Auto Update 2023/11/30 12:58:11

This commit is contained in:
motikan2010-bot 2023-11-30 21:58:11 +09:00
parent af82a1614a
commit 6f5f65112f
74 changed files with 1412 additions and 201 deletions

View file

@ -1,4 +1,34 @@
[
{
"id": 69224981,
"name": "cve-2010-3333",
"full_name": "whiteHat001\/cve-2010-3333",
"owner": {
"login": "whiteHat001",
"id": 18191034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18191034?v=4",
"html_url": "https:\/\/github.com\/whiteHat001"
},
"html_url": "https:\/\/github.com\/whiteHat001\/cve-2010-3333",
"description": null,
"fork": false,
"created_at": "2016-09-26T07:35:41Z",
"updated_at": "2016-09-26T07:35:41Z",
"pushed_at": "2016-09-26T08:19:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 524884923,
"name": "CVE-2010-3333-reproduction",

32
2010/CVE-2010-3847.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 77808380,
"name": "cve-2010-3847",
"full_name": "magisterquis\/cve-2010-3847",
"owner": {
"login": "magisterquis",
"id": 499530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499530?v=4",
"html_url": "https:\/\/github.com\/magisterquis"
},
"html_url": "https:\/\/github.com\/magisterquis\/cve-2010-3847",
"description": "Script to take advantage of CVE-2010-3847",
"fork": false,
"created_at": "2017-01-02T03:20:36Z",
"updated_at": "2017-01-02T20:12:45Z",
"pushed_at": "2017-01-02T20:12:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -444,10 +444,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2023-11-20T09:28:12Z",
"updated_at": "2023-11-30T08:32:33Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 407,
"watchers_count": 407,
"stargazers_count": 408,
"watchers_count": 408,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -456,7 +456,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 407,
"watchers": 408,
"score": 0,
"subscribers_count": 9
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 536,
"watchers_count": 536,
"has_discussions": false,
"forks_count": 264,
"forks_count": 263,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 264,
"forks": 263,
"watchers": 536,
"score": 0,
"subscribers_count": 28

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)",
"fork": false,
"created_at": "2017-05-25T13:20:56Z",
"updated_at": "2023-11-24T19:31:11Z",
"updated_at": "2023-11-30T06:35:38Z",
"pushed_at": "2017-07-26T13:07:51Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 179,
"watchers": 178,
"score": 0,
"subscribers_count": 11
},

View file

@ -29,6 +29,96 @@
"score": 0,
"subscribers_count": 10
},
{
"id": 172009558,
"name": "CVE-2018-20250",
"full_name": "QAX-A-Team\/CVE-2018-20250",
"owner": {
"login": "QAX-A-Team",
"id": 35417332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4",
"html_url": "https:\/\/github.com\/QAX-A-Team"
},
"html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250",
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
"fork": false,
"created_at": "2019-02-22T06:47:01Z",
"updated_at": "2021-05-29T18:38:32Z",
"pushed_at": "2019-02-22T07:47:26Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 25,
"score": 0,
"subscribers_count": 2
},
{
"id": 172069488,
"name": "CVE-2018-20250-poc-winrar",
"full_name": "nmweizi\/CVE-2018-20250-poc-winrar",
"owner": {
"login": "nmweizi",
"id": 1232444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1232444?v=4",
"html_url": "https:\/\/github.com\/nmweizi"
},
"html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar",
"description": null,
"fork": false,
"created_at": "2019-02-22T13:18:14Z",
"updated_at": "2019-02-22T13:20:31Z",
"pushed_at": "2019-02-22T13:20:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 172078598,
"name": "UNACEV2.DLL-CVE-2018-20250",
"full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250",
"owner": {
"login": "blunden",
"id": 249915,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249915?v=4",
"html_url": "https:\/\/github.com\/blunden"
},
"html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250",
"description": "A version of the binary patched to address CVE-2018-20250",
"fork": false,
"created_at": "2019-02-22T14:19:20Z",
"updated_at": "2019-02-22T14:29:30Z",
"pushed_at": "2019-02-22T14:29:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 172156568,
"name": "CVE-2018-20250-WinRAR-ACE",

View file

@ -13,10 +13,10 @@
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
"fork": false,
"created_at": "2019-01-23T14:53:19Z",
"updated_at": "2023-10-18T16:37:43Z",
"updated_at": "2023-11-30T06:47:03Z",
"pushed_at": "2022-08-28T08:21:26Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-28T11:55:46Z",
"updated_at": "2023-11-30T12:00:33Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3933,
"watchers_count": 3933,
"stargazers_count": 3934,
"watchers_count": 3934,
"has_discussions": false,
"forks_count": 1096,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1096,
"watchers": 3933,
"watchers": 3934,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2023-11-20T09:28:12Z",
"updated_at": "2023-11-30T08:32:33Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 407,
"watchers_count": 407,
"stargazers_count": 408,
"watchers_count": 408,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 407,
"watchers": 408,
"score": 0,
"subscribers_count": 9
},

View file

@ -1096,10 +1096,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2023-11-29T15:28:17Z",
"updated_at": "2023-11-30T08:11:16Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1276,
"watchers_count": 1276,
"stargazers_count": 1277,
"watchers_count": 1277,
"has_discussions": false,
"forks_count": 368,
"allow_forking": true,
@ -1114,7 +1114,7 @@
],
"visibility": "public",
"forks": 368,
"watchers": 1276,
"watchers": 1277,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-28T11:55:46Z",
"updated_at": "2023-11-30T12:00:33Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3933,
"watchers_count": 3933,
"stargazers_count": 3934,
"watchers_count": 3934,
"has_discussions": false,
"forks_count": 1096,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1096,
"watchers": 3933,
"watchers": 3934,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,10 +13,10 @@
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
"fork": false,
"created_at": "2020-10-10T17:50:01Z",
"updated_at": "2023-11-03T10:57:50Z",
"updated_at": "2023-11-30T10:29:35Z",
"pushed_at": "2020-10-12T09:57:28Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 53,
"watchers": 52,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "exim use after free exploit and detection",
"fork": false,
"created_at": "2021-05-15T15:09:05Z",
"updated_at": "2023-09-28T11:27:41Z",
"updated_at": "2023-11-30T06:49:01Z",
"pushed_at": "2021-05-15T15:10:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2023-11-20T12:43:20Z",
"updated_at": "2023-11-30T08:40:09Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 409,
"watchers_count": 409,
"stargazers_count": 410,
"watchers_count": 410,
"has_discussions": false,
"forks_count": 128,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 128,
"watchers": 409,
"watchers": 410,
"score": 0,
"subscribers_count": 6
},

View file

@ -60,10 +60,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2023-11-24T20:11:55Z",
"updated_at": "2023-11-30T09:40:17Z",
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 133,
"watchers_count": 133,
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -72,7 +72,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 133,
"watchers": 134,
"score": 0,
"subscribers_count": 9
},

View file

@ -223,10 +223,10 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
"updated_at": "2023-11-19T18:59:38Z",
"updated_at": "2023-11-30T09:57:00Z",
"pushed_at": "2022-02-10T11:38:46Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
"fork": false,
"created_at": "2022-04-15T04:23:44Z",
"updated_at": "2023-11-24T20:24:30Z",
"updated_at": "2023-11-30T09:16:53Z",
"pushed_at": "2022-04-15T08:52:11Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 36,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 381,
"watchers_count": 381,
"has_discussions": false,
"forks_count": 130,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 130,
"forks": 129,
"watchers": 381,
"score": 0,
"subscribers_count": 4

View file

@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2023-11-29T09:30:10Z",
"updated_at": "2023-11-30T11:19:49Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1863,
"watchers_count": 1863,
"stargazers_count": 1864,
"watchers_count": 1864,
"has_discussions": false,
"forks_count": 517,
"allow_forking": true,
@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 517,
"watchers": 1863,
"watchers": 1864,
"score": 0,
"subscribers_count": 21
},

View file

@ -1527,7 +1527,7 @@
"fork": false,
"created_at": "2021-12-11T12:16:45Z",
"updated_at": "2023-05-28T11:06:10Z",
"pushed_at": "2023-11-29T21:45:24Z",
"pushed_at": "2023-11-30T07:57:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -133,10 +133,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2023-11-29T15:13:21Z",
"updated_at": "2023-11-30T11:48:33Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1057,
"watchers_count": 1057,
"stargazers_count": 1058,
"watchers_count": 1058,
"has_discussions": false,
"forks_count": 224,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 224,
"watchers": 1057,
"watchers": 1058,
"score": 0,
"subscribers_count": 17
},
@ -2353,6 +2353,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 585137919,
"name": "Dirty-Pipe-CVE-2022-0847-POCs",
"full_name": "ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
"owner": {
"login": "ajith737",
"id": 72512571,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
"html_url": "https:\/\/github.com\/ajith737"
},
"html_url": "https:\/\/github.com\/ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
"description": null,
"fork": false,
"created_at": "2023-01-04T12:17:12Z",
"updated_at": "2023-01-04T12:17:19Z",
"pushed_at": "2023-01-04T12:51:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 592661297,
"name": "CVE-2022-0847",
@ -2517,10 +2547,10 @@
"description": "POC Exploit to add user to Sudo for CVE-2022-0847 Dirty Pipe Vulnerability",
"fork": false,
"created_at": "2023-06-20T23:48:24Z",
"updated_at": "2023-06-20T23:48:57Z",
"updated_at": "2023-11-30T12:04:32Z",
"pushed_at": "2023-06-20T23:48:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2529,7 +2559,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -128,6 +128,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 586568152,
"name": "CVE-2022-1040",
"full_name": "michealadams30\/CVE-2022-1040",
"owner": {
"login": "michealadams30",
"id": 113975732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113975732?v=4",
"html_url": "https:\/\/github.com\/michealadams30"
},
"html_url": "https:\/\/github.com\/michealadams30\/CVE-2022-1040",
"description": "Sophos EXploit",
"fork": false,
"created_at": "2023-01-08T15:46:00Z",
"updated_at": "2023-01-08T15:46:00Z",
"pushed_at": "2023-01-08T15:48:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 696656893,
"name": "CVE-2022-1040",

View file

@ -43,10 +43,10 @@
"description": "CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC",
"fork": false,
"created_at": "2022-05-30T14:45:15Z",
"updated_at": "2023-04-19T22:39:36Z",
"updated_at": "2023-11-30T08:58:17Z",
"pushed_at": "2022-07-20T14:27:49Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -94,5 +94,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 594762176,
"name": "CVE-2022-1329",
"full_name": "dexit\/CVE-2022-1329",
"owner": {
"login": "dexit",
"id": 6205151,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6205151?v=4",
"html_url": "https:\/\/github.com\/dexit"
},
"html_url": "https:\/\/github.com\/dexit\/CVE-2022-1329",
"description": "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~\/core\/app\/modules\/onboarding\/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to o CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-29T15:13:34Z",
"updated_at": "2023-02-20T12:39:20Z",
"pushed_at": "2022-12-28T12:11:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-20470.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 584611982,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20470",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
"description": null,
"fork": false,
"created_at": "2023-01-03T03:54:59Z",
"updated_at": "2023-03-27T01:47:22Z",
"pushed_at": "2023-01-03T04:01:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

62
2022/CVE-2022-20473.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 584289667,
"name": "frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
"description": null,
"fork": false,
"created_at": "2023-01-02T05:55:37Z",
"updated_at": "2023-01-02T05:55:37Z",
"pushed_at": null,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 584624006,
"name": "frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
"description": null,
"fork": false,
"created_at": "2023-01-03T04:51:12Z",
"updated_at": "2023-01-03T04:53:10Z",
"pushed_at": "2023-01-03T04:53:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2022/CVE-2022-20607.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 598379401,
"name": "CVE-2022-20607",
"full_name": "sumeetIT\/CVE-2022-20607",
"owner": {
"login": "sumeetIT",
"id": 54736912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54736912?v=4",
"html_url": "https:\/\/github.com\/sumeetIT"
},
"html_url": "https:\/\/github.com\/sumeetIT\/CVE-2022-20607",
"description": "In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N\/A CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-02-07T01:28:29Z",
"updated_at": "2023-02-20T12:01:39Z",
"pushed_at": "2022-12-27T12:10:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "win32k LPE ",
"fork": false,
"created_at": "2022-01-27T03:44:10Z",
"updated_at": "2023-11-27T02:25:02Z",
"updated_at": "2023-11-30T08:42:11Z",
"pushed_at": "2022-01-27T04:18:18Z",
"stargazers_count": 455,
"watchers_count": 455,
"stargazers_count": 456,
"watchers_count": 456,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 141,
"watchers": 455,
"watchers": 456,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,12 +13,12 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2023-11-24T20:22:18Z",
"updated_at": "2023-11-30T06:59:47Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 732,
"watchers_count": 732,
"stargazers_count": 733,
"watchers_count": 733,
"has_discussions": false,
"forks_count": 156,
"forks_count": 157,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 156,
"watchers": 732,
"forks": 157,
"watchers": 733,
"score": 0,
"subscribers_count": 16
}

View file

@ -2109,6 +2109,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 584868904,
"name": "Spring4Shell-CVE-2022-22965-POC",
"full_name": "ajith737\/Spring4Shell-CVE-2022-22965-POC",
"owner": {
"login": "ajith737",
"id": 72512571,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
"html_url": "https:\/\/github.com\/ajith737"
},
"html_url": "https:\/\/github.com\/ajith737\/Spring4Shell-CVE-2022-22965-POC",
"description": "User friendly Spring4Shell POC",
"fork": false,
"created_at": "2023-01-03T18:15:07Z",
"updated_at": "2023-01-03T18:15:14Z",
"pushed_at": "2023-01-03T18:53:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 608448692,
"name": "CVE-2022-22965",

View file

@ -163,10 +163,10 @@
"description": "spring data mongodb remote code execution | cve-2022-22980 poc",
"fork": false,
"created_at": "2022-07-13T14:07:26Z",
"updated_at": "2022-07-15T05:18:57Z",
"updated_at": "2023-11-30T08:56:54Z",
"pushed_at": "2022-07-13T14:13:51Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -460,6 +460,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 586260198,
"name": "cve-2022-23131",
"full_name": "wr0x00\/cve-2022-23131",
"owner": {
"login": "wr0x00",
"id": 86941613,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86941613?v=4",
"html_url": "https:\/\/github.com\/wr0x00"
},
"html_url": "https:\/\/github.com\/wr0x00\/cve-2022-23131",
"description": null,
"fork": false,
"created_at": "2023-01-07T14:09:40Z",
"updated_at": "2023-01-07T14:10:50Z",
"pushed_at": "2023-01-07T14:22:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 586722779,
"name": "CVE-2022-23131_exp",

View file

@ -43,10 +43,10 @@
"description": "Windows Network File System Crash PoC",
"fork": false,
"created_at": "2022-06-17T01:42:55Z",
"updated_at": "2023-11-24T20:26:08Z",
"updated_at": "2023-11-30T11:04:45Z",
"pushed_at": "2022-06-17T01:50:26Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 81,
"watchers": 82,
"score": 0,
"subscribers_count": 4
},

View file

@ -58,5 +58,35 @@
"watchers": 23,
"score": 0,
"subscribers_count": 3
},
{
"id": 609374925,
"name": "CVE-2022-28346",
"full_name": "vincentinttsh\/CVE-2022-28346",
"owner": {
"login": "vincentinttsh",
"id": 14941597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941597?v=4",
"html_url": "https:\/\/github.com\/vincentinttsh"
},
"html_url": "https:\/\/github.com\/vincentinttsh\/CVE-2022-28346",
"description": "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.",
"fork": false,
"created_at": "2023-03-04T01:43:58Z",
"updated_at": "2022-08-24T08:06:59Z",
"pushed_at": "2022-05-15T00:53:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -39,5 +39,35 @@
"watchers": 114,
"score": 0,
"subscribers_count": 2
},
{
"id": 584971290,
"name": "CVE-2022-28672",
"full_name": "fastmo\/CVE-2022-28672",
"owner": {
"login": "fastmo",
"id": 53575270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
"html_url": "https:\/\/github.com\/fastmo"
},
"html_url": "https:\/\/github.com\/fastmo\/CVE-2022-28672",
"description": " CVE-2022-28672 Vulnerabilidad Foxit PDF Reader - UaF - RCE - JIT Spraying",
"fork": false,
"created_at": "2023-01-04T01:39:04Z",
"updated_at": "2023-01-04T02:03:45Z",
"pushed_at": "2023-01-04T02:04:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2022/CVE-2022-29170.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 594668634,
"name": "CVE-2022-29170",
"full_name": "yijikeji\/CVE-2022-29170",
"owner": {
"login": "yijikeji",
"id": 42433368,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42433368?v=4",
"html_url": "https:\/\/github.com\/yijikeji"
},
"html_url": "https:\/\/github.com\/yijikeji\/CVE-2022-29170",
"description": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesnt call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-29T09:10:44Z",
"updated_at": "2023-02-20T13:57:30Z",
"pushed_at": "2022-12-29T07:40:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -59,6 +59,66 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 584983892,
"name": "CVE-2022-29455",
"full_name": "5l1v3r1\/CVE-2022-29455",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2022-29455",
"description": "DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions. ",
"fork": false,
"created_at": "2023-01-04T02:40:39Z",
"updated_at": "2023-01-04T02:40:35Z",
"pushed_at": "2022-11-27T18:46:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 585658055,
"name": "CVE-2022-29455",
"full_name": "yaudahbanh\/CVE-2022-29455",
"owner": {
"login": "yaudahbanh",
"id": 39010800,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39010800?v=4",
"html_url": "https:\/\/github.com\/yaudahbanh"
},
"html_url": "https:\/\/github.com\/yaudahbanh\/CVE-2022-29455",
"description": "Mass Scanner for CVE-2022-29455 on Elementor Plugins Wordpress",
"fork": false,
"created_at": "2023-01-05T18:29:47Z",
"updated_at": "2023-03-22T08:09:03Z",
"pushed_at": "2023-01-05T18:30:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 600651739,
"name": "CVE-2022-29455",

32
2022/CVE-2022-34683.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 588700609,
"name": "CVE-2022-34683",
"full_name": "gmh5225\/CVE-2022-34683",
"owner": {
"login": "gmh5225",
"id": 13917777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
"html_url": "https:\/\/github.com\/gmh5225"
},
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-34683",
"description": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-13T19:18:02Z",
"updated_at": "2023-02-20T15:21:34Z",
"pushed_at": "2023-01-06T23:41:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -53,13 +53,13 @@
"stargazers_count": 168,
"watchers_count": 168,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 168,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-11-29T05:43:24Z",
"updated_at": "2023-11-30T10:14:30Z",
"pushed_at": "2023-11-05T13:34:13Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": true,
"forks_count": 19,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 123,
"watchers": 124,
"score": 0,
"subscribers_count": 5
}

41
2022/CVE-2022-39073.json Normal file
View file

@ -0,0 +1,41 @@
[
{
"id": 586354436,
"name": "CVE-2022-39073",
"full_name": "v0lp3\/CVE-2022-39073",
"owner": {
"login": "v0lp3",
"id": 20267645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20267645?v=4",
"html_url": "https:\/\/github.com\/v0lp3"
},
"html_url": "https:\/\/github.com\/v0lp3\/CVE-2022-39073",
"description": "Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.",
"fork": false,
"created_at": "2023-01-07T20:46:20Z",
"updated_at": "2023-09-13T11:53:59Z",
"pushed_at": "2023-01-07T20:54:07Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"command-injection",
"cve-2022-39073",
"exploit",
"iot",
"mf286r",
"rce",
"router",
"zte"
],
"visibility": "public",
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}
]

32
2022/CVE-2022-40363.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 590734045,
"name": "CVE-2022-40363",
"full_name": "Olafdaf\/CVE-2022-40363",
"owner": {
"login": "Olafdaf",
"id": 123042506,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123042506?v=4",
"html_url": "https:\/\/github.com\/Olafdaf"
},
"html_url": "https:\/\/github.com\/Olafdaf\/CVE-2022-40363",
"description": "A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-19T04:19:42Z",
"updated_at": "2023-11-21T16:42:29Z",
"pushed_at": "2022-12-29T11:12:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-40769.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 594246349,
"name": "CVE-2022-40769",
"full_name": "PLSRcoin\/CVE-2022-40769",
"owner": {
"login": "PLSRcoin",
"id": 99826299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99826299?v=4",
"html_url": "https:\/\/github.com\/PLSRcoin"
},
"html_url": "https:\/\/github.com\/PLSRcoin\/CVE-2022-40769",
"description": "profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-28T00:12:31Z",
"updated_at": "2023-02-20T14:52:04Z",
"pushed_at": "2022-12-29T15:29:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-41076.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 595651423,
"name": "CVE-2022-41076",
"full_name": "5l1v3r1\/CVE-2022-41076",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2022-41076",
"description": "PowerShell Remote Code Execution Vulnerability. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-31T14:32:39Z",
"updated_at": "2023-02-20T12:06:24Z",
"pushed_at": "2022-12-27T16:03:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2022/CVE-2022-41114.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 584184679,
"name": "CVE-2022-41114",
"full_name": "gmh5225\/CVE-2022-41114",
"owner": {
"login": "gmh5225",
"id": 13917777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
"html_url": "https:\/\/github.com\/gmh5225"
},
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-41114",
"description": "Windows Bind Filter Driver Elevation of Privilege Vulnerability. CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2023-01-01T18:30:30Z",
"updated_at": "2023-02-20T12:35:54Z",
"pushed_at": "2022-12-28T09:34:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

32
2022/CVE-2022-41966.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 585766378,
"name": "Xstream_cve-2022-41966",
"full_name": "111ddea\/Xstream_cve-2022-41966",
"owner": {
"login": "111ddea",
"id": 41444127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41444127?v=4",
"html_url": "https:\/\/github.com\/111ddea"
},
"html_url": "https:\/\/github.com\/111ddea\/Xstream_cve-2022-41966",
"description": null,
"fork": false,
"created_at": "2023-01-06T02:37:07Z",
"updated_at": "2023-01-19T05:36:46Z",
"pushed_at": "2023-01-06T02:42:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1333,7 +1333,7 @@
"description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ",
"fork": false,
"created_at": "2023-06-27T08:29:24Z",
"updated_at": "2023-11-27T17:27:54Z",
"updated_at": "2023-11-30T10:08:31Z",
"pushed_at": "2023-06-27T09:01:14Z",
"stargazers_count": 5,
"watchers_count": 5,

View file

@ -1,4 +1,64 @@
[
{
"id": 585639540,
"name": "CVE-2022-44877",
"full_name": "numanturle\/CVE-2022-44877",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-44877",
"description": null,
"fork": false,
"created_at": "2023-01-05T17:29:10Z",
"updated_at": "2023-11-23T04:11:02Z",
"pushed_at": "2023-01-05T17:40:18Z",
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 105,
"score": 0,
"subscribers_count": 4
},
{
"id": 585996269,
"name": "CVE-2022-44877-RCE",
"full_name": "komomon\/CVE-2022-44877-RCE",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2022-44877-RCE",
"description": "CVE-2022-44877 Centos Web Panel 7 Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2023-01-06T16:53:51Z",
"updated_at": "2023-01-11T15:53:59Z",
"pushed_at": "2023-01-06T17:00:09Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 596515870,
"name": "CVE-2022-44877-CWP7",

32
2022/CVE-2022-45728.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 585251034,
"name": "CVE-2022-45728",
"full_name": "sudoninja-noob\/CVE-2022-45728",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45728",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:41:57Z",
"updated_at": "2023-01-04T17:41:57Z",
"pushed_at": "2023-01-04T17:43:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

32
2022/CVE-2022-45729.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 585253557,
"name": "CVE-2022-45729",
"full_name": "sudoninja-noob\/CVE-2022-45729",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45729",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:50:00Z",
"updated_at": "2023-01-04T17:50:00Z",
"pushed_at": "2023-01-04T17:50:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -89,6 +89,44 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 584490516,
"name": "CVE-2022-46169",
"full_name": "Inplex-sys\/CVE-2022-46169",
"owner": {
"login": "Inplex-sys",
"id": 69421356,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
"html_url": "https:\/\/github.com\/Inplex-sys"
},
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
"description": "Cacti Unauthenticated Command Injection",
"fork": false,
"created_at": "2023-01-02T18:03:26Z",
"updated_at": "2023-03-11T00:41:32Z",
"pushed_at": "2023-01-02T18:05:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cacti",
"cve",
"hgrab-framework",
"poc",
"rce",
"scanner",
"vulnerability"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 585629170,
"name": "CVE-2022-46169",

32
2022/CVE-2022-46622.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 585254254,
"name": "CVE-2022-46622",
"full_name": "sudoninja-noob\/CVE-2022-46622",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46622",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:52:13Z",
"updated_at": "2023-01-04T17:52:13Z",
"pushed_at": "2023-01-04T17:52:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

32
2022/CVE-2022-46623.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 585254938,
"name": "CVE-2022-46623",
"full_name": "sudoninja-noob\/CVE-2022-46623",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46623",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:54:29Z",
"updated_at": "2023-01-04T17:54:29Z",
"pushed_at": "2023-01-04T17:54:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2023-11-26T05:08:06Z",
"updated_at": "2023-11-30T07:13:54Z",
"pushed_at": "2023-10-10T16:53:48Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 111,
"watchers": 112,
"score": 0,
"subscribers_count": 8
},

32
2022/CVE-2022-47102.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 585255498,
"name": "CVE-2022-47102",
"full_name": "sudoninja-noob\/CVE-2022-47102",
"owner": {
"login": "sudoninja-noob",
"id": 18701598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
"html_url": "https:\/\/github.com\/sudoninja-noob"
},
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-47102",
"description": null,
"fork": false,
"created_at": "2023-01-04T17:56:09Z",
"updated_at": "2023-01-04T17:56:09Z",
"pushed_at": "2023-01-04T17:56:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

32
2022/CVE-2022-48197.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 584354205,
"name": "CVE-2022-48197",
"full_name": "ryan412\/CVE-2022-48197",
"owner": {
"login": "ryan412",
"id": 54446262,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54446262?v=4",
"html_url": "https:\/\/github.com\/ryan412"
},
"html_url": "https:\/\/github.com\/ryan412\/CVE-2022-48197",
"description": null,
"fork": false,
"created_at": "2023-01-02T10:27:04Z",
"updated_at": "2023-01-02T10:27:04Z",
"pushed_at": "2023-01-02T10:31:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T00:31:50Z",
"updated_at": "2023-11-24T09:13:54Z",
"updated_at": "2023-11-30T06:41:21Z",
"pushed_at": "2023-08-21T00:33:08Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 2
},

View file

@ -173,19 +173,19 @@
"description": null,
"fork": false,
"created_at": "2023-03-16T19:43:39Z",
"updated_at": "2023-11-03T07:33:32Z",
"updated_at": "2023-11-30T08:48:19Z",
"pushed_at": "2023-03-17T07:47:40Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 341,
"watchers_count": 341,
"has_discussions": false,
"forks_count": 63,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 340,
"forks": 64,
"watchers": 341,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
"fork": false,
"created_at": "2023-01-25T03:21:42Z",
"updated_at": "2023-10-31T09:28:13Z",
"updated_at": "2023-11-30T06:39:10Z",
"pushed_at": "2023-02-10T08:03:59Z",
"stargazers_count": 254,
"watchers_count": 254,
"stargazers_count": 255,
"watchers_count": 255,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 254,
"watchers": 255,
"score": 0,
"subscribers_count": 8
},

View file

@ -73,10 +73,10 @@
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
"fork": false,
"created_at": "2023-02-22T19:44:08Z",
"updated_at": "2023-11-28T09:25:36Z",
"updated_at": "2023-11-30T09:49:01Z",
"pushed_at": "2023-03-07T10:43:36Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "rce",
"fork": false,
"created_at": "2023-06-14T09:43:31Z",
"updated_at": "2023-11-27T06:50:02Z",
"updated_at": "2023-11-30T07:15:57Z",
"pushed_at": "2023-06-15T01:35:51Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 103,
"watchers": 104,
"score": 0,
"subscribers_count": 5
},

View file

@ -106,7 +106,7 @@
"description": "KeePass 2.X dumper (CVE-2023-32784)",
"fork": false,
"created_at": "2023-05-22T00:11:42Z",
"updated_at": "2023-11-04T18:42:43Z",
"updated_at": "2023-11-30T07:29:46Z",
"pushed_at": "2023-11-04T17:14:26Z",
"stargazers_count": 6,
"watchers_count": 6,

View file

@ -1,32 +0,0 @@
[
{
"id": 716224102,
"name": "CVE-2023-34048-findings",
"full_name": "K1i7n\/CVE-2023-34048-findings",
"owner": {
"login": "K1i7n",
"id": 150281764,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150281764?v=4",
"html_url": "https:\/\/github.com\/K1i7n"
},
"html_url": "https:\/\/github.com\/K1i7n\/CVE-2023-34048-findings",
"description": null,
"fork": false,
"created_at": "2023-11-08T17:31:55Z",
"updated_at": "2023-11-09T02:31:58Z",
"pushed_at": "2023-11-08T18:07:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2023-36427",
"fork": false,
"created_at": "2023-10-09T16:55:18Z",
"updated_at": "2023-11-27T09:36:51Z",
"updated_at": "2023-11-30T10:33:27Z",
"pushed_at": "2023-11-22T15:31:34Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
"fork": false,
"created_at": "2023-08-12T18:33:57Z",
"updated_at": "2023-11-30T03:25:35Z",
"updated_at": "2023-11-30T09:47:23Z",
"pushed_at": "2023-09-07T08:37:04Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 73,
"watchers": 75,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2023-11-24T09:13:58Z",
"updated_at": "2023-11-30T12:00:07Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "SolarView vuln",
"fork": false,
"created_at": "2023-08-15T15:44:58Z",
"updated_at": "2023-09-01T18:10:52Z",
"updated_at": "2023-11-30T09:08:49Z",
"pushed_at": "2023-09-09T01:48:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -349,10 +349,10 @@
"description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).",
"fork": false,
"created_at": "2023-11-24T18:26:36Z",
"updated_at": "2023-11-30T06:37:25Z",
"updated_at": "2023-11-30T09:09:17Z",
"pushed_at": "2023-11-24T20:19:44Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -361,7 +361,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 42,
"watchers": 44,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "exploit for f5-big-ip RCE cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2023-11-29T06:16:34Z",
"updated_at": "2023-11-30T12:34:15Z",
"pushed_at": "2023-11-10T02:12:38Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "PoC for the CVE-2023-49103",
"fork": false,
"created_at": "2023-11-22T17:00:23Z",
"updated_at": "2023-11-29T15:03:21Z",
"updated_at": "2023-11-30T08:22:35Z",
"pushed_at": "2023-11-22T17:04:34Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-11-29T18:46:54Z",
"updated_at": "2023-11-29T19:33:52Z",
"pushed_at": "2023-11-29T19:36:36Z",
"pushed_at": "2023-11-30T11:41:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2023-11-28T19:42:15Z",
"updated_at": "2023-11-30T06:48:23Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 356,
"watchers_count": 356,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 355,
"watchers": 356,
"score": 0,
"subscribers_count": 5
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2023-10-26T06:56:48Z",
"updated_at": "2023-10-31T21:09:53Z",
"pushed_at": "2023-10-26T06:58:36Z",
"pushed_at": "2023-11-30T07:36:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,

156
README.md
View file

@ -3263,13 +3263,6 @@
- [Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040](https://github.com/Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040)
- [pyn3rd/CVE-2023-34040](https://github.com/pyn3rd/CVE-2023-34040)
### CVE-2023-34048 (2023-10-25)
<code>vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
</code>
- [K1i7n/CVE-2023-34048-findings](https://github.com/K1i7n/CVE-2023-34048-findings)
### CVE-2023-34050 (2023-10-19)
<code>\n\n\n\n\n\n\n\n\n\nIn spring AMQP versions 1.0.0 to\n2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class\nnames were added to Spring AMQP, allowing users to lock down deserialization of\ndata in messages from untrusted sources; however by default, when no allowed\nlist was provided, all classes could be deserialized.\n\n\n\nSpecifically, an application is\nvulnerable if\n\n\n\n\n * the\n SimpleMessageConverter or SerializerMessageConverter is used\n\n * the user\n does not configure allowed list patterns\n\n * untrusted\n message originators gain permissions to write messages to the RabbitMQ\n broker to send malicious content\n\n\n\n\n\n\n\n\n\n
@ -5472,7 +5465,11 @@
- [nitipoom-jar/CVE-2023-48200](https://github.com/nitipoom-jar/CVE-2023-48200)
### CVE-2023-49052
### CVE-2023-49052 (-)
<code>File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component.
</code>
- [Cyber-Wo0dy/CVE-2023-49052](https://github.com/Cyber-Wo0dy/CVE-2023-49052)
### CVE-2023-49103 (2023-11-21)
@ -5796,6 +5793,7 @@
- [qwert419/linux-](https://github.com/qwert419/linux-)
- [DataFox/CVE-2022-0847](https://github.com/DataFox/CVE-2022-0847)
- [pmihsan/Dirty-Pipe-CVE-2022-0847](https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847)
- [ajith737/Dirty-Pipe-CVE-2022-0847-POCs](https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs)
- [mutur4/CVE-2022-0847](https://github.com/mutur4/CVE-2022-0847)
- [orsuprasad/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits)
- [4bhishek0/CVE-2022-0847-Poc](https://github.com/4bhishek0/CVE-2022-0847-Poc)
@ -5898,6 +5896,7 @@
- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040)
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
- [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040)
- [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040)
### CVE-2022-1051 (2022-05-16)
@ -5983,6 +5982,7 @@
- [AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit](https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit)
- [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329)
- [Grazee/CVE-2022-1329-WordPress-Elementor-RCE](https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE)
- [dexit/CVE-2022-1329](https://github.com/dexit/CVE-2022-1329)
### CVE-2022-1386 (2022-05-16)
@ -6639,6 +6639,21 @@
- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456)
### CVE-2022-20470 (2022-12-13)
<code>In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234013191
</code>
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470)
### CVE-2022-20473 (2022-12-13)
<code>In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
</code>
- [Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473)
- [Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473)
### CVE-2022-20489 (2023-01-24)
<code>In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703460
@ -6675,6 +6690,13 @@
- [Supersonic/CVE-2022-20494](https://github.com/Supersonic/CVE-2022-20494)
### CVE-2022-20607 (2022-12-16)
<code>In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A
</code>
- [sumeetIT/CVE-2022-20607](https://github.com/sumeetIT/CVE-2022-20607)
### CVE-2022-20699 (2022-02-10)
<code>Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
@ -7295,6 +7317,7 @@
- [clemoregan/SSE4-CVE-2022-22965](https://github.com/clemoregan/SSE4-CVE-2022-22965)
- [devengpk/CVE-2022-22965](https://github.com/devengpk/CVE-2022-22965)
- [zangcc/CVE-2022-22965-rexbb](https://github.com/zangcc/CVE-2022-22965-rexbb)
- [ajith737/Spring4Shell-CVE-2022-22965-POC](https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC)
- [c33dd/CVE-2022-22965](https://github.com/c33dd/CVE-2022-22965)
- [gokul-ramesh/Spring4Shell-PoC-exploit](https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit)
- [bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-](https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-)
@ -7398,6 +7421,7 @@
- [Kazaf6s/CVE-2022-23131](https://github.com/Kazaf6s/CVE-2022-23131)
- [SCAMagic/CVE-2022-23131poc-exp-zabbix-](https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix-)
- [Vulnmachines/Zabbix-CVE-2022-23131](https://github.com/Vulnmachines/Zabbix-CVE-2022-23131)
- [wr0x00/cve-2022-23131](https://github.com/wr0x00/cve-2022-23131)
- [Arrnitage/CVE-2022-23131_exp](https://github.com/Arrnitage/CVE-2022-23131_exp)
- [clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131](https://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131)
- [r10lab/CVE-2022-23131](https://github.com/r10lab/CVE-2022-23131)
@ -8600,6 +8624,7 @@
- [YouGina/CVE-2022-28346](https://github.com/YouGina/CVE-2022-28346)
- [DeEpinGh0st/CVE-2022-28346](https://github.com/DeEpinGh0st/CVE-2022-28346)
- [vincentinttsh/CVE-2022-28346](https://github.com/vincentinttsh/CVE-2022-28346)
### CVE-2022-28368 (2022-04-02)
@ -8665,6 +8690,7 @@
</code>
- [hacksysteam/CVE-2022-28672](https://github.com/hacksysteam/CVE-2022-28672)
- [fastmo/CVE-2022-28672](https://github.com/fastmo/CVE-2022-28672)
### CVE-2022-28943
- [zhefox/CVE-2022-28943](https://github.com/zhefox/CVE-2022-28943)
@ -8750,6 +8776,13 @@
- [EgeBalci/CVE-2022-29154](https://github.com/EgeBalci/CVE-2022-29154)
### CVE-2022-29170 (2022-05-20)
<code>Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesnt call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.
</code>
- [yijikeji/CVE-2022-29170](https://github.com/yijikeji/CVE-2022-29170)
### CVE-2022-29221 (2022-05-24)
<code>Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
@ -8801,6 +8834,8 @@
- [GULL2100/Wordpress_xss-CVE-2022-29455](https://github.com/GULL2100/Wordpress_xss-CVE-2022-29455)
- [akhilkoradiya/CVE-2022-29455](https://github.com/akhilkoradiya/CVE-2022-29455)
- [5l1v3r1/CVE-2022-29455](https://github.com/5l1v3r1/CVE-2022-29455)
- [yaudahbanh/CVE-2022-29455](https://github.com/yaudahbanh/CVE-2022-29455)
- [0xkucing/CVE-2022-29455](https://github.com/0xkucing/CVE-2022-29455)
- [tucommenceapousser/CVE-2022-29455](https://github.com/tucommenceapousser/CVE-2022-29455)
- [tucommenceapousser/CVE-2022-29455-mass](https://github.com/tucommenceapousser/CVE-2022-29455-mass)
@ -9765,6 +9800,13 @@
- [Halcy0nic/CVE-2022-34556](https://github.com/Halcy0nic/CVE-2022-34556)
### CVE-2022-34683 (2022-12-30)
<code>NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service.
</code>
- [gmh5225/CVE-2022-34683](https://github.com/gmh5225/CVE-2022-34683)
### CVE-2022-34715 (2022-08-09)
<code>Windows Network File System Remote Code Execution Vulnerability
@ -10306,6 +10348,13 @@
- [v0lp3/CVE-2022-39066](https://github.com/v0lp3/CVE-2022-39066)
### CVE-2022-39073 (2023-01-06)
<code>There is a command injection vulnerability in ZTE MF286R, Due to insufficient validation of the input parameters, an attacker could use the vulnerability to execute arbitrary commands.
</code>
- [v0lp3/CVE-2022-39073](https://github.com/v0lp3/CVE-2022-39073)
### CVE-2022-39196 (2022-09-04)
<code>Blackboard Learn 1.10.1 allows remote authenticated users to read unintended files by entering student credentials and then directly visiting a certain webapps/bbcms/execute/ URL.
@ -10471,6 +10520,13 @@
- [h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated](https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated)
### CVE-2022-40363 (2022-09-29)
<code>A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.
</code>
- [Olafdaf/CVE-2022-40363](https://github.com/Olafdaf/CVE-2022-40363)
### CVE-2022-40470 (2022-11-21)
<code>Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.
@ -10538,6 +10594,13 @@
- [williamkhepri/CVE-2022-40687-metasploit-scanner](https://github.com/williamkhepri/CVE-2022-40687-metasploit-scanner)
### CVE-2022-40769 (2022-09-18)
<code>profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
</code>
- [PLSRcoin/CVE-2022-40769](https://github.com/PLSRcoin/CVE-2022-40769)
### CVE-2022-40799 (2022-11-28)
<code>Data Integrity Failure in 'Backup Config' in D-Link DNR-322L &lt;= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
@ -10590,6 +10653,13 @@
- [NathanScottGithub/CVE-2022-41049-POC](https://github.com/NathanScottGithub/CVE-2022-41049-POC)
### CVE-2022-41076 (2022-12-13)
<code>PowerShell Remote Code Execution Vulnerability
</code>
- [5l1v3r1/CVE-2022-41076](https://github.com/5l1v3r1/CVE-2022-41076)
### CVE-2022-41080 (2022-11-09)
<code>Microsoft Exchange Server Elevation of Privilege Vulnerability
@ -10620,6 +10690,13 @@
- [g-gill24/WinRE-Patch](https://github.com/g-gill24/WinRE-Patch)
- [dsn1321/KB5025175-CVE-2022-41099](https://github.com/dsn1321/KB5025175-CVE-2022-41099)
### CVE-2022-41114 (2022-11-09)
<code>Windows Bind Filter Driver Elevation of Privilege Vulnerability
</code>
- [gmh5225/CVE-2022-41114](https://github.com/gmh5225/CVE-2022-41114)
### CVE-2022-41218 (2022-09-21)
<code>In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
@ -10772,6 +10849,13 @@
- [grails/GSSC-CVE-2022-41923](https://github.com/grails/GSSC-CVE-2022-41923)
### CVE-2022-41966 (2022-12-27)
<code>XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.
</code>
- [111ddea/Xstream_cve-2022-41966](https://github.com/111ddea/Xstream_cve-2022-41966)
### CVE-2022-42045 (2023-07-13)
<code>Certain Zemana products are vulnerable to Arbitrary code injection. This affects Watchdog Anti-Malware 4.1.422 and Zemana AntiMalware 3.2.28.
@ -11173,6 +11257,8 @@
<code>login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
</code>
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
- [ColdFusionX/CVE-2022-44877-CWP7](https://github.com/ColdFusionX/CVE-2022-44877-CWP7)
- [Chocapikk/CVE-2022-44877](https://github.com/Chocapikk/CVE-2022-44877)
- [hotpotcookie/CVE-2022-44877-white-box](https://github.com/hotpotcookie/CVE-2022-44877-white-box)
@ -11313,6 +11399,20 @@
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
### CVE-2022-45728 (2023-01-12)
<code>Doctor Appointment Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability.
</code>
- [sudoninja-noob/CVE-2022-45728](https://github.com/sudoninja-noob/CVE-2022-45728)
### CVE-2022-45729 (2023-01-12)
<code>A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Employee ID parameter.
</code>
- [sudoninja-noob/CVE-2022-45729](https://github.com/sudoninja-noob/CVE-2022-45729)
### CVE-2022-45770 (2023-01-26)
<code>Improper input validation in adgnetworkwfpdrv.sys in Adguard For Windows x86 through 7.11 allows local privilege escalation.
@ -11390,6 +11490,7 @@
- [imjdl/CVE-2022-46169](https://github.com/imjdl/CVE-2022-46169)
- [0xf4n9x/CVE-2022-46169](https://github.com/0xf4n9x/CVE-2022-46169)
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
- [botfather0x0/CVE-2022-46169](https://github.com/botfather0x0/CVE-2022-46169)
- [Habib0x0/CVE-2022-46169](https://github.com/Habib0x0/CVE-2022-46169)
@ -11470,6 +11571,20 @@
- [galoget/ResponsiveFileManager-CVE-2022-46604](https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604)
### CVE-2022-46622 (2023-01-12)
<code>A cross-site scripting (XSS) vulnerability in Judging Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
</code>
- [sudoninja-noob/CVE-2022-46622](https://github.com/sudoninja-noob/CVE-2022-46622)
### CVE-2022-46623 (2023-01-12)
<code>Judging Management System v1.0.0 was discovered to contain a SQL injection vulnerability via the username parameter.
</code>
- [sudoninja-noob/CVE-2022-46623](https://github.com/sudoninja-noob/CVE-2022-46623)
### CVE-2022-46638
- [naonymous101/CVE-2022-46638](https://github.com/naonymous101/CVE-2022-46638)
@ -11506,6 +11621,13 @@
- [JacobEbben/CVE-2022-46836_remote_code_execution](https://github.com/JacobEbben/CVE-2022-46836_remote_code_execution)
### CVE-2022-47102 (2023-01-12)
<code>A cross-site scripting (XSS) vulnerability in Student Study Center Management System V 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
</code>
- [sudoninja-noob/CVE-2022-47102](https://github.com/sudoninja-noob/CVE-2022-47102)
### CVE-2022-47373 (2023-02-14)
<code>Reflected Cross Site Scripting in Search Functionality of Module Library in Pandora FMS Console v766 and lower. This vulnerability arises on the forget password functionality in which parameter username does not proper input validation/sanitization thus results in executing malicious JavaScript payload.
@ -11589,6 +11711,13 @@
- [otsmr/internet-of-vulnerable-things](https://github.com/otsmr/internet-of-vulnerable-things)
### CVE-2022-48197 (2023-01-02)
<code>** UNSUPPORTED WHEN ASSIGNED ** Reflected cross-site scripting (XSS) exists in the TreeView of YUI2 through 2800: up.php sam.php renderhidden.php removechildren.php removeall.php readd.php overflow.php newnode2.php newnode.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
</code>
- [ryan412/CVE-2022-48197](https://github.com/ryan412/CVE-2022-48197)
### CVE-2022-48311 (2023-02-06)
<code>**UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
@ -30287,6 +30416,9 @@
</code>
- [WyAtu/CVE-2018-20250](https://github.com/WyAtu/CVE-2018-20250)
- [QAX-A-Team/CVE-2018-20250](https://github.com/QAX-A-Team/CVE-2018-20250)
- [nmweizi/CVE-2018-20250-poc-winrar](https://github.com/nmweizi/CVE-2018-20250-poc-winrar)
- [blunden/UNACEV2.DLL-CVE-2018-20250](https://github.com/blunden/UNACEV2.DLL-CVE-2018-20250)
- [easis/CVE-2018-20250-WinRAR-ACE](https://github.com/easis/CVE-2018-20250-WinRAR-ACE)
- [STP5940/CVE-2018-20250](https://github.com/STP5940/CVE-2018-20250)
- [technicaldada/hack-winrar](https://github.com/technicaldada/hack-winrar)
@ -36775,6 +36907,7 @@
<code>Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka &quot;RTF Stack Buffer Overflow Vulnerability.&quot;
</code>
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
- [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction)
### CVE-2010-3490 (2010-09-28)
@ -36791,6 +36924,13 @@
- [LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2](https://github.com/LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2)
### CVE-2010-3847 (2011-01-07)
<code>elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
</code>
- [magisterquis/cve-2010-3847](https://github.com/magisterquis/cve-2010-3847)
### CVE-2010-3904 (2010-12-06)
<code>The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.