12 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2023-01-19T16:46:01Z",
"updated_at": "2023-01-20T15:29:21Z",
"pushed_at": "2022-09-21T07:49:03Z",
"stargazers_count": 1528,
"watchers_count": 1528,
"stargazers_count": 1529,
"watchers_count": 1529,
"has_discussions": false,
"forks_count": 437,
"forks_count": 438,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -925,8 +925,8 @@
"security"
],
"visibility": "public",
"forks": 437,
"watchers": 1528,
"forks": 438,
"watchers": 1529,
"score": 0
},
{
@ -3614,10 +3614,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-01-20T07:21:32Z",
"updated_at": "2023-01-20T16:17:19Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3168,
"watchers_count": 3168,
"stargazers_count": 3169,
"watchers_count": 3169,
"has_discussions": true,
"forks_count": 743,
"allow_forking": true,
@ -3626,7 +3626,7 @@
"topics": [],
"visibility": "public",
"forks": 743,
"watchers": 3168,
"watchers": 3169,
"score": 0
},
{
@ -9673,7 +9673,7 @@
"fork": false,
"created_at": "2021-12-24T20:00:12Z",
"updated_at": "2022-01-06T13:31:29Z",
"pushed_at": "2022-12-23T17:04:12Z",
"pushed_at": "2023-01-20T17:03:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,19 +13,19 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-12-16T06:19:48Z",
"updated_at": "2023-01-20T16:06:49Z",
"pushed_at": "2022-07-23T23:14:02Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 74,
"forks": 31,
"watchers": 75,
"score": 0
},
{

View file

@ -2285,10 +2285,10 @@
"description": "修改版CVE-2022-0847",
"fork": false,
"created_at": "2022-11-21T01:21:35Z",
"updated_at": "2022-12-15T02:31:36Z",
"updated_at": "2023-01-20T18:20:13Z",
"pushed_at": "2022-11-21T01:24:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -2297,7 +2297,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -373,13 +373,13 @@
"stargazers_count": 232,
"watchers_count": 232,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"forks": 39,
"watchers": 232,
"score": 0
},
@ -1004,7 +1004,7 @@
"fork": false,
"created_at": "2022-05-11T19:33:37Z",
"updated_at": "2022-07-04T19:06:44Z",
"pushed_at": "2022-07-06T00:56:28Z",
"pushed_at": "2023-01-20T17:21:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -223,7 +223,7 @@
"fork": false,
"created_at": "2023-01-13T13:31:34Z",
"updated_at": "2023-01-19T18:51:13Z",
"pushed_at": "2023-01-18T20:57:25Z",
"pushed_at": "2023-01-20T17:42:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,12 +13,12 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2023-01-19T13:37:58Z",
"updated_at": "2023-01-20T15:54:55Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 684,
"watchers_count": 684,
"stargazers_count": 685,
"watchers_count": 685,
"has_discussions": false,
"forks_count": 144,
"forks_count": 145,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 144,
"watchers": 684,
"forks": 145,
"watchers": 685,
"score": 0
}
]

View file

@ -85,34 +85,5 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 585658055,
"name": "CVE-2022-29455",
"full_name": "yaudahbanh\/CVE-2022-29455",
"owner": {
"login": "yaudahbanh",
"id": 39010800,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39010800?v=4",
"html_url": "https:\/\/github.com\/yaudahbanh"
},
"html_url": "https:\/\/github.com\/yaudahbanh\/CVE-2022-29455",
"description": "Mass Scanner for CVE-2022-29455 on Elementor Plugins Wordpress",
"fork": false,
"created_at": "2023-01-05T18:29:47Z",
"updated_at": "2023-01-05T18:30:11Z",
"pushed_at": "2023-01-05T18:30:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-29582 targeting Google's Kernel CTF",
"fork": false,
"created_at": "2022-08-04T15:29:04Z",
"updated_at": "2023-01-19T21:00:29Z",
"updated_at": "2023-01-20T15:50:39Z",
"pushed_at": "2022-08-08T04:13:33Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 58,
"watchers": 59,
"score": 0
}
]

View file

@ -1998,10 +1998,10 @@
"description": "Educational Follina PoC Tool",
"fork": false,
"created_at": "2022-06-25T16:27:59Z",
"updated_at": "2022-12-12T02:04:55Z",
"updated_at": "2023-01-20T16:04:27Z",
"pushed_at": "2022-12-07T17:58:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -2010,7 +2010,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具可根据不同的Jdk生成出其所对应的xslt文件",
"fork": false,
"created_at": "2023-01-17T03:48:11Z",
"updated_at": "2023-01-20T06:32:58Z",
"updated_at": "2023-01-20T15:35:15Z",
"pushed_at": "2023-01-17T12:27:08Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 32,
"watchers": 33,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2022-3699 with arbitrary kernel code execution capability",
"fork": false,
"created_at": "2022-12-25T04:34:26Z",
"updated_at": "2023-01-10T00:40:56Z",
"updated_at": "2023-01-20T16:25:52Z",
"pushed_at": "2022-12-27T21:30:08Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 35,
"watchers": 36,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "Finding CVE-2022-3786 (openssl) with Mayhem",
"fork": false,
"created_at": "2023-01-11T19:52:43Z",
"updated_at": "2023-01-11T19:59:43Z",
"updated_at": "2023-01-20T15:05:45Z",
"pushed_at": "2023-01-11T19:55:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Script to update Windows Recovery Environment to patch against CVE-2022-41099",
"fork": false,
"created_at": "2023-01-13T21:27:03Z",
"updated_at": "2023-01-20T11:01:56Z",
"updated_at": "2023-01-20T17:09:56Z",
"pushed_at": "2023-01-20T10:31:58Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

31
2022/CVE-2022-42864.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 591057092,
"name": "CVE-2022-42864",
"full_name": "Muirey03\/CVE-2022-42864",
"owner": {
"login": "Muirey03",
"id": 31448720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31448720?v=4",
"html_url": "https:\/\/github.com\/Muirey03"
},
"html_url": "https:\/\/github.com\/Muirey03\/CVE-2022-42864",
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
"updated_at": "2023-01-20T18:05:27Z",
"pushed_at": "2023-01-20T17:58:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -1,33 +1,4 @@
[
{
"id": 585639540,
"name": "CVE-2022-44877",
"full_name": "numanturle\/CVE-2022-44877",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-44877",
"description": null,
"fork": false,
"created_at": "2023-01-05T17:29:10Z",
"updated_at": "2023-01-18T13:33:32Z",
"pushed_at": "2023-01-05T17:40:18Z",
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 91,
"score": 0
},
{
"id": 585996269,
"name": "CVE-2022-44877-RCE",

View file

@ -94,38 +94,6 @@
"watchers": 2,
"score": 0
},
{
"id": 585629170,
"name": "CVE-2022-46169",
"full_name": "sAsPeCt488\/CVE-2022-46169",
"owner": {
"login": "sAsPeCt488",
"id": 55363474,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55363474?v=4",
"html_url": "https:\/\/github.com\/sAsPeCt488"
},
"html_url": "https:\/\/github.com\/sAsPeCt488\/CVE-2022-46169",
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-01-05T16:56:06Z",
"updated_at": "2023-01-17T17:36:56Z",
"pushed_at": "2023-01-06T01:30:33Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
"cve-2022-46169"
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0
},
{
"id": 588437634,
"name": "CVE-2022-46169",

View file

@ -1,31 +0,0 @@
[
{
"id": 585254254,
"name": "CVE-2022-46622",
"full_name": "sudoninja-noob\/CVE-2022-46622",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46622",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:52:13Z",
"updated_at": "2023-01-04T17:52:13Z",
"pushed_at": "2023-01-04T17:52:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 585254938,
"name": "CVE-2022-46623",
"full_name": "sudoninja-noob\/CVE-2022-46623",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46623",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:54:29Z",
"updated_at": "2023-01-04T17:54:29Z",
"pushed_at": "2023-01-04T17:54:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-01-20T01:37:53Z",
"updated_at": "2023-01-20T18:11:44Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 247,
"watchers": 248,
"score": 0
},
{
@ -71,7 +71,7 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-01-19T22:34:57Z",
"updated_at": "2023-01-20T13:21:59Z",
"pushed_at": "2023-01-06T06:31:57Z",
"stargazers_count": 624,
"watchers_count": 624,
@ -221,10 +221,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-05T21:50:25Z",
"updated_at": "2023-01-20T01:35:13Z",
"updated_at": "2023-01-20T14:10:20Z",
"pushed_at": "2023-01-20T07:14:44Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -235,7 +235,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 102,
"watchers": 103,
"score": 0
},
{
@ -252,8 +252,8 @@
"description": "Simple customization app using CVE-2022-46689",
"fork": false,
"created_at": "2023-01-12T14:31:30Z",
"updated_at": "2023-01-17T23:51:27Z",
"pushed_at": "2023-01-18T00:40:08Z",
"updated_at": "2023-01-20T16:22:01Z",
"pushed_at": "2023-01-20T16:21:55Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -1,31 +0,0 @@
[
{
"id": 585255498,
"name": "CVE-2022-47102",
"full_name": "sudoninja-noob\/CVE-2022-47102",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-47102",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:56:09Z",
"updated_at": "2023-01-04T17:56:09Z",
"pushed_at": "2023-01-04T17:56:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "POC for CVE-2022-47966 affecting multiple ManageEngine products",
"fork": false,
"created_at": "2023-01-17T21:26:28Z",
"updated_at": "2023-01-20T11:50:42Z",
"updated_at": "2023-01-20T17:11:52Z",
"pushed_at": "2023-01-19T13:10:07Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 12,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 39,
"forks": 14,
"watchers": 48,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2023-01-20T08:58:48Z",
"updated_at": "2023-01-20T16:21:34Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 213,
"watchers_count": 213,
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 213,
"forks": 46,
"watchers": 215,
"score": 0
}
]

View file

@ -3048,7 +3048,6 @@ DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elem
- [GULL2100/Wordpress_xss-CVE-2022-29455](https://github.com/GULL2100/Wordpress_xss-CVE-2022-29455)
- [akhilkoradiya/CVE-2022-29455](https://github.com/akhilkoradiya/CVE-2022-29455)
- [Chocapikk/CVE-2022-29455](https://github.com/Chocapikk/CVE-2022-29455)
- [yaudahbanh/CVE-2022-29455](https://github.com/yaudahbanh/CVE-2022-29455)
### CVE-2022-29464 (2022-04-18)
@ -4881,6 +4880,14 @@ A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 th
- [bryanster/ioc-cve-2022-42475](https://github.com/bryanster/ioc-cve-2022-42475)
### CVE-2022-42864 (2022-12-15)
<code>
A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
</code>
- [Muirey03/CVE-2022-42864](https://github.com/Muirey03/CVE-2022-42864)
### CVE-2022-42889 (2022-10-13)
<code>
@ -5011,7 +5018,12 @@ In libexpat through 2.4.9, there is a use-after free caused by overeager destruc
- [Trinadh465/external_expat-2.1.0_CVE-2022-43680](https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-43680)
- [nidhihcl/external_expat_2.1.0_CVE-2022-43680](https://github.com/nidhihcl/external_expat_2.1.0_CVE-2022-43680)
### CVE-2022-43959
### CVE-2022-43959 (2023-01-20)
<code>
Insufficiently Protected Credentials in the AD/LDAP server settings in 1C-Bitrix Bitrix24 through 22.200.200 allow remote administrators to discover an AD/LDAP administrative password by reading the source code of /bitrix/admin/ldap_server_edit.php.
</code>
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)
### CVE-2022-44149 (2023-01-06)
@ -5067,7 +5079,6 @@ A reflected cross-site scripting (XSS) vulnerability in maccms10 v2022.1000.3032
login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
</code>
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
### CVE-2022-45025 (2022-12-06)
@ -5170,7 +5181,6 @@ Cacti is an open source platform which provides a robust and extensible operatio
- [0xf4n9x/CVE-2022-46169](https://github.com/0xf4n9x/CVE-2022-46169)
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
- [Anthonyc3rb3ru5/CVE-2022-46169](https://github.com/Anthonyc3rb3ru5/CVE-2022-46169)
- [hab1b0x/CVE-2022-46169](https://github.com/hab1b0x/CVE-2022-46169)
- [N1arut/CVE-2022-46169_POC](https://github.com/N1arut/CVE-2022-46169_POC)
@ -5222,22 +5232,6 @@ An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check
- [SmallTown123/details-for-CVE-2022-46505](https://github.com/SmallTown123/details-for-CVE-2022-46505)
### CVE-2022-46622 (2023-01-12)
<code>
A cross-site scripting (XSS) vulnerability in Judging Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
</code>
- [sudoninja-noob/CVE-2022-46622](https://github.com/sudoninja-noob/CVE-2022-46622)
### CVE-2022-46623 (2023-01-12)
<code>
Judging Management System v1.0.0 was discovered to contain a SQL injection vulnerability via the username parameter.
</code>
- [sudoninja-noob/CVE-2022-46623](https://github.com/sudoninja-noob/CVE-2022-46623)
### CVE-2022-46689 (2022-12-15)
<code>
@ -5254,14 +5248,6 @@ A race condition was addressed with additional validation. This issue is fixed i
- [straight-tamago/FileSwitcherX](https://github.com/straight-tamago/FileSwitcherX)
- [BomberFish/Mandela](https://github.com/BomberFish/Mandela)
### CVE-2022-47102 (2023-01-12)
<code>
A cross-site scripting (XSS) vulnerability in Student Study Center Management System V 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
</code>
- [sudoninja-noob/CVE-2022-47102](https://github.com/sudoninja-noob/CVE-2022-47102)
### CVE-2022-47952 (2023-01-01)
<code>
@ -19190,6 +19176,7 @@ The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-a
- [KTN1990/CVE-2019-9978](https://github.com/KTN1990/CVE-2019-9978)
- [cved-sources/cve-2019-9978](https://github.com/cved-sources/cve-2019-9978)
- [caique-garbim/CVE-2019-9978_Exploit](https://github.com/caique-garbim/CVE-2019-9978_Exploit)
- [grimlockx/CVE-2019-9978](https://github.com/grimlockx/CVE-2019-9978)
### CVE-2019-10008 (2019-04-24)
@ -21314,6 +21301,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
- [5l1v3r1/Citrix_CVE-2019-19781](https://github.com/5l1v3r1/Citrix_CVE-2019-19781)
- [Roshi99/Remote-Code-Execution-Exploit-for-Citrix-Application-Delivery-Controller-and-Citrix-Gateway-CVE-201](https://github.com/Roshi99/Remote-Code-Execution-Exploit-for-Citrix-Application-Delivery-Controller-and-Citrix-Gateway-CVE-201)
- [yukar1z0e/CVE-2019-19781](https://github.com/yukar1z0e/CVE-2019-19781)
- [SharpHack/CVE-2019-19781](https://github.com/SharpHack/CVE-2019-19781)
- [qiong-qi/CVE-2019-19781-poc](https://github.com/qiong-qi/CVE-2019-19781-poc)
- [w4fz5uck5/CVE-2019-19781-CitrixRCE](https://github.com/w4fz5uck5/CVE-2019-19781-CitrixRCE)
- [andripwn/CVE-2019-19781](https://github.com/andripwn/CVE-2019-19781)