mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/11/30 12:58:11
This commit is contained in:
parent
af82a1614a
commit
6f5f65112f
74 changed files with 1412 additions and 201 deletions
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 69224981,
|
||||
"name": "cve-2010-3333",
|
||||
"full_name": "whiteHat001\/cve-2010-3333",
|
||||
"owner": {
|
||||
"login": "whiteHat001",
|
||||
"id": 18191034,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18191034?v=4",
|
||||
"html_url": "https:\/\/github.com\/whiteHat001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/whiteHat001\/cve-2010-3333",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2016-09-26T07:35:41Z",
|
||||
"updated_at": "2016-09-26T07:35:41Z",
|
||||
"pushed_at": "2016-09-26T08:19:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 524884923,
|
||||
"name": "CVE-2010-3333-reproduction",
|
||||
|
|
32
2010/CVE-2010-3847.json
Normal file
32
2010/CVE-2010-3847.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 77808380,
|
||||
"name": "cve-2010-3847",
|
||||
"full_name": "magisterquis\/cve-2010-3847",
|
||||
"owner": {
|
||||
"login": "magisterquis",
|
||||
"id": 499530,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/499530?v=4",
|
||||
"html_url": "https:\/\/github.com\/magisterquis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/magisterquis\/cve-2010-3847",
|
||||
"description": "Script to take advantage of CVE-2010-3847",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-02T03:20:36Z",
|
||||
"updated_at": "2017-01-02T20:12:45Z",
|
||||
"pushed_at": "2017-01-02T20:12:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -444,10 +444,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2023-11-20T09:28:12Z",
|
||||
"updated_at": "2023-11-30T08:32:33Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 407,
|
||||
"watchers_count": 407,
|
||||
"stargazers_count": 408,
|
||||
"watchers_count": 408,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -456,7 +456,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 407,
|
||||
"watchers": 408,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"has_discussions": false,
|
||||
"forks_count": 264,
|
||||
"forks_count": 263,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 264,
|
||||
"forks": 263,
|
||||
"watchers": 536,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-25T13:20:56Z",
|
||||
"updated_at": "2023-11-24T19:31:11Z",
|
||||
"updated_at": "2023-11-30T06:35:38Z",
|
||||
"pushed_at": "2017-07-26T13:07:51Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 179,
|
||||
"watchers": 178,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -29,6 +29,96 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
{
|
||||
"id": 172009558,
|
||||
"name": "CVE-2018-20250",
|
||||
"full_name": "QAX-A-Team\/CVE-2018-20250",
|
||||
"owner": {
|
||||
"login": "QAX-A-Team",
|
||||
"id": 35417332,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4",
|
||||
"html_url": "https:\/\/github.com\/QAX-A-Team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/QAX-A-Team\/CVE-2018-20250",
|
||||
"description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T06:47:01Z",
|
||||
"updated_at": "2021-05-29T18:38:32Z",
|
||||
"pushed_at": "2019-02-22T07:47:26Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 172069488,
|
||||
"name": "CVE-2018-20250-poc-winrar",
|
||||
"full_name": "nmweizi\/CVE-2018-20250-poc-winrar",
|
||||
"owner": {
|
||||
"login": "nmweizi",
|
||||
"id": 1232444,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1232444?v=4",
|
||||
"html_url": "https:\/\/github.com\/nmweizi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nmweizi\/CVE-2018-20250-poc-winrar",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T13:18:14Z",
|
||||
"updated_at": "2019-02-22T13:20:31Z",
|
||||
"pushed_at": "2019-02-22T13:20:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 172078598,
|
||||
"name": "UNACEV2.DLL-CVE-2018-20250",
|
||||
"full_name": "blunden\/UNACEV2.DLL-CVE-2018-20250",
|
||||
"owner": {
|
||||
"login": "blunden",
|
||||
"id": 249915,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/249915?v=4",
|
||||
"html_url": "https:\/\/github.com\/blunden"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/blunden\/UNACEV2.DLL-CVE-2018-20250",
|
||||
"description": "A version of the binary patched to address CVE-2018-20250",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T14:19:20Z",
|
||||
"updated_at": "2019-02-22T14:29:30Z",
|
||||
"pushed_at": "2019-02-22T14:29:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 172156568,
|
||||
"name": "CVE-2018-20250-WinRAR-ACE",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well. ",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-23T14:53:19Z",
|
||||
"updated_at": "2023-10-18T16:37:43Z",
|
||||
"updated_at": "2023-11-30T06:47:03Z",
|
||||
"pushed_at": "2022-08-28T08:21:26Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-11-28T11:55:46Z",
|
||||
"updated_at": "2023-11-30T12:00:33Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3933,
|
||||
"watchers_count": 3933,
|
||||
"stargazers_count": 3934,
|
||||
"watchers_count": 3934,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1096,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1096,
|
||||
"watchers": 3933,
|
||||
"watchers": 3934,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2023-11-20T09:28:12Z",
|
||||
"updated_at": "2023-11-30T08:32:33Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 407,
|
||||
"watchers_count": 407,
|
||||
"stargazers_count": 408,
|
||||
"watchers_count": 408,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 407,
|
||||
"watchers": 408,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -1096,10 +1096,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2023-11-29T15:28:17Z",
|
||||
"updated_at": "2023-11-30T08:11:16Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1276,
|
||||
"watchers_count": 1276,
|
||||
"stargazers_count": 1277,
|
||||
"watchers_count": 1277,
|
||||
"has_discussions": false,
|
||||
"forks_count": 368,
|
||||
"allow_forking": true,
|
||||
|
@ -1114,7 +1114,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 368,
|
||||
"watchers": 1276,
|
||||
"watchers": 1277,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-11-28T11:55:46Z",
|
||||
"updated_at": "2023-11-30T12:00:33Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3933,
|
||||
"watchers_count": 3933,
|
||||
"stargazers_count": 3934,
|
||||
"watchers_count": 3934,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1096,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1096,
|
||||
"watchers": 3933,
|
||||
"watchers": 3934,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "https:\/\/medium.com\/@mansoorr\/exploiting-cve-2020-25213-wp-file-manager-wordpress-plugin-6-9-3f79241f0cd8",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-10T17:50:01Z",
|
||||
"updated_at": "2023-11-03T10:57:50Z",
|
||||
"updated_at": "2023-11-30T10:29:35Z",
|
||||
"pushed_at": "2020-10-12T09:57:28Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 53,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exim use after free exploit and detection",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-15T15:09:05Z",
|
||||
"updated_at": "2023-09-28T11:27:41Z",
|
||||
"updated_at": "2023-11-30T06:49:01Z",
|
||||
"pushed_at": "2021-05-15T15:10:23Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2023-11-20T12:43:20Z",
|
||||
"updated_at": "2023-11-30T08:40:09Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 409,
|
||||
"watchers_count": 409,
|
||||
"stargazers_count": 410,
|
||||
"watchers_count": 410,
|
||||
"has_discussions": false,
|
||||
"forks_count": 128,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 128,
|
||||
"watchers": 409,
|
||||
"watchers": 410,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -60,10 +60,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2023-11-24T20:11:55Z",
|
||||
"updated_at": "2023-11-30T09:40:17Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -72,7 +72,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T09:50:26Z",
|
||||
"updated_at": "2023-11-19T18:59:38Z",
|
||||
"updated_at": "2023-11-30T09:57:00Z",
|
||||
"pushed_at": "2022-02-10T11:38:46Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T04:23:44Z",
|
||||
"updated_at": "2023-11-24T20:24:30Z",
|
||||
"updated_at": "2023-11-30T09:16:53Z",
|
||||
"pushed_at": "2022-04-15T08:52:11Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 36,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"has_discussions": false,
|
||||
"forks_count": 130,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"forks": 129,
|
||||
"watchers": 381,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -79,10 +79,10 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2023-11-29T09:30:10Z",
|
||||
"updated_at": "2023-11-30T11:19:49Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1863,
|
||||
"watchers_count": 1863,
|
||||
"stargazers_count": 1864,
|
||||
"watchers_count": 1864,
|
||||
"has_discussions": false,
|
||||
"forks_count": 517,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 517,
|
||||
"watchers": 1863,
|
||||
"watchers": 1864,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2023-11-29T21:45:24Z",
|
||||
"pushed_at": "2023-11-30T07:57:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2023-11-29T15:13:21Z",
|
||||
"updated_at": "2023-11-30T11:48:33Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1057,
|
||||
"watchers_count": 1057,
|
||||
"stargazers_count": 1058,
|
||||
"watchers_count": 1058,
|
||||
"has_discussions": false,
|
||||
"forks_count": 224,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 224,
|
||||
"watchers": 1057,
|
||||
"watchers": 1058,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
@ -2353,6 +2353,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 585137919,
|
||||
"name": "Dirty-Pipe-CVE-2022-0847-POCs",
|
||||
"full_name": "ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
|
||||
"owner": {
|
||||
"login": "ajith737",
|
||||
"id": 72512571,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
|
||||
"html_url": "https:\/\/github.com\/ajith737"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ajith737\/Dirty-Pipe-CVE-2022-0847-POCs",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T12:17:12Z",
|
||||
"updated_at": "2023-01-04T12:17:19Z",
|
||||
"pushed_at": "2023-01-04T12:51:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 592661297,
|
||||
"name": "CVE-2022-0847",
|
||||
|
@ -2517,10 +2547,10 @@
|
|||
"description": "POC Exploit to add user to Sudo for CVE-2022-0847 Dirty Pipe Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-20T23:48:24Z",
|
||||
"updated_at": "2023-06-20T23:48:57Z",
|
||||
"updated_at": "2023-11-30T12:04:32Z",
|
||||
"pushed_at": "2023-06-20T23:48:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2529,7 +2559,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -128,6 +128,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 586568152,
|
||||
"name": "CVE-2022-1040",
|
||||
"full_name": "michealadams30\/CVE-2022-1040",
|
||||
"owner": {
|
||||
"login": "michealadams30",
|
||||
"id": 113975732,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113975732?v=4",
|
||||
"html_url": "https:\/\/github.com\/michealadams30"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/michealadams30\/CVE-2022-1040",
|
||||
"description": "Sophos EXploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-08T15:46:00Z",
|
||||
"updated_at": "2023-01-08T15:46:00Z",
|
||||
"pushed_at": "2023-01-08T15:48:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 696656893,
|
||||
"name": "CVE-2022-1040",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T14:45:15Z",
|
||||
"updated_at": "2023-04-19T22:39:36Z",
|
||||
"updated_at": "2023-11-30T08:58:17Z",
|
||||
"pushed_at": "2022-07-20T14:27:49Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -94,5 +94,35 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 594762176,
|
||||
"name": "CVE-2022-1329",
|
||||
"full_name": "dexit\/CVE-2022-1329",
|
||||
"owner": {
|
||||
"login": "dexit",
|
||||
"id": 6205151,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6205151?v=4",
|
||||
"html_url": "https:\/\/github.com\/dexit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dexit\/CVE-2022-1329",
|
||||
"description": "The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~\/core\/app\/modules\/onboarding\/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to o CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-29T15:13:34Z",
|
||||
"updated_at": "2023-02-20T12:39:20Z",
|
||||
"pushed_at": "2022-12-28T12:11:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-20470.json
Normal file
32
2022/CVE-2022-20470.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 584611982,
|
||||
"name": "frameworks_base_AOSP10_r33_CVE-2022-20470",
|
||||
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20470",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-03T03:54:59Z",
|
||||
"updated_at": "2023-03-27T01:47:22Z",
|
||||
"pushed_at": "2023-01-03T04:01:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
62
2022/CVE-2022-20473.json
Normal file
62
2022/CVE-2022-20473.json
Normal file
|
@ -0,0 +1,62 @@
|
|||
[
|
||||
{
|
||||
"id": 584289667,
|
||||
"name": "frameworks_minikin_AOSP10_r33_CVE-2022-20473",
|
||||
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33_CVE-2022-20473",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-02T05:55:37Z",
|
||||
"updated_at": "2023-01-02T05:55:37Z",
|
||||
"pushed_at": null,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 584624006,
|
||||
"name": "frameworks_minikin_AOSP10_r33-CVE-2022-20473",
|
||||
"full_name": "Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_minikin_AOSP10_r33-CVE-2022-20473",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-03T04:51:12Z",
|
||||
"updated_at": "2023-01-03T04:53:10Z",
|
||||
"pushed_at": "2023-01-03T04:53:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2022/CVE-2022-20607.json
Normal file
32
2022/CVE-2022-20607.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 598379401,
|
||||
"name": "CVE-2022-20607",
|
||||
"full_name": "sumeetIT\/CVE-2022-20607",
|
||||
"owner": {
|
||||
"login": "sumeetIT",
|
||||
"id": 54736912,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54736912?v=4",
|
||||
"html_url": "https:\/\/github.com\/sumeetIT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sumeetIT\/CVE-2022-20607",
|
||||
"description": "In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N\/A CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T01:28:29Z",
|
||||
"updated_at": "2023-02-20T12:01:39Z",
|
||||
"pushed_at": "2022-12-27T12:10:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2023-11-27T02:25:02Z",
|
||||
"updated_at": "2023-11-30T08:42:11Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 455,
|
||||
"watchers_count": 455,
|
||||
"stargazers_count": 456,
|
||||
"watchers_count": 456,
|
||||
"has_discussions": false,
|
||||
"forks_count": 141,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 141,
|
||||
"watchers": 455,
|
||||
"watchers": 456,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2023-11-24T20:22:18Z",
|
||||
"updated_at": "2023-11-30T06:59:47Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 732,
|
||||
"watchers_count": 732,
|
||||
"stargazers_count": 733,
|
||||
"watchers_count": 733,
|
||||
"has_discussions": false,
|
||||
"forks_count": 156,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -27,8 +27,8 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 156,
|
||||
"watchers": 732,
|
||||
"forks": 157,
|
||||
"watchers": 733,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
}
|
||||
|
|
|
@ -2109,6 +2109,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 584868904,
|
||||
"name": "Spring4Shell-CVE-2022-22965-POC",
|
||||
"full_name": "ajith737\/Spring4Shell-CVE-2022-22965-POC",
|
||||
"owner": {
|
||||
"login": "ajith737",
|
||||
"id": 72512571,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72512571?v=4",
|
||||
"html_url": "https:\/\/github.com\/ajith737"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ajith737\/Spring4Shell-CVE-2022-22965-POC",
|
||||
"description": "User friendly Spring4Shell POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-03T18:15:07Z",
|
||||
"updated_at": "2023-01-03T18:15:14Z",
|
||||
"pushed_at": "2023-01-03T18:53:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 608448692,
|
||||
"name": "CVE-2022-22965",
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": "spring data mongodb remote code execution | cve-2022-22980 poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-13T14:07:26Z",
|
||||
"updated_at": "2022-07-15T05:18:57Z",
|
||||
"updated_at": "2023-11-30T08:56:54Z",
|
||||
"pushed_at": "2022-07-13T14:13:51Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -460,6 +460,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 586260198,
|
||||
"name": "cve-2022-23131",
|
||||
"full_name": "wr0x00\/cve-2022-23131",
|
||||
"owner": {
|
||||
"login": "wr0x00",
|
||||
"id": 86941613,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86941613?v=4",
|
||||
"html_url": "https:\/\/github.com\/wr0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wr0x00\/cve-2022-23131",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-07T14:09:40Z",
|
||||
"updated_at": "2023-01-07T14:10:50Z",
|
||||
"pushed_at": "2023-01-07T14:22:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 586722779,
|
||||
"name": "CVE-2022-23131_exp",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Windows Network File System Crash PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T01:42:55Z",
|
||||
"updated_at": "2023-11-24T20:26:08Z",
|
||||
"updated_at": "2023-11-30T11:04:45Z",
|
||||
"pushed_at": "2022-06-17T01:50:26Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -58,5 +58,35 @@
|
|||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 609374925,
|
||||
"name": "CVE-2022-28346",
|
||||
"full_name": "vincentinttsh\/CVE-2022-28346",
|
||||
"owner": {
|
||||
"login": "vincentinttsh",
|
||||
"id": 14941597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14941597?v=4",
|
||||
"html_url": "https:\/\/github.com\/vincentinttsh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vincentinttsh\/CVE-2022-28346",
|
||||
"description": "An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-04T01:43:58Z",
|
||||
"updated_at": "2022-08-24T08:06:59Z",
|
||||
"pushed_at": "2022-05-15T00:53:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -39,5 +39,35 @@
|
|||
"watchers": 114,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 584971290,
|
||||
"name": "CVE-2022-28672",
|
||||
"full_name": "fastmo\/CVE-2022-28672",
|
||||
"owner": {
|
||||
"login": "fastmo",
|
||||
"id": 53575270,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
|
||||
"html_url": "https:\/\/github.com\/fastmo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fastmo\/CVE-2022-28672",
|
||||
"description": " CVE-2022-28672 Vulnerabilidad Foxit PDF Reader - UaF - RCE - JIT Spraying",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T01:39:04Z",
|
||||
"updated_at": "2023-01-04T02:03:45Z",
|
||||
"pushed_at": "2023-01-04T02:04:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2022/CVE-2022-29170.json
Normal file
32
2022/CVE-2022-29170.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 594668634,
|
||||
"name": "CVE-2022-29170",
|
||||
"full_name": "yijikeji\/CVE-2022-29170",
|
||||
"owner": {
|
||||
"login": "yijikeji",
|
||||
"id": 42433368,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42433368?v=4",
|
||||
"html_url": "https:\/\/github.com\/yijikeji"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yijikeji\/CVE-2022-29170",
|
||||
"description": "Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-29T09:10:44Z",
|
||||
"updated_at": "2023-02-20T13:57:30Z",
|
||||
"pushed_at": "2022-12-29T07:40:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -59,6 +59,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 584983892,
|
||||
"name": "CVE-2022-29455",
|
||||
"full_name": "5l1v3r1\/CVE-2022-29455",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2022-29455",
|
||||
"description": "DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T02:40:39Z",
|
||||
"updated_at": "2023-01-04T02:40:35Z",
|
||||
"pushed_at": "2022-11-27T18:46:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 585658055,
|
||||
"name": "CVE-2022-29455",
|
||||
"full_name": "yaudahbanh\/CVE-2022-29455",
|
||||
"owner": {
|
||||
"login": "yaudahbanh",
|
||||
"id": 39010800,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39010800?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaudahbanh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaudahbanh\/CVE-2022-29455",
|
||||
"description": "Mass Scanner for CVE-2022-29455 on Elementor Plugins Wordpress",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T18:29:47Z",
|
||||
"updated_at": "2023-03-22T08:09:03Z",
|
||||
"pushed_at": "2023-01-05T18:30:52Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 600651739,
|
||||
"name": "CVE-2022-29455",
|
||||
|
|
32
2022/CVE-2022-34683.json
Normal file
32
2022/CVE-2022-34683.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 588700609,
|
||||
"name": "CVE-2022-34683",
|
||||
"full_name": "gmh5225\/CVE-2022-34683",
|
||||
"owner": {
|
||||
"login": "gmh5225",
|
||||
"id": 13917777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmh5225"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-34683",
|
||||
"description": "NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-13T19:18:02Z",
|
||||
"updated_at": "2023-02-20T15:21:34Z",
|
||||
"pushed_at": "2023-01-06T23:41:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -53,13 +53,13 @@
|
|||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 168,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "User can execute unsigned binaries with BootROM privileges, which can be used to unlock bootloader",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2023-11-29T05:43:24Z",
|
||||
"updated_at": "2023-11-30T10:14:30Z",
|
||||
"pushed_at": "2023-11-05T13:34:13Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"has_discussions": true,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
41
2022/CVE-2022-39073.json
Normal file
41
2022/CVE-2022-39073.json
Normal file
|
@ -0,0 +1,41 @@
|
|||
[
|
||||
{
|
||||
"id": 586354436,
|
||||
"name": "CVE-2022-39073",
|
||||
"full_name": "v0lp3\/CVE-2022-39073",
|
||||
"owner": {
|
||||
"login": "v0lp3",
|
||||
"id": 20267645,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20267645?v=4",
|
||||
"html_url": "https:\/\/github.com\/v0lp3"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/v0lp3\/CVE-2022-39073",
|
||||
"description": "Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-07T20:46:20Z",
|
||||
"updated_at": "2023-09-13T11:53:59Z",
|
||||
"pushed_at": "2023-01-07T20:54:07Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"command-injection",
|
||||
"cve-2022-39073",
|
||||
"exploit",
|
||||
"iot",
|
||||
"mf286r",
|
||||
"rce",
|
||||
"router",
|
||||
"zte"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2022/CVE-2022-40363.json
Normal file
32
2022/CVE-2022-40363.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 590734045,
|
||||
"name": "CVE-2022-40363",
|
||||
"full_name": "Olafdaf\/CVE-2022-40363",
|
||||
"owner": {
|
||||
"login": "Olafdaf",
|
||||
"id": 123042506,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123042506?v=4",
|
||||
"html_url": "https:\/\/github.com\/Olafdaf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Olafdaf\/CVE-2022-40363",
|
||||
"description": "A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-19T04:19:42Z",
|
||||
"updated_at": "2023-11-21T16:42:29Z",
|
||||
"pushed_at": "2022-12-29T11:12:27Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-40769.json
Normal file
32
2022/CVE-2022-40769.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 594246349,
|
||||
"name": "CVE-2022-40769",
|
||||
"full_name": "PLSRcoin\/CVE-2022-40769",
|
||||
"owner": {
|
||||
"login": "PLSRcoin",
|
||||
"id": 99826299,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99826299?v=4",
|
||||
"html_url": "https:\/\/github.com\/PLSRcoin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PLSRcoin\/CVE-2022-40769",
|
||||
"description": "profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-28T00:12:31Z",
|
||||
"updated_at": "2023-02-20T14:52:04Z",
|
||||
"pushed_at": "2022-12-29T15:29:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-41076.json
Normal file
32
2022/CVE-2022-41076.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 595651423,
|
||||
"name": "CVE-2022-41076",
|
||||
"full_name": "5l1v3r1\/CVE-2022-41076",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2022-41076",
|
||||
"description": "PowerShell Remote Code Execution Vulnerability. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-31T14:32:39Z",
|
||||
"updated_at": "2023-02-20T12:06:24Z",
|
||||
"pushed_at": "2022-12-27T16:03:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2022/CVE-2022-41114.json
Normal file
32
2022/CVE-2022-41114.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 584184679,
|
||||
"name": "CVE-2022-41114",
|
||||
"full_name": "gmh5225\/CVE-2022-41114",
|
||||
"owner": {
|
||||
"login": "gmh5225",
|
||||
"id": 13917777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmh5225"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2022-41114",
|
||||
"description": "Windows Bind Filter Driver Elevation of Privilege Vulnerability. CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-01T18:30:30Z",
|
||||
"updated_at": "2023-02-20T12:35:54Z",
|
||||
"pushed_at": "2022-12-28T09:34:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2022/CVE-2022-41966.json
Normal file
32
2022/CVE-2022-41966.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 585766378,
|
||||
"name": "Xstream_cve-2022-41966",
|
||||
"full_name": "111ddea\/Xstream_cve-2022-41966",
|
||||
"owner": {
|
||||
"login": "111ddea",
|
||||
"id": 41444127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41444127?v=4",
|
||||
"html_url": "https:\/\/github.com\/111ddea"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/111ddea\/Xstream_cve-2022-41966",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-06T02:37:07Z",
|
||||
"updated_at": "2023-01-19T05:36:46Z",
|
||||
"pushed_at": "2023-01-06T02:42:53Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1333,7 +1333,7 @@
|
|||
"description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T08:29:24Z",
|
||||
"updated_at": "2023-11-27T17:27:54Z",
|
||||
"updated_at": "2023-11-30T10:08:31Z",
|
||||
"pushed_at": "2023-06-27T09:01:14Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -1,4 +1,64 @@
|
|||
[
|
||||
{
|
||||
"id": 585639540,
|
||||
"name": "CVE-2022-44877",
|
||||
"full_name": "numanturle\/CVE-2022-44877",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-44877",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-05T17:29:10Z",
|
||||
"updated_at": "2023-11-23T04:11:02Z",
|
||||
"pushed_at": "2023-01-05T17:40:18Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 585996269,
|
||||
"name": "CVE-2022-44877-RCE",
|
||||
"full_name": "komomon\/CVE-2022-44877-RCE",
|
||||
"owner": {
|
||||
"login": "komomon",
|
||||
"id": 52700174,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
|
||||
"html_url": "https:\/\/github.com\/komomon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/komomon\/CVE-2022-44877-RCE",
|
||||
"description": "CVE-2022-44877 Centos Web Panel 7 Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-06T16:53:51Z",
|
||||
"updated_at": "2023-01-11T15:53:59Z",
|
||||
"pushed_at": "2023-01-06T17:00:09Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 596515870,
|
||||
"name": "CVE-2022-44877-CWP7",
|
||||
|
|
32
2022/CVE-2022-45728.json
Normal file
32
2022/CVE-2022-45728.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 585251034,
|
||||
"name": "CVE-2022-45728",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-45728",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45728",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:41:57Z",
|
||||
"updated_at": "2023-01-04T17:41:57Z",
|
||||
"pushed_at": "2023-01-04T17:43:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2022/CVE-2022-45729.json
Normal file
32
2022/CVE-2022-45729.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 585253557,
|
||||
"name": "CVE-2022-45729",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-45729",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-45729",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:50:00Z",
|
||||
"updated_at": "2023-01-04T17:50:00Z",
|
||||
"pushed_at": "2023-01-04T17:50:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -89,6 +89,44 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 584490516,
|
||||
"name": "CVE-2022-46169",
|
||||
"full_name": "Inplex-sys\/CVE-2022-46169",
|
||||
"owner": {
|
||||
"login": "Inplex-sys",
|
||||
"id": 69421356,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69421356?v=4",
|
||||
"html_url": "https:\/\/github.com\/Inplex-sys"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Inplex-sys\/CVE-2022-46169",
|
||||
"description": "Cacti Unauthenticated Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-02T18:03:26Z",
|
||||
"updated_at": "2023-03-11T00:41:32Z",
|
||||
"pushed_at": "2023-01-02T18:05:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cacti",
|
||||
"cve",
|
||||
"hgrab-framework",
|
||||
"poc",
|
||||
"rce",
|
||||
"scanner",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 585629170,
|
||||
"name": "CVE-2022-46169",
|
||||
|
|
32
2022/CVE-2022-46622.json
Normal file
32
2022/CVE-2022-46622.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 585254254,
|
||||
"name": "CVE-2022-46622",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-46622",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46622",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:52:13Z",
|
||||
"updated_at": "2023-01-04T17:52:13Z",
|
||||
"pushed_at": "2023-01-04T17:52:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2022/CVE-2022-46623.json
Normal file
32
2022/CVE-2022-46623.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 585254938,
|
||||
"name": "CVE-2022-46623",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-46623",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-46623",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:54:29Z",
|
||||
"updated_at": "2023-01-04T17:54:29Z",
|
||||
"pushed_at": "2023-01-04T17:54:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2022-46689",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T00:08:55Z",
|
||||
"updated_at": "2023-11-26T05:08:06Z",
|
||||
"updated_at": "2023-11-30T07:13:54Z",
|
||||
"pushed_at": "2023-10-10T16:53:48Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
32
2022/CVE-2022-47102.json
Normal file
32
2022/CVE-2022-47102.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 585255498,
|
||||
"name": "CVE-2022-47102",
|
||||
"full_name": "sudoninja-noob\/CVE-2022-47102",
|
||||
"owner": {
|
||||
"login": "sudoninja-noob",
|
||||
"id": 18701598,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18701598?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudoninja-noob\/CVE-2022-47102",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-04T17:56:09Z",
|
||||
"updated_at": "2023-01-04T17:56:09Z",
|
||||
"pushed_at": "2023-01-04T17:56:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
32
2022/CVE-2022-48197.json
Normal file
32
2022/CVE-2022-48197.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 584354205,
|
||||
"name": "CVE-2022-48197",
|
||||
"full_name": "ryan412\/CVE-2022-48197",
|
||||
"owner": {
|
||||
"login": "ryan412",
|
||||
"id": 54446262,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54446262?v=4",
|
||||
"html_url": "https:\/\/github.com\/ryan412"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ryan412\/CVE-2022-48197",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-02T10:27:04Z",
|
||||
"updated_at": "2023-01-02T10:27:04Z",
|
||||
"pushed_at": "2023-01-02T10:31:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-08-21T00:31:50Z",
|
||||
"updated_at": "2023-11-24T09:13:54Z",
|
||||
"updated_at": "2023-11-30T06:41:21Z",
|
||||
"pushed_at": "2023-08-21T00:33:08Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -173,19 +173,19 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-16T19:43:39Z",
|
||||
"updated_at": "2023-11-03T07:33:32Z",
|
||||
"updated_at": "2023-11-30T08:48:19Z",
|
||||
"pushed_at": "2023-03-17T07:47:40Z",
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"stargazers_count": 341,
|
||||
"watchers_count": 341,
|
||||
"has_discussions": false,
|
||||
"forks_count": 63,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 340,
|
||||
"forks": 64,
|
||||
"watchers": 341,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-24055 PoC (KeePass 2.5x)",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-25T03:21:42Z",
|
||||
"updated_at": "2023-10-31T09:28:13Z",
|
||||
"updated_at": "2023-11-30T06:39:10Z",
|
||||
"pushed_at": "2023-02-10T08:03:59Z",
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"has_discussions": false,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 254,
|
||||
"watchers": 255,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-22T19:44:08Z",
|
||||
"updated_at": "2023-11-28T09:25:36Z",
|
||||
"updated_at": "2023-11-30T09:49:01Z",
|
||||
"pushed_at": "2023-03-07T10:43:36Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "rce",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-14T09:43:31Z",
|
||||
"updated_at": "2023-11-27T06:50:02Z",
|
||||
"updated_at": "2023-11-30T07:15:57Z",
|
||||
"pushed_at": "2023-06-15T01:35:51Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -106,7 +106,7 @@
|
|||
"description": "KeePass 2.X dumper (CVE-2023-32784)",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T00:11:42Z",
|
||||
"updated_at": "2023-11-04T18:42:43Z",
|
||||
"updated_at": "2023-11-30T07:29:46Z",
|
||||
"pushed_at": "2023-11-04T17:14:26Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 716224102,
|
||||
"name": "CVE-2023-34048-findings",
|
||||
"full_name": "K1i7n\/CVE-2023-34048-findings",
|
||||
"owner": {
|
||||
"login": "K1i7n",
|
||||
"id": 150281764,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150281764?v=4",
|
||||
"html_url": "https:\/\/github.com\/K1i7n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/K1i7n\/CVE-2023-34048-findings",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-08T17:31:55Z",
|
||||
"updated_at": "2023-11-09T02:31:58Z",
|
||||
"pushed_at": "2023-11-08T18:07:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Report and exploit of CVE-2023-36427",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T16:55:18Z",
|
||||
"updated_at": "2023-11-27T09:36:51Z",
|
||||
"updated_at": "2023-11-30T10:33:27Z",
|
||||
"pushed_at": "2023-11-22T15:31:34Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ghostscript command injection vulnerability PoC (CVE-2023-36664)",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-12T18:33:57Z",
|
||||
"updated_at": "2023-11-30T03:25:35Z",
|
||||
"updated_at": "2023-11-30T09:47:23Z",
|
||||
"pushed_at": "2023-09-07T08:37:04Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 73,
|
||||
"watchers": 75,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T18:33:41Z",
|
||||
"updated_at": "2023-11-24T09:13:58Z",
|
||||
"updated_at": "2023-11-30T12:00:07Z",
|
||||
"pushed_at": "2023-10-26T11:44:46Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SolarView vuln",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-15T15:44:58Z",
|
||||
"updated_at": "2023-09-01T18:10:52Z",
|
||||
"updated_at": "2023-11-30T09:08:49Z",
|
||||
"pushed_at": "2023-09-09T01:48:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -349,10 +349,10 @@
|
|||
"description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-24T18:26:36Z",
|
||||
"updated_at": "2023-11-30T06:37:25Z",
|
||||
"updated_at": "2023-11-30T09:09:17Z",
|
||||
"pushed_at": "2023-11-24T20:19:44Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -361,7 +361,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 42,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "exploit for f5-big-ip RCE cve-2023-46747",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-01T09:31:05Z",
|
||||
"updated_at": "2023-11-29T06:16:34Z",
|
||||
"updated_at": "2023-11-30T12:34:15Z",
|
||||
"pushed_at": "2023-11-10T02:12:38Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 121,
|
||||
"watchers": 122,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for the CVE-2023-49103",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-22T17:00:23Z",
|
||||
"updated_at": "2023-11-29T15:03:21Z",
|
||||
"updated_at": "2023-11-30T08:22:35Z",
|
||||
"pushed_at": "2023-11-22T17:04:34Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-29T18:46:54Z",
|
||||
"updated_at": "2023-11-29T19:33:52Z",
|
||||
"pushed_at": "2023-11-29T19:36:36Z",
|
||||
"pushed_at": "2023-11-30T11:41:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "PoC for CVE-2023-4911",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-04T14:12:16Z",
|
||||
"updated_at": "2023-11-28T19:42:15Z",
|
||||
"updated_at": "2023-11-30T06:48:23Z",
|
||||
"pushed_at": "2023-10-04T14:16:36Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 355,
|
||||
"watchers": 356,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-10-26T06:56:48Z",
|
||||
"updated_at": "2023-10-31T21:09:53Z",
|
||||
"pushed_at": "2023-10-26T06:58:36Z",
|
||||
"pushed_at": "2023-11-30T07:36:57Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
|
|
156
README.md
156
README.md
|
@ -3263,13 +3263,6 @@
|
|||
- [Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040](https://github.com/Contrast-Security-OSS/Spring-Kafka-POC-CVE-2023-34040)
|
||||
- [pyn3rd/CVE-2023-34040](https://github.com/pyn3rd/CVE-2023-34040)
|
||||
|
||||
### CVE-2023-34048 (2023-10-25)
|
||||
|
||||
<code>vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
|
||||
</code>
|
||||
|
||||
- [K1i7n/CVE-2023-34048-findings](https://github.com/K1i7n/CVE-2023-34048-findings)
|
||||
|
||||
### CVE-2023-34050 (2023-10-19)
|
||||
|
||||
<code>\n\n\n\n\n\n\n\n\n\nIn spring AMQP versions 1.0.0 to\n2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class\nnames were added to Spring AMQP, allowing users to lock down deserialization of\ndata in messages from untrusted sources; however by default, when no allowed\nlist was provided, all classes could be deserialized.\n\n\n\nSpecifically, an application is\nvulnerable if\n\n\n\n\n * the\n SimpleMessageConverter or SerializerMessageConverter is used\n\n * the user\n does not configure allowed list patterns\n\n * untrusted\n message originators gain permissions to write messages to the RabbitMQ\n broker to send malicious content\n\n\n\n\n\n\n\n\n\n
|
||||
|
@ -5472,7 +5465,11 @@
|
|||
|
||||
- [nitipoom-jar/CVE-2023-48200](https://github.com/nitipoom-jar/CVE-2023-48200)
|
||||
|
||||
### CVE-2023-49052
|
||||
### CVE-2023-49052 (-)
|
||||
|
||||
<code>File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component.
|
||||
</code>
|
||||
|
||||
- [Cyber-Wo0dy/CVE-2023-49052](https://github.com/Cyber-Wo0dy/CVE-2023-49052)
|
||||
|
||||
### CVE-2023-49103 (2023-11-21)
|
||||
|
@ -5796,6 +5793,7 @@
|
|||
- [qwert419/linux-](https://github.com/qwert419/linux-)
|
||||
- [DataFox/CVE-2022-0847](https://github.com/DataFox/CVE-2022-0847)
|
||||
- [pmihsan/Dirty-Pipe-CVE-2022-0847](https://github.com/pmihsan/Dirty-Pipe-CVE-2022-0847)
|
||||
- [ajith737/Dirty-Pipe-CVE-2022-0847-POCs](https://github.com/ajith737/Dirty-Pipe-CVE-2022-0847-POCs)
|
||||
- [mutur4/CVE-2022-0847](https://github.com/mutur4/CVE-2022-0847)
|
||||
- [orsuprasad/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/orsuprasad/CVE-2022-0847-DirtyPipe-Exploits)
|
||||
- [4bhishek0/CVE-2022-0847-Poc](https://github.com/4bhishek0/CVE-2022-0847-Poc)
|
||||
|
@ -5898,6 +5896,7 @@
|
|||
- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040)
|
||||
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
|
||||
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
|
||||
- [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040)
|
||||
- [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040)
|
||||
|
||||
### CVE-2022-1051 (2022-05-16)
|
||||
|
@ -5983,6 +5982,7 @@
|
|||
- [AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit](https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit)
|
||||
- [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329)
|
||||
- [Grazee/CVE-2022-1329-WordPress-Elementor-RCE](https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE)
|
||||
- [dexit/CVE-2022-1329](https://github.com/dexit/CVE-2022-1329)
|
||||
|
||||
### CVE-2022-1386 (2022-05-16)
|
||||
|
||||
|
@ -6639,6 +6639,21 @@
|
|||
|
||||
- [hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456](https://github.com/hshivhare67/platform_frameworks_base_AOSP10_r33_CVE-2022-20456)
|
||||
|
||||
### CVE-2022-20470 (2022-12-13)
|
||||
|
||||
<code>In bindRemoteViewsService of AppWidgetServiceImpl.java, there is a possible way to bypass background activity launch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234013191
|
||||
</code>
|
||||
|
||||
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20470)
|
||||
|
||||
### CVE-2022-20473 (2022-12-13)
|
||||
|
||||
<code>In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173
|
||||
</code>
|
||||
|
||||
- [Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33_CVE-2022-20473)
|
||||
- [Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473](https://github.com/Trinadh465/frameworks_minikin_AOSP10_r33-CVE-2022-20473)
|
||||
|
||||
### CVE-2022-20489 (2023-01-24)
|
||||
|
||||
<code>In many functions of AutomaticZenRule.java, there is a possible failure to persist permissions settings due to resource exhaustion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242703460
|
||||
|
@ -6675,6 +6690,13 @@
|
|||
|
||||
- [Supersonic/CVE-2022-20494](https://github.com/Supersonic/CVE-2022-20494)
|
||||
|
||||
### CVE-2022-20607 (2022-12-16)
|
||||
|
||||
<code>In the Pixel cellular firmware, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with LTE authentication needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238914868References: N/A
|
||||
</code>
|
||||
|
||||
- [sumeetIT/CVE-2022-20607](https://github.com/sumeetIT/CVE-2022-20607)
|
||||
|
||||
### CVE-2022-20699 (2022-02-10)
|
||||
|
||||
<code>Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
|
||||
|
@ -7295,6 +7317,7 @@
|
|||
- [clemoregan/SSE4-CVE-2022-22965](https://github.com/clemoregan/SSE4-CVE-2022-22965)
|
||||
- [devengpk/CVE-2022-22965](https://github.com/devengpk/CVE-2022-22965)
|
||||
- [zangcc/CVE-2022-22965-rexbb](https://github.com/zangcc/CVE-2022-22965-rexbb)
|
||||
- [ajith737/Spring4Shell-CVE-2022-22965-POC](https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC)
|
||||
- [c33dd/CVE-2022-22965](https://github.com/c33dd/CVE-2022-22965)
|
||||
- [gokul-ramesh/Spring4Shell-PoC-exploit](https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit)
|
||||
- [bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-](https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-)
|
||||
|
@ -7398,6 +7421,7 @@
|
|||
- [Kazaf6s/CVE-2022-23131](https://github.com/Kazaf6s/CVE-2022-23131)
|
||||
- [SCAMagic/CVE-2022-23131poc-exp-zabbix-](https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix-)
|
||||
- [Vulnmachines/Zabbix-CVE-2022-23131](https://github.com/Vulnmachines/Zabbix-CVE-2022-23131)
|
||||
- [wr0x00/cve-2022-23131](https://github.com/wr0x00/cve-2022-23131)
|
||||
- [Arrnitage/CVE-2022-23131_exp](https://github.com/Arrnitage/CVE-2022-23131_exp)
|
||||
- [clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131](https://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131)
|
||||
- [r10lab/CVE-2022-23131](https://github.com/r10lab/CVE-2022-23131)
|
||||
|
@ -8600,6 +8624,7 @@
|
|||
|
||||
- [YouGina/CVE-2022-28346](https://github.com/YouGina/CVE-2022-28346)
|
||||
- [DeEpinGh0st/CVE-2022-28346](https://github.com/DeEpinGh0st/CVE-2022-28346)
|
||||
- [vincentinttsh/CVE-2022-28346](https://github.com/vincentinttsh/CVE-2022-28346)
|
||||
|
||||
### CVE-2022-28368 (2022-04-02)
|
||||
|
||||
|
@ -8665,6 +8690,7 @@
|
|||
</code>
|
||||
|
||||
- [hacksysteam/CVE-2022-28672](https://github.com/hacksysteam/CVE-2022-28672)
|
||||
- [fastmo/CVE-2022-28672](https://github.com/fastmo/CVE-2022-28672)
|
||||
|
||||
### CVE-2022-28943
|
||||
- [zhefox/CVE-2022-28943](https://github.com/zhefox/CVE-2022-28943)
|
||||
|
@ -8750,6 +8776,13 @@
|
|||
|
||||
- [EgeBalci/CVE-2022-29154](https://github.com/EgeBalci/CVE-2022-29154)
|
||||
|
||||
### CVE-2022-29170 (2022-05-20)
|
||||
|
||||
<code>Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, the Request security feature allows list allows to configure Grafana in a way so that the instance doesn’t call or only calls specific hosts. The vulnerability present starting with version 7.4.0-beta1 and prior to versions 7.5.16 and 8.5.3 allows someone to bypass these security configurations if a malicious datasource (running on an allowed host) returns an HTTP redirect to a forbidden host. The vulnerability only impacts Grafana Enterprise when the Request security allow list is used and there is a possibility to add a custom datasource to Grafana which returns HTTP redirects. In this scenario, Grafana would blindly follow the redirects and potentially give secure information to the clients. Grafana Cloud is not impacted by this vulnerability. Versions 7.5.16 and 8.5.3 contain a patch for this issue. There are currently no known workarounds.
|
||||
</code>
|
||||
|
||||
- [yijikeji/CVE-2022-29170](https://github.com/yijikeji/CVE-2022-29170)
|
||||
|
||||
### CVE-2022-29221 (2022-05-24)
|
||||
|
||||
<code>Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
|
||||
|
@ -8801,6 +8834,8 @@
|
|||
|
||||
- [GULL2100/Wordpress_xss-CVE-2022-29455](https://github.com/GULL2100/Wordpress_xss-CVE-2022-29455)
|
||||
- [akhilkoradiya/CVE-2022-29455](https://github.com/akhilkoradiya/CVE-2022-29455)
|
||||
- [5l1v3r1/CVE-2022-29455](https://github.com/5l1v3r1/CVE-2022-29455)
|
||||
- [yaudahbanh/CVE-2022-29455](https://github.com/yaudahbanh/CVE-2022-29455)
|
||||
- [0xkucing/CVE-2022-29455](https://github.com/0xkucing/CVE-2022-29455)
|
||||
- [tucommenceapousser/CVE-2022-29455](https://github.com/tucommenceapousser/CVE-2022-29455)
|
||||
- [tucommenceapousser/CVE-2022-29455-mass](https://github.com/tucommenceapousser/CVE-2022-29455-mass)
|
||||
|
@ -9765,6 +9800,13 @@
|
|||
|
||||
- [Halcy0nic/CVE-2022-34556](https://github.com/Halcy0nic/CVE-2022-34556)
|
||||
|
||||
### CVE-2022-34683 (2022-12-30)
|
||||
|
||||
<code>NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a null-pointer dereference occurs, which may lead to denial of service.
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2022-34683](https://github.com/gmh5225/CVE-2022-34683)
|
||||
|
||||
### CVE-2022-34715 (2022-08-09)
|
||||
|
||||
<code>Windows Network File System Remote Code Execution Vulnerability
|
||||
|
@ -10306,6 +10348,13 @@
|
|||
|
||||
- [v0lp3/CVE-2022-39066](https://github.com/v0lp3/CVE-2022-39066)
|
||||
|
||||
### CVE-2022-39073 (2023-01-06)
|
||||
|
||||
<code>There is a command injection vulnerability in ZTE MF286R, Due to insufficient validation of the input parameters, an attacker could use the vulnerability to execute arbitrary commands.
|
||||
</code>
|
||||
|
||||
- [v0lp3/CVE-2022-39073](https://github.com/v0lp3/CVE-2022-39073)
|
||||
|
||||
### CVE-2022-39196 (2022-09-04)
|
||||
|
||||
<code>Blackboard Learn 1.10.1 allows remote authenticated users to read unintended files by entering student credentials and then directly visiting a certain webapps/bbcms/execute/ URL.
|
||||
|
@ -10471,6 +10520,13 @@
|
|||
|
||||
- [h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated](https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated)
|
||||
|
||||
### CVE-2022-40363 (2022-09-29)
|
||||
|
||||
<code>A buffer overflow in the component nfc_device_load_mifare_ul_data of Flipper Devices Inc., Flipper Zero before v0.65.2 allows attackers to cause a Denial of Service (DoS) via a crafted NFC file.
|
||||
</code>
|
||||
|
||||
- [Olafdaf/CVE-2022-40363](https://github.com/Olafdaf/CVE-2022-40363)
|
||||
|
||||
### CVE-2022-40470 (2022-11-21)
|
||||
|
||||
<code>Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature.
|
||||
|
@ -10538,6 +10594,13 @@
|
|||
|
||||
- [williamkhepri/CVE-2022-40687-metasploit-scanner](https://github.com/williamkhepri/CVE-2022-40687-metasploit-scanner)
|
||||
|
||||
### CVE-2022-40769 (2022-09-18)
|
||||
|
||||
<code>profanity through 1.60 has only four billion possible RNG initializations. Thus, attackers can recover private keys from Ethereum vanity addresses and steal cryptocurrency, as exploited in the wild in June 2022.
|
||||
</code>
|
||||
|
||||
- [PLSRcoin/CVE-2022-40769](https://github.com/PLSRcoin/CVE-2022-40769)
|
||||
|
||||
### CVE-2022-40799 (2022-11-28)
|
||||
|
||||
<code>Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device.
|
||||
|
@ -10590,6 +10653,13 @@
|
|||
|
||||
- [NathanScottGithub/CVE-2022-41049-POC](https://github.com/NathanScottGithub/CVE-2022-41049-POC)
|
||||
|
||||
### CVE-2022-41076 (2022-12-13)
|
||||
|
||||
<code>PowerShell Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [5l1v3r1/CVE-2022-41076](https://github.com/5l1v3r1/CVE-2022-41076)
|
||||
|
||||
### CVE-2022-41080 (2022-11-09)
|
||||
|
||||
<code>Microsoft Exchange Server Elevation of Privilege Vulnerability
|
||||
|
@ -10620,6 +10690,13 @@
|
|||
- [g-gill24/WinRE-Patch](https://github.com/g-gill24/WinRE-Patch)
|
||||
- [dsn1321/KB5025175-CVE-2022-41099](https://github.com/dsn1321/KB5025175-CVE-2022-41099)
|
||||
|
||||
### CVE-2022-41114 (2022-11-09)
|
||||
|
||||
<code>Windows Bind Filter Driver Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [gmh5225/CVE-2022-41114](https://github.com/gmh5225/CVE-2022-41114)
|
||||
|
||||
### CVE-2022-41218 (2022-09-21)
|
||||
|
||||
<code>In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.
|
||||
|
@ -10772,6 +10849,13 @@
|
|||
|
||||
- [grails/GSSC-CVE-2022-41923](https://github.com/grails/GSSC-CVE-2022-41923)
|
||||
|
||||
### CVE-2022-41966 (2022-12-27)
|
||||
|
||||
<code>XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.
|
||||
</code>
|
||||
|
||||
- [111ddea/Xstream_cve-2022-41966](https://github.com/111ddea/Xstream_cve-2022-41966)
|
||||
|
||||
### CVE-2022-42045 (2023-07-13)
|
||||
|
||||
<code>Certain Zemana products are vulnerable to Arbitrary code injection. This affects Watchdog Anti-Malware 4.1.422 and Zemana AntiMalware 3.2.28.
|
||||
|
@ -11173,6 +11257,8 @@
|
|||
<code>login/index.php in CWP (aka Control Web Panel or CentOS Web Panel) 7 before 0.9.8.1147 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the login parameter.
|
||||
</code>
|
||||
|
||||
- [numanturle/CVE-2022-44877](https://github.com/numanturle/CVE-2022-44877)
|
||||
- [komomon/CVE-2022-44877-RCE](https://github.com/komomon/CVE-2022-44877-RCE)
|
||||
- [ColdFusionX/CVE-2022-44877-CWP7](https://github.com/ColdFusionX/CVE-2022-44877-CWP7)
|
||||
- [Chocapikk/CVE-2022-44877](https://github.com/Chocapikk/CVE-2022-44877)
|
||||
- [hotpotcookie/CVE-2022-44877-white-box](https://github.com/hotpotcookie/CVE-2022-44877-white-box)
|
||||
|
@ -11313,6 +11399,20 @@
|
|||
|
||||
- [yerodin/CVE-2022-45701](https://github.com/yerodin/CVE-2022-45701)
|
||||
|
||||
### CVE-2022-45728 (2023-01-12)
|
||||
|
||||
<code>Doctor Appointment Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-45728](https://github.com/sudoninja-noob/CVE-2022-45728)
|
||||
|
||||
### CVE-2022-45729 (2023-01-12)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Employee ID parameter.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-45729](https://github.com/sudoninja-noob/CVE-2022-45729)
|
||||
|
||||
### CVE-2022-45770 (2023-01-26)
|
||||
|
||||
<code>Improper input validation in adgnetworkwfpdrv.sys in Adguard For Windows x86 through 7.11 allows local privilege escalation.
|
||||
|
@ -11390,6 +11490,7 @@
|
|||
- [imjdl/CVE-2022-46169](https://github.com/imjdl/CVE-2022-46169)
|
||||
- [0xf4n9x/CVE-2022-46169](https://github.com/0xf4n9x/CVE-2022-46169)
|
||||
- [taythebot/CVE-2022-46169](https://github.com/taythebot/CVE-2022-46169)
|
||||
- [Inplex-sys/CVE-2022-46169](https://github.com/Inplex-sys/CVE-2022-46169)
|
||||
- [sAsPeCt488/CVE-2022-46169](https://github.com/sAsPeCt488/CVE-2022-46169)
|
||||
- [botfather0x0/CVE-2022-46169](https://github.com/botfather0x0/CVE-2022-46169)
|
||||
- [Habib0x0/CVE-2022-46169](https://github.com/Habib0x0/CVE-2022-46169)
|
||||
|
@ -11470,6 +11571,20 @@
|
|||
|
||||
- [galoget/ResponsiveFileManager-CVE-2022-46604](https://github.com/galoget/ResponsiveFileManager-CVE-2022-46604)
|
||||
|
||||
### CVE-2022-46622 (2023-01-12)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in Judging Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-46622](https://github.com/sudoninja-noob/CVE-2022-46622)
|
||||
|
||||
### CVE-2022-46623 (2023-01-12)
|
||||
|
||||
<code>Judging Management System v1.0.0 was discovered to contain a SQL injection vulnerability via the username parameter.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-46623](https://github.com/sudoninja-noob/CVE-2022-46623)
|
||||
|
||||
### CVE-2022-46638
|
||||
- [naonymous101/CVE-2022-46638](https://github.com/naonymous101/CVE-2022-46638)
|
||||
|
||||
|
@ -11506,6 +11621,13 @@
|
|||
|
||||
- [JacobEbben/CVE-2022-46836_remote_code_execution](https://github.com/JacobEbben/CVE-2022-46836_remote_code_execution)
|
||||
|
||||
### CVE-2022-47102 (2023-01-12)
|
||||
|
||||
<code>A cross-site scripting (XSS) vulnerability in Student Study Center Management System V 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
|
||||
</code>
|
||||
|
||||
- [sudoninja-noob/CVE-2022-47102](https://github.com/sudoninja-noob/CVE-2022-47102)
|
||||
|
||||
### CVE-2022-47373 (2023-02-14)
|
||||
|
||||
<code>Reflected Cross Site Scripting in Search Functionality of Module Library in Pandora FMS Console v766 and lower. This vulnerability arises on the forget password functionality in which parameter username does not proper input validation/sanitization thus results in executing malicious JavaScript payload.
|
||||
|
@ -11589,6 +11711,13 @@
|
|||
|
||||
- [otsmr/internet-of-vulnerable-things](https://github.com/otsmr/internet-of-vulnerable-things)
|
||||
|
||||
### CVE-2022-48197 (2023-01-02)
|
||||
|
||||
<code>** UNSUPPORTED WHEN ASSIGNED ** Reflected cross-site scripting (XSS) exists in the TreeView of YUI2 through 2800: up.php sam.php renderhidden.php removechildren.php removeall.php readd.php overflow.php newnode2.php newnode.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
||||
</code>
|
||||
|
||||
- [ryan412/CVE-2022-48197](https://github.com/ryan412/CVE-2022-48197)
|
||||
|
||||
### CVE-2022-48311 (2023-02-06)
|
||||
|
||||
<code>**UNSUPPORTED WHEN ASSIGNED** Cross Site Scripting (XSS) in HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B allows authenticated attacker to inject their own script into the page via HTTP configuration page. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
||||
|
@ -30287,6 +30416,9 @@
|
|||
</code>
|
||||
|
||||
- [WyAtu/CVE-2018-20250](https://github.com/WyAtu/CVE-2018-20250)
|
||||
- [QAX-A-Team/CVE-2018-20250](https://github.com/QAX-A-Team/CVE-2018-20250)
|
||||
- [nmweizi/CVE-2018-20250-poc-winrar](https://github.com/nmweizi/CVE-2018-20250-poc-winrar)
|
||||
- [blunden/UNACEV2.DLL-CVE-2018-20250](https://github.com/blunden/UNACEV2.DLL-CVE-2018-20250)
|
||||
- [easis/CVE-2018-20250-WinRAR-ACE](https://github.com/easis/CVE-2018-20250-WinRAR-ACE)
|
||||
- [STP5940/CVE-2018-20250](https://github.com/STP5940/CVE-2018-20250)
|
||||
- [technicaldada/hack-winrar](https://github.com/technicaldada/hack-winrar)
|
||||
|
@ -36775,6 +36907,7 @@
|
|||
<code>Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."
|
||||
</code>
|
||||
|
||||
- [whiteHat001/cve-2010-3333](https://github.com/whiteHat001/cve-2010-3333)
|
||||
- [Sunqiz/CVE-2010-3333-reproduction](https://github.com/Sunqiz/CVE-2010-3333-reproduction)
|
||||
|
||||
### CVE-2010-3490 (2010-09-28)
|
||||
|
@ -36791,6 +36924,13 @@
|
|||
|
||||
- [LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2](https://github.com/LAITRUNGMINHDUC/CVE-2010-3600-PythonHackOracle11gR2)
|
||||
|
||||
### CVE-2010-3847 (2011-01-07)
|
||||
|
||||
<code>elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
|
||||
</code>
|
||||
|
||||
- [magisterquis/cve-2010-3847](https://github.com/magisterquis/cve-2010-3847)
|
||||
|
||||
### CVE-2010-3904 (2010-12-06)
|
||||
|
||||
<code>The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
|
||||
|
|
Loading…
Reference in a new issue