diff --git a/2022/CVE-2022-0030.json b/2014/CVE-2014-6230.json similarity index 74% rename from 2022/CVE-2022-0030.json rename to 2014/CVE-2014-6230.json index 78cabc2715..8882d8861f 100644 --- a/2022/CVE-2022-0030.json +++ b/2014/CVE-2014-6230.json @@ -1,20 +1,20 @@ [ { - "id": 581837741, - "name": "CVE-2022-0030", - "full_name": "Live-Hack-CVE\/CVE-2022-0030", + "id": 582024766, + "name": "CVE-2014-6230", + "full_name": "Live-Hack-CVE\/CVE-2014-6230", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0030", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0030 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-6230", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-6230 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:27:59Z", - "updated_at": "2022-12-24T14:27:59Z", - "pushed_at": "2022-12-24T14:28:01Z", + "created_at": "2022-12-25T11:00:26Z", + "updated_at": "2022-12-25T11:00:26Z", + "pushed_at": "2022-12-25T11:00:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2017/CVE-2017-0143.json b/2017/CVE-2017-0143.json index 6e74f83b82..885347c092 100644 --- a/2017/CVE-2017-0143.json +++ b/2017/CVE-2017-0143.json @@ -71,10 +71,10 @@ "description": null, "fork": false, "created_at": "2021-07-08T17:35:50Z", - "updated_at": "2022-12-25T05:19:25Z", + "updated_at": "2022-12-25T12:03:16Z", "pushed_at": "2022-11-02T15:35:18Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -83,7 +83,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 21, + "watchers": 22, "score": 0 }, { diff --git a/2017/CVE-2017-1000367.json b/2017/CVE-2017-1000367.json index 82e2929e12..21d42a82fa 100644 --- a/2017/CVE-2017-1000367.json +++ b/2017/CVE-2017-1000367.json @@ -85,5 +85,34 @@ "forks": 2, "watchers": 6, "score": 0 + }, + { + "id": 582031132, + "name": "CVE-2017-1000367", + "full_name": "Live-Hack-CVE\/CVE-2017-1000367", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-1000367", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-1000367 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:56Z", + "updated_at": "2022-12-25T11:34:56Z", + "pushed_at": "2022-12-25T11:34:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2017/CVE-2017-15361.json b/2017/CVE-2017-15361.json index 368a173194..9c60330fdd 100644 --- a/2017/CVE-2017-15361.json +++ b/2017/CVE-2017-15361.json @@ -105,7 +105,7 @@ "stargazers_count": 36, "watchers_count": 36, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -119,7 +119,7 @@ "vulnerability" ], "visibility": "public", - "forks": 23, + "forks": 24, "watchers": 36, "score": 0 }, diff --git a/2017/CVE-2017-9248.json b/2017/CVE-2017-9248.json index 788f8a93f6..77e5ef1937 100644 --- a/2017/CVE-2017-9248.json +++ b/2017/CVE-2017-9248.json @@ -13,19 +13,19 @@ "description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)", "fork": false, "created_at": "2018-01-16T00:23:34Z", - "updated_at": "2022-11-10T13:39:35Z", + "updated_at": "2022-12-25T07:34:08Z", "pushed_at": "2020-12-22T03:10:47Z", - "stargazers_count": 129, - "watchers_count": 129, + "stargazers_count": 130, + "watchers_count": 130, "has_discussions": false, - "forks_count": 46, + "forks_count": 47, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 46, - "watchers": 129, + "forks": 47, + "watchers": 130, "score": 0 }, { diff --git a/2018/CVE-2018-2893.json b/2018/CVE-2018-2893.json index 21d1f67a5c..e790e41c5b 100644 --- a/2018/CVE-2018-2893.json +++ b/2018/CVE-2018-2893.json @@ -100,10 +100,10 @@ "description": "CVE-2018-2893-PoC", "fork": false, "created_at": "2018-07-22T01:15:58Z", - "updated_at": "2022-11-30T19:08:04Z", + "updated_at": "2022-12-25T11:05:55Z", "pushed_at": "2018-10-27T01:42:20Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -112,7 +112,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 99, + "watchers": 100, "score": 0 }, { diff --git a/2018/CVE-2018-4331.json b/2018/CVE-2018-4331.json index b37e94c9ed..1ce2b2d0a9 100644 --- a/2018/CVE-2018-4331.json +++ b/2018/CVE-2018-4331.json @@ -13,10 +13,10 @@ "description": "CVE-2018-4331: Exploit for a race condition in the GSSCred system service on iOS 11.2.", "fork": false, "created_at": "2017-12-16T08:48:08Z", - "updated_at": "2022-07-23T13:18:03Z", + "updated_at": "2022-12-25T08:11:08Z", "pushed_at": "2018-01-09T07:23:15Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 24, + "watchers": 25, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json deleted file mode 100644 index 79eeedaa78..0000000000 --- a/2020/CVE-2020-1472.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 296468860, - "name": "CVE-2020-1472", - "full_name": "sv3nbeast\/CVE-2020-1472", - "owner": { - "login": "sv3nbeast", - "id": 55974091, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55974091?v=4", - "html_url": "https:\/\/github.com\/sv3nbeast" - }, - "html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-1472", - "description": " CVE-2020-1472复现时使用的py文件整理打包", - "fork": false, - "created_at": "2020-09-18T00:02:26Z", - "updated_at": "2022-12-04T02:15:53Z", - "pushed_at": "2022-12-03T01:53:07Z", - "stargazers_count": 10, - "watchers_count": 10, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 10, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27620.json b/2020/CVE-2020-15679.json similarity index 74% rename from 2021/CVE-2021-27620.json rename to 2020/CVE-2020-15679.json index 8863625741..65ff89af44 100644 --- a/2021/CVE-2021-27620.json +++ b/2020/CVE-2020-15679.json @@ -1,20 +1,20 @@ [ { - "id": 581705905, - "name": "CVE-2021-27620", - "full_name": "Live-Hack-CVE\/CVE-2021-27620", + "id": 582038671, + "name": "CVE-2020-15679", + "full_name": "Live-Hack-CVE\/CVE-2020-15679", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27620", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27620 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15679", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15679 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T02:41:49Z", - "updated_at": "2022-12-24T02:41:49Z", - "pushed_at": "2022-12-24T02:41:51Z", + "created_at": "2022-12-25T12:14:10Z", + "updated_at": "2022-12-25T12:14:10Z", + "pushed_at": "2022-12-25T12:14:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-27622.json b/2020/CVE-2020-15685.json similarity index 74% rename from 2021/CVE-2021-27622.json rename to 2020/CVE-2020-15685.json index 3121ef2a7c..067c709e7b 100644 --- a/2021/CVE-2021-27622.json +++ b/2020/CVE-2020-15685.json @@ -1,20 +1,20 @@ [ { - "id": 581705918, - "name": "CVE-2021-27622", - "full_name": "Live-Hack-CVE\/CVE-2021-27622", + "id": 582038623, + "name": "CVE-2020-15685", + "full_name": "Live-Hack-CVE\/CVE-2020-15685", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27622", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27622 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15685", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15685 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T02:41:52Z", - "updated_at": "2022-12-24T02:41:52Z", - "pushed_at": "2022-12-24T02:41:54Z", + "created_at": "2022-12-25T12:13:54Z", + "updated_at": "2022-12-25T12:13:54Z", + "pushed_at": "2022-12-25T12:13:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-25790.json b/2020/CVE-2020-25790.json index f57556659e..7177e30dc2 100644 --- a/2020/CVE-2020-25790.json +++ b/2020/CVE-2020-25790.json @@ -1,33 +1,4 @@ [ - { - "id": 302557281, - "name": "CVE-2020-25790", - "full_name": "7Mitu\/CVE-2020-25790", - "owner": { - "login": "7Mitu", - "id": 30004765, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30004765?v=4", - "html_url": "https:\/\/github.com\/7Mitu" - }, - "html_url": "https:\/\/github.com\/7Mitu\/CVE-2020-25790", - "description": "Typesetter CMS文件上传漏洞环境", - "fork": false, - "created_at": "2020-10-09T06:50:02Z", - "updated_at": "2022-12-09T02:14:43Z", - "pushed_at": "2022-12-08T06:04:10Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0 - }, { "id": 581636031, "name": "CVE-2020-25790", diff --git a/2021/CVE-2021-27623.json b/2020/CVE-2020-26302.json similarity index 74% rename from 2021/CVE-2021-27623.json rename to 2020/CVE-2020-26302.json index 68ee9a9bc4..08e5a1d477 100644 --- a/2021/CVE-2021-27623.json +++ b/2020/CVE-2020-26302.json @@ -1,20 +1,20 @@ [ { - "id": 581705926, - "name": "CVE-2021-27623", - "full_name": "Live-Hack-CVE\/CVE-2021-27623", + "id": 582031153, + "name": "CVE-2020-26302", + "full_name": "Live-Hack-CVE\/CVE-2020-26302", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27623", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27623 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-26302", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-26302 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T02:41:55Z", - "updated_at": "2022-12-24T02:41:55Z", - "pushed_at": "2022-12-24T02:41:57Z", + "created_at": "2022-12-25T11:35:04Z", + "updated_at": "2022-12-25T11:35:04Z", + "pushed_at": "2022-12-25T11:35:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-27786.json b/2020/CVE-2020-27786.json deleted file mode 100644 index 37f6875e58..0000000000 --- a/2020/CVE-2020-27786.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 502862566, - "name": "CVE-2020-27786-Kernel-Exploit", - "full_name": "kiks7\/CVE-2020-27786-Kernel-Exploit", - "owner": { - "login": "kiks7", - "id": 41572858, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41572858?v=4", - "html_url": "https:\/\/github.com\/kiks7" - }, - "html_url": "https:\/\/github.com\/kiks7\/CVE-2020-27786-Kernel-Exploit", - "description": "4.9 Kernel Exploit for CVE-2020-27786", - "fork": false, - "created_at": "2022-06-13T08:04:19Z", - "updated_at": "2022-12-07T14:11:33Z", - "pushed_at": "2022-12-03T06:46:11Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0836.json b/2020/CVE-2020-3118.json similarity index 74% rename from 2022/CVE-2022-0836.json rename to 2020/CVE-2020-3118.json index 12e8401fe3..344e75ed2d 100644 --- a/2022/CVE-2022-0836.json +++ b/2020/CVE-2020-3118.json @@ -1,20 +1,20 @@ [ { - "id": 581838402, - "name": "CVE-2022-0836", - "full_name": "Live-Hack-CVE\/CVE-2022-0836", + "id": 582024526, + "name": "CVE-2020-3118", + "full_name": "Live-Hack-CVE\/CVE-2020-3118", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0836", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0836 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-3118", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-3118 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:31:02Z", - "updated_at": "2022-12-24T14:31:02Z", - "pushed_at": "2022-12-24T14:31:04Z", + "created_at": "2022-12-25T10:59:07Z", + "updated_at": "2022-12-25T10:59:07Z", + "pushed_at": "2022-12-25T10:59:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-0854.json b/2020/CVE-2020-3227.json similarity index 74% rename from 2022/CVE-2022-0854.json rename to 2020/CVE-2020-3227.json index c520fd333c..bb50f6ac89 100644 --- a/2022/CVE-2022-0854.json +++ b/2020/CVE-2020-3227.json @@ -1,20 +1,20 @@ [ { - "id": 581838409, - "name": "CVE-2022-0854", - "full_name": "Live-Hack-CVE\/CVE-2022-0854", + "id": 582024540, + "name": "CVE-2020-3227", + "full_name": "Live-Hack-CVE\/CVE-2020-3227", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0854", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0854 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-3227", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-3227 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:31:05Z", - "updated_at": "2022-12-24T14:31:05Z", - "pushed_at": "2022-12-24T14:31:07Z", + "created_at": "2022-12-25T10:59:11Z", + "updated_at": "2022-12-25T10:59:11Z", + "pushed_at": "2022-12-25T10:59:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-27624.json b/2020/CVE-2020-35476.json similarity index 74% rename from 2021/CVE-2021-27624.json rename to 2020/CVE-2020-35476.json index 6ae02124f9..137e73cd07 100644 --- a/2021/CVE-2021-27624.json +++ b/2020/CVE-2020-35476.json @@ -1,20 +1,20 @@ [ { - "id": 581705937, - "name": "CVE-2021-27624", - "full_name": "Live-Hack-CVE\/CVE-2021-27624", + "id": 582024494, + "name": "CVE-2020-35476", + "full_name": "Live-Hack-CVE\/CVE-2020-35476", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27624", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27624 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-35476", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-35476 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T02:41:58Z", - "updated_at": "2022-12-24T02:41:58Z", - "pushed_at": "2022-12-24T02:42:00Z", + "created_at": "2022-12-25T10:58:50Z", + "updated_at": "2022-12-25T10:58:50Z", + "pushed_at": "2022-12-25T10:58:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-5377.json b/2020/CVE-2020-5377.json deleted file mode 100644 index ee373529de..0000000000 --- a/2020/CVE-2020-5377.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 572725685, - "name": "AFR-in-OMSA", - "full_name": "und3sc0n0c1d0\/AFR-in-OMSA", - "owner": { - "login": "und3sc0n0c1d0", - "id": 32236059, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4", - "html_url": "https:\/\/github.com\/und3sc0n0c1d0" - }, - "html_url": "https:\/\/github.com\/und3sc0n0c1d0\/AFR-in-OMSA", - "description": "Validation of Arbitrary File Read Vulnerabilities in Dell OpenManage Server Administrator (OMSA) - CVE-2016-4004, CVE-2021-21514 and CVE-2020-5377.", - "fork": false, - "created_at": "2022-11-30T22:34:58Z", - "updated_at": "2022-12-01T06:36:30Z", - "pushed_at": "2022-12-01T06:36:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-5752.json b/2020/CVE-2020-5752.json index baa331e638..89b00efe03 100644 --- a/2020/CVE-2020-5752.json +++ b/2020/CVE-2020-5752.json @@ -1,33 +1,4 @@ [ - { - "id": 430312335, - "name": "CVE-2020-5752-Druva-inSync-Windows-Client-6.6.3---Local-Privilege-Escalation-PowerShell-", - "full_name": "yevh\/CVE-2020-5752-Druva-inSync-Windows-Client-6.6.3---Local-Privilege-Escalation-PowerShell-", - "owner": { - "login": "yevh", - "id": 14802765, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14802765?v=4", - "html_url": "https:\/\/github.com\/yevh" - }, - "html_url": "https:\/\/github.com\/yevh\/CVE-2020-5752-Druva-inSync-Windows-Client-6.6.3---Local-Privilege-Escalation-PowerShell-", - "description": "Druva inSync Windows Client 6.6.3 - Local Privilege Escalation (PowerShell) RCE", - "fork": false, - "created_at": "2021-11-21T08:30:24Z", - "updated_at": "2022-12-03T11:45:49Z", - "pushed_at": "2022-12-03T11:45:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 581547913, "name": "CVE-2020-5752", diff --git a/2020/CVE-2020-7461.json b/2020/CVE-2020-7461.json deleted file mode 100644 index b8ab5b8c5a..0000000000 --- a/2020/CVE-2020-7461.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 572664898, - "name": "freebsd-dhclient-poc", - "full_name": "0xkol\/freebsd-dhclient-poc", - "owner": { - "login": "0xkol", - "id": 58270928, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58270928?v=4", - "html_url": "https:\/\/github.com\/0xkol" - }, - "html_url": "https:\/\/github.com\/0xkol\/freebsd-dhclient-poc", - "description": "Reproducer PoC for FreeBSD dhclient heap-based buffer overflow vulnerability when parsing DHCP option 119 (CVE-2020-7461)", - "fork": false, - "created_at": "2022-11-30T19:03:57Z", - "updated_at": "2022-11-30T19:04:41Z", - "pushed_at": "2022-11-30T19:04:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27626.json b/2021/CVE-2021-27626.json deleted file mode 100644 index a286f962db..0000000000 --- a/2021/CVE-2021-27626.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581705953, - "name": "CVE-2021-27626", - "full_name": "Live-Hack-CVE\/CVE-2021-27626", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27626", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27626 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:05Z", - "updated_at": "2022-12-24T02:42:05Z", - "pushed_at": "2022-12-24T02:42:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27627.json b/2021/CVE-2021-27627.json deleted file mode 100644 index 3773fe7ad7..0000000000 --- a/2021/CVE-2021-27627.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581705963, - "name": "CVE-2021-27627", - "full_name": "Live-Hack-CVE\/CVE-2021-27627", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27627", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27627 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:08Z", - "updated_at": "2022-12-24T02:42:08Z", - "pushed_at": "2022-12-24T02:42:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27628.json b/2021/CVE-2021-27628.json deleted file mode 100644 index 9cf765b196..0000000000 --- a/2021/CVE-2021-27628.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581705971, - "name": "CVE-2021-27628", - "full_name": "Live-Hack-CVE\/CVE-2021-27628", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27628", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27628 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:11Z", - "updated_at": "2022-12-24T02:42:11Z", - "pushed_at": "2022-12-24T02:42:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27629.json b/2021/CVE-2021-27629.json deleted file mode 100644 index 0b0e288a00..0000000000 --- a/2021/CVE-2021-27629.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581705979, - "name": "CVE-2021-27629", - "full_name": "Live-Hack-CVE\/CVE-2021-27629", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27629", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27629 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:14Z", - "updated_at": "2022-12-24T02:42:14Z", - "pushed_at": "2022-12-24T02:42:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27630.json b/2021/CVE-2021-27630.json deleted file mode 100644 index 3e90f38d5c..0000000000 --- a/2021/CVE-2021-27630.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581705990, - "name": "CVE-2021-27630", - "full_name": "Live-Hack-CVE\/CVE-2021-27630", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27630", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27630 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:18Z", - "updated_at": "2022-12-24T02:42:18Z", - "pushed_at": "2022-12-24T02:42:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27631.json b/2021/CVE-2021-27631.json deleted file mode 100644 index 8aa6fc41b9..0000000000 --- a/2021/CVE-2021-27631.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581705996, - "name": "CVE-2021-27631", - "full_name": "Live-Hack-CVE\/CVE-2021-27631", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27631", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27631 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:21Z", - "updated_at": "2022-12-24T02:42:21Z", - "pushed_at": "2022-12-24T02:42:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27632.json b/2021/CVE-2021-27632.json deleted file mode 100644 index 5cc474ee61..0000000000 --- a/2021/CVE-2021-27632.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581706008, - "name": "CVE-2021-27632", - "full_name": "Live-Hack-CVE\/CVE-2021-27632", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27632", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27632 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:24Z", - "updated_at": "2022-12-24T02:42:24Z", - "pushed_at": "2022-12-24T02:42:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27633.json b/2021/CVE-2021-27633.json deleted file mode 100644 index 51e946649f..0000000000 --- a/2021/CVE-2021-27633.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581706024, - "name": "CVE-2021-27633", - "full_name": "Live-Hack-CVE\/CVE-2021-27633", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27633", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27633 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:28Z", - "updated_at": "2022-12-24T02:42:28Z", - "pushed_at": "2022-12-24T02:42:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27634.json b/2021/CVE-2021-27634.json deleted file mode 100644 index 584f8bd164..0000000000 --- a/2021/CVE-2021-27634.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581706031, - "name": "CVE-2021-27634", - "full_name": "Live-Hack-CVE\/CVE-2021-27634", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27634", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27634 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T02:42:31Z", - "updated_at": "2022-12-24T02:42:31Z", - "pushed_at": "2022-12-24T02:42:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-27855.json b/2021/CVE-2021-27855.json deleted file mode 100644 index 2e8c8e5def..0000000000 --- a/2021/CVE-2021-27855.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581710557, - "name": "CVE-2021-27855", - "full_name": "Live-Hack-CVE\/CVE-2021-27855", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27855", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27855 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T03:14:47Z", - "updated_at": "2022-12-24T03:14:47Z", - "pushed_at": "2022-12-24T03:14:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 95b37b5e5b..a67fa1b45a 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -114,5 +114,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 581991750, + "name": "CVE-2021-29447", + "full_name": "Ki11i0n4ir3\/CVE-2021-29447", + "owner": { + "login": "Ki11i0n4ir3", + "id": 75846902, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4", + "html_url": "https:\/\/github.com\/Ki11i0n4ir3" + }, + "html_url": "https:\/\/github.com\/Ki11i0n4ir3\/CVE-2021-29447", + "description": null, + "fork": false, + "created_at": "2022-12-25T07:44:21Z", + "updated_at": "2022-12-25T07:59:06Z", + "pushed_at": "2022-12-25T08:47:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-32692.json b/2021/CVE-2021-32692.json new file mode 100644 index 0000000000..458be020c3 --- /dev/null +++ b/2021/CVE-2021-32692.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024963, + "name": "CVE-2021-32692", + "full_name": "Live-Hack-CVE\/CVE-2021-32692", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32692", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-32692 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:25Z", + "updated_at": "2022-12-25T11:01:25Z", + "pushed_at": "2022-12-25T11:01:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-33623.json b/2021/CVE-2021-33623.json new file mode 100644 index 0000000000..1483868593 --- /dev/null +++ b/2021/CVE-2021-33623.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024510, + "name": "CVE-2021-33623", + "full_name": "Live-Hack-CVE\/CVE-2021-33623", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-33623", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-33623 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:00Z", + "updated_at": "2022-12-25T10:59:00Z", + "pushed_at": "2022-12-25T10:59:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-33640.json b/2021/CVE-2021-33640.json new file mode 100644 index 0000000000..22fbfb4acd --- /dev/null +++ b/2021/CVE-2021-33640.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040418, + "name": "CVE-2021-33640", + "full_name": "Live-Hack-CVE\/CVE-2021-33640", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-33640", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-33640 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:35Z", + "updated_at": "2022-12-25T12:22:35Z", + "pushed_at": "2022-12-25T12:22:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36690.json b/2021/CVE-2021-36690.json deleted file mode 100644 index 61acff6e90..0000000000 --- a/2021/CVE-2021-36690.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581710524, - "name": "CVE-2021-36690", - "full_name": "Live-Hack-CVE\/CVE-2021-36690", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36690", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36690 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T03:14:26Z", - "updated_at": "2022-12-24T03:14:26Z", - "pushed_at": "2022-12-24T03:14:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1011.json b/2021/CVE-2021-3759.json similarity index 74% rename from 2022/CVE-2022-1011.json rename to 2021/CVE-2021-3759.json index c3df07e544..1782e901d5 100644 --- a/2022/CVE-2022-1011.json +++ b/2021/CVE-2021-3759.json @@ -1,20 +1,20 @@ [ { - "id": 581865059, - "name": "CVE-2022-1011", - "full_name": "Live-Hack-CVE\/CVE-2022-1011", + "id": 582040506, + "name": "CVE-2021-3759", + "full_name": "Live-Hack-CVE\/CVE-2021-3759", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1011", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1011 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3759", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3759 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:32:54Z", - "updated_at": "2022-12-24T16:32:54Z", - "pushed_at": "2022-12-24T16:32:56Z", + "created_at": "2022-12-25T12:22:57Z", + "updated_at": "2022-12-25T12:22:57Z", + "pushed_at": "2022-12-25T12:22:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 6762428ff5..f8567de2a8 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -1,4 +1,36 @@ [ + { + "id": 470778554, + "name": "CVE-2021-4034", + "full_name": "hifumi1337\/CVE-2021-4034", + "owner": { + "login": "hifumi1337", + "id": 56496067, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56496067?v=4", + "html_url": "https:\/\/github.com\/hifumi1337" + }, + "html_url": "https:\/\/github.com\/hifumi1337\/CVE-2021-4034", + "description": "Local Privilege Escalation (LPE) vulnerability found on Polkit's pkexec utility", + "fork": false, + "created_at": "2022-03-16T23:05:53Z", + "updated_at": "2022-03-16T23:20:31Z", + "pushed_at": "2022-12-25T11:50:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "cve-2021-4034" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, { "id": 581769434, "name": "CVE-2021-4034", diff --git a/2021/CVE-2021-4126.json b/2021/CVE-2021-4126.json new file mode 100644 index 0000000000..e3b4c265c1 --- /dev/null +++ b/2021/CVE-2021-4126.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038681, + "name": "CVE-2021-4126", + "full_name": "Live-Hack-CVE\/CVE-2021-4126", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4126", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4126 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:13Z", + "updated_at": "2022-12-25T12:14:13Z", + "pushed_at": "2022-12-25T12:14:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4127.json b/2021/CVE-2021-4127.json new file mode 100644 index 0000000000..54b9dabf8c --- /dev/null +++ b/2021/CVE-2021-4127.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038693, + "name": "CVE-2021-4127", + "full_name": "Live-Hack-CVE\/CVE-2021-4127", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4127", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4127 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:16Z", + "updated_at": "2022-12-25T12:14:16Z", + "pushed_at": "2022-12-25T12:14:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4128.json b/2021/CVE-2021-4128.json new file mode 100644 index 0000000000..0082f627f6 --- /dev/null +++ b/2021/CVE-2021-4128.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038632, + "name": "CVE-2021-4128", + "full_name": "Live-Hack-CVE\/CVE-2021-4128", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4128", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4128 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:57Z", + "updated_at": "2022-12-25T12:13:57Z", + "pushed_at": "2022-12-25T12:13:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4129.json b/2021/CVE-2021-4129.json new file mode 100644 index 0000000000..725c33d843 --- /dev/null +++ b/2021/CVE-2021-4129.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038707, + "name": "CVE-2021-4129", + "full_name": "Live-Hack-CVE\/CVE-2021-4129", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4129", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4129 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:20Z", + "updated_at": "2022-12-25T12:14:20Z", + "pushed_at": "2022-12-25T12:14:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4140.json b/2021/CVE-2021-4140.json new file mode 100644 index 0000000000..71610b36b4 --- /dev/null +++ b/2021/CVE-2021-4140.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038645, + "name": "CVE-2021-4140", + "full_name": "Live-Hack-CVE\/CVE-2021-4140", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4140", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4140 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:00Z", + "updated_at": "2022-12-25T12:14:00Z", + "pushed_at": "2022-12-25T12:14:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4221.json b/2021/CVE-2021-4221.json new file mode 100644 index 0000000000..d798ce3409 --- /dev/null +++ b/2021/CVE-2021-4221.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023595, + "name": "CVE-2021-4221", + "full_name": "Live-Hack-CVE\/CVE-2021-4221", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4221", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4221 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:53:48Z", + "updated_at": "2022-12-25T10:53:48Z", + "pushed_at": "2022-12-25T10:53:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4246.json b/2021/CVE-2021-4246.json new file mode 100644 index 0000000000..b730285b66 --- /dev/null +++ b/2021/CVE-2021-4246.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040535, + "name": "CVE-2021-4246", + "full_name": "Live-Hack-CVE\/CVE-2021-4246", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4246", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4246 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:07Z", + "updated_at": "2022-12-25T12:23:07Z", + "pushed_at": "2022-12-25T12:23:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4247.json b/2021/CVE-2021-4247.json new file mode 100644 index 0000000000..7bb5e410c5 --- /dev/null +++ b/2021/CVE-2021-4247.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040003, + "name": "CVE-2021-4247", + "full_name": "Live-Hack-CVE\/CVE-2021-4247", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4247", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4247 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:20:54Z", + "updated_at": "2022-12-25T12:20:54Z", + "pushed_at": "2022-12-25T12:20:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4248.json b/2021/CVE-2021-4248.json new file mode 100644 index 0000000000..44702f3dd8 --- /dev/null +++ b/2021/CVE-2021-4248.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040341, + "name": "CVE-2021-4248", + "full_name": "Live-Hack-CVE\/CVE-2021-4248", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4248", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4248 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:15Z", + "updated_at": "2022-12-25T12:22:16Z", + "pushed_at": "2022-12-25T12:22:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33978.json b/2021/CVE-2021-46784.json similarity index 76% rename from 2022/CVE-2022-33978.json rename to 2021/CVE-2021-46784.json index 52c7df1925..4e142e3b05 100644 --- a/2022/CVE-2022-33978.json +++ b/2021/CVE-2021-46784.json @@ -1,20 +1,20 @@ [ { - "id": 581847980, - "name": "CVE-2022-33978", - "full_name": "Live-Hack-CVE\/CVE-2022-33978", + "id": 582024750, + "name": "CVE-2021-46784", + "full_name": "Live-Hack-CVE\/CVE-2021-46784", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33978", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33978 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-46784", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-46784 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:13:40Z", - "updated_at": "2022-12-24T15:13:40Z", - "pushed_at": "2022-12-24T15:13:42Z", + "created_at": "2022-12-25T11:00:20Z", + "updated_at": "2022-12-25T11:00:20Z", + "pushed_at": "2022-12-25T11:00:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-0511.json b/2022/CVE-2022-0511.json new file mode 100644 index 0000000000..4f632bc4e1 --- /dev/null +++ b/2022/CVE-2022-0511.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038714, + "name": "CVE-2022-0511", + "full_name": "Live-Hack-CVE\/CVE-2022-0511", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0511", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0511 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:23Z", + "updated_at": "2022-12-25T12:14:23Z", + "pushed_at": "2022-12-25T12:14:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0517.json b/2022/CVE-2022-0517.json new file mode 100644 index 0000000000..dc584b1e53 --- /dev/null +++ b/2022/CVE-2022-0517.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031518, + "name": "CVE-2022-0517", + "full_name": "Live-Hack-CVE\/CVE-2022-0517", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0517", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0517 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:45Z", + "updated_at": "2022-12-25T11:36:45Z", + "pushed_at": "2022-12-25T11:36:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0566.json b/2022/CVE-2022-0566.json new file mode 100644 index 0000000000..ce09a129fa --- /dev/null +++ b/2022/CVE-2022-0566.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038724, + "name": "CVE-2022-0566", + "full_name": "Live-Hack-CVE\/CVE-2022-0566", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0566", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0566 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:26Z", + "updated_at": "2022-12-25T12:14:26Z", + "pushed_at": "2022-12-25T12:14:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0843.json b/2022/CVE-2022-0843.json new file mode 100644 index 0000000000..4df1a24854 --- /dev/null +++ b/2022/CVE-2022-0843.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031535, + "name": "CVE-2022-0843", + "full_name": "Live-Hack-CVE\/CVE-2022-0843", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0843", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0843 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:49Z", + "updated_at": "2022-12-25T11:36:49Z", + "pushed_at": "2022-12-25T11:36:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index e034b5ef3b..9ba89fc7eb 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1567,19 +1567,19 @@ "description": "Exploit for Dirty-Pipe (CVE-2022-0847) ", "fork": false, "created_at": "2022-03-31T11:47:31Z", - "updated_at": "2022-11-09T18:15:38Z", + "updated_at": "2022-12-25T08:19:06Z", "pushed_at": "2022-03-31T13:04:01Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 6, + "forks": 5, + "watchers": 7, "score": 0 }, { diff --git a/2022/CVE-2022-1097.json b/2022/CVE-2022-1097.json new file mode 100644 index 0000000000..93eec1666f --- /dev/null +++ b/2022/CVE-2022-1097.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038741, + "name": "CVE-2022-1097", + "full_name": "Live-Hack-CVE\/CVE-2022-1097", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1097", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1097 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:30Z", + "updated_at": "2022-12-25T12:14:30Z", + "pushed_at": "2022-12-25T12:14:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1196.json b/2022/CVE-2022-1196.json new file mode 100644 index 0000000000..84ec6d2348 --- /dev/null +++ b/2022/CVE-2022-1196.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038655, + "name": "CVE-2022-1196", + "full_name": "Live-Hack-CVE\/CVE-2022-1196", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1196", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1196 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:03Z", + "updated_at": "2022-12-25T12:14:04Z", + "pushed_at": "2022-12-25T12:14:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1197.json b/2022/CVE-2022-1197.json new file mode 100644 index 0000000000..944c62b13c --- /dev/null +++ b/2022/CVE-2022-1197.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038753, + "name": "CVE-2022-1197", + "full_name": "Live-Hack-CVE\/CVE-2022-1197", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1197", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1197 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:33Z", + "updated_at": "2022-12-25T12:14:33Z", + "pushed_at": "2022-12-25T12:14:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1520.json b/2022/CVE-2022-1520.json new file mode 100644 index 0000000000..63e32d6e3d --- /dev/null +++ b/2022/CVE-2022-1520.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038764, + "name": "CVE-2022-1520", + "full_name": "Live-Hack-CVE\/CVE-2022-1520", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1520", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1520 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:36Z", + "updated_at": "2022-12-25T12:14:36Z", + "pushed_at": "2022-12-25T12:14:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1529.json b/2022/CVE-2022-1529.json new file mode 100644 index 0000000000..423f9d876a --- /dev/null +++ b/2022/CVE-2022-1529.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031558, + "name": "CVE-2022-1529", + "full_name": "Live-Hack-CVE\/CVE-2022-1529", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1529", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1529 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:55Z", + "updated_at": "2022-12-25T11:36:55Z", + "pushed_at": "2022-12-25T11:36:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1560.json b/2022/CVE-2022-1560.json deleted file mode 100644 index 62446c75cc..0000000000 --- a/2022/CVE-2022-1560.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581846520, - "name": "CVE-2022-1560", - "full_name": "Live-Hack-CVE\/CVE-2022-1560", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1560", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1560 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:07:23Z", - "updated_at": "2022-12-24T15:07:23Z", - "pushed_at": "2022-12-24T15:07:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1701.json b/2022/CVE-2022-1701.json deleted file mode 100644 index 2a6424d99b..0000000000 --- a/2022/CVE-2022-1701.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581846969, - "name": "CVE-2022-1701", - "full_name": "Live-Hack-CVE\/CVE-2022-1701", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1701", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1701 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:09:20Z", - "updated_at": "2022-12-24T15:09:20Z", - "pushed_at": "2022-12-24T15:09:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1702.json b/2022/CVE-2022-1702.json deleted file mode 100644 index 6e3baf28a6..0000000000 --- a/2022/CVE-2022-1702.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581846983, - "name": "CVE-2022-1702", - "full_name": "Live-Hack-CVE\/CVE-2022-1702", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1702", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1702 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:09:24Z", - "updated_at": "2022-12-24T15:09:24Z", - "pushed_at": "2022-12-24T15:09:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1706.json b/2022/CVE-2022-1706.json deleted file mode 100644 index cc0c907832..0000000000 --- a/2022/CVE-2022-1706.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865627, - "name": "CVE-2022-1706", - "full_name": "Live-Hack-CVE\/CVE-2022-1706", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1706", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1706 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:40Z", - "updated_at": "2022-12-24T16:35:40Z", - "pushed_at": "2022-12-24T16:35:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1734.json b/2022/CVE-2022-1734.json deleted file mode 100644 index 2ddb644799..0000000000 --- a/2022/CVE-2022-1734.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838441, - "name": "CVE-2022-1734", - "full_name": "Live-Hack-CVE\/CVE-2022-1734", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1734", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1734 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:31:15Z", - "updated_at": "2022-12-24T14:31:15Z", - "pushed_at": "2022-12-24T14:31:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1802.json b/2022/CVE-2022-1802.json new file mode 100644 index 0000000000..d612635d2e --- /dev/null +++ b/2022/CVE-2022-1802.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038773, + "name": "CVE-2022-1802", + "full_name": "Live-Hack-CVE\/CVE-2022-1802", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1802", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1802 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:39Z", + "updated_at": "2022-12-25T12:14:39Z", + "pushed_at": "2022-12-25T12:14:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42039.json b/2022/CVE-2022-1834.json similarity index 77% rename from 2022/CVE-2022-42039.json rename to 2022/CVE-2022-1834.json index af0208b8f6..12520b2e52 100644 --- a/2022/CVE-2022-42039.json +++ b/2022/CVE-2022-1834.json @@ -1,20 +1,20 @@ [ { - "id": 581855481, - "name": "CVE-2022-42039", - "full_name": "Live-Hack-CVE\/CVE-2022-42039", + "id": 582031573, + "name": "CVE-2022-1834", + "full_name": "Live-Hack-CVE\/CVE-2022-1834", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42039", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42039 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1834", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1834 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:48:52Z", - "updated_at": "2022-12-24T15:48:52Z", - "pushed_at": "2022-12-24T15:48:54Z", + "created_at": "2022-12-25T11:36:58Z", + "updated_at": "2022-12-25T11:36:58Z", + "pushed_at": "2022-12-25T11:37:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-1886.json b/2022/CVE-2022-1886.json deleted file mode 100644 index fe52f8a617..0000000000 --- a/2022/CVE-2022-1886.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838456, - "name": "CVE-2022-1886", - "full_name": "Live-Hack-CVE\/CVE-2022-1886", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1886", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1886 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:31:19Z", - "updated_at": "2022-12-24T14:31:19Z", - "pushed_at": "2022-12-24T14:31:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1887.json b/2022/CVE-2022-1887.json new file mode 100644 index 0000000000..fc6a1a09ec --- /dev/null +++ b/2022/CVE-2022-1887.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023602, + "name": "CVE-2022-1887", + "full_name": "Live-Hack-CVE\/CVE-2022-1887", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1887", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1887 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:53:52Z", + "updated_at": "2022-12-25T10:53:52Z", + "pushed_at": "2022-12-25T10:53:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20351.json b/2022/CVE-2022-20351.json deleted file mode 100644 index 5fb29d2d78..0000000000 --- a/2022/CVE-2022-20351.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856923, - "name": "CVE-2022-20351", - "full_name": "Live-Hack-CVE\/CVE-2022-20351", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20351", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20351 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:55:00Z", - "updated_at": "2022-12-24T15:55:00Z", - "pushed_at": "2022-12-24T15:55:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37979.json b/2022/CVE-2022-20369.json similarity index 76% rename from 2022/CVE-2022-37979.json rename to 2022/CVE-2022-20369.json index 75fe58d6f6..8523275170 100644 --- a/2022/CVE-2022-37979.json +++ b/2022/CVE-2022-20369.json @@ -1,20 +1,20 @@ [ { - "id": 581848491, - "name": "CVE-2022-37979", - "full_name": "Live-Hack-CVE\/CVE-2022-37979", + "id": 582023877, + "name": "CVE-2022-20369", + "full_name": "Live-Hack-CVE\/CVE-2022-20369", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37979", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37979 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20369", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20369 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:15:55Z", - "updated_at": "2022-12-24T15:15:56Z", - "pushed_at": "2022-12-24T15:15:58Z", + "created_at": "2022-12-25T10:55:29Z", + "updated_at": "2022-12-25T10:55:29Z", + "pushed_at": "2022-12-25T10:55:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-20394.json b/2022/CVE-2022-20394.json deleted file mode 100644 index 7d62553336..0000000000 --- a/2022/CVE-2022-20394.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855225, - "name": "CVE-2022-20394", - "full_name": "Live-Hack-CVE\/CVE-2022-20394", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20394", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20394 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:38Z", - "updated_at": "2022-12-24T15:47:38Z", - "pushed_at": "2022-12-24T15:47:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20410.json b/2022/CVE-2022-20410.json deleted file mode 100644 index dc33258f61..0000000000 --- a/2022/CVE-2022-20410.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855211, - "name": "CVE-2022-20410", - "full_name": "Live-Hack-CVE\/CVE-2022-20410", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20410", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20410 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:35Z", - "updated_at": "2022-12-24T15:47:35Z", - "pushed_at": "2022-12-24T15:47:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20412.json b/2022/CVE-2022-20412.json deleted file mode 100644 index 3570e97f89..0000000000 --- a/2022/CVE-2022-20412.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855173, - "name": "CVE-2022-20412", - "full_name": "Live-Hack-CVE\/CVE-2022-20412", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20412", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20412 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:27Z", - "updated_at": "2022-12-24T15:47:27Z", - "pushed_at": "2022-12-24T15:47:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20413.json b/2022/CVE-2022-20413.json deleted file mode 100644 index 3dc4c1f046..0000000000 --- a/2022/CVE-2022-20413.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855142, - "name": "CVE-2022-20413", - "full_name": "Live-Hack-CVE\/CVE-2022-20413", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20413", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20413 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:16Z", - "updated_at": "2022-12-24T15:47:16Z", - "pushed_at": "2022-12-24T15:47:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20416.json b/2022/CVE-2022-20416.json deleted file mode 100644 index ea2f08848e..0000000000 --- a/2022/CVE-2022-20416.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855187, - "name": "CVE-2022-20416", - "full_name": "Live-Hack-CVE\/CVE-2022-20416", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20416", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20416 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:30Z", - "updated_at": "2022-12-24T15:47:30Z", - "pushed_at": "2022-12-24T15:47:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20417.json b/2022/CVE-2022-20417.json deleted file mode 100644 index 4156af2b99..0000000000 --- a/2022/CVE-2022-20417.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855160, - "name": "CVE-2022-20417", - "full_name": "Live-Hack-CVE\/CVE-2022-20417", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20417", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20417 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:24Z", - "updated_at": "2022-12-24T15:47:24Z", - "pushed_at": "2022-12-24T15:47:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20418.json b/2022/CVE-2022-20418.json deleted file mode 100644 index d37e84ccab..0000000000 --- a/2022/CVE-2022-20418.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855131, - "name": "CVE-2022-20418", - "full_name": "Live-Hack-CVE\/CVE-2022-20418", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20418", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20418 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:13Z", - "updated_at": "2022-12-24T15:47:13Z", - "pushed_at": "2022-12-24T15:47:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20419.json b/2022/CVE-2022-20419.json deleted file mode 100644 index 23a5c8adc8..0000000000 --- a/2022/CVE-2022-20419.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855107, - "name": "CVE-2022-20419", - "full_name": "Live-Hack-CVE\/CVE-2022-20419", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20419", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20419 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:07Z", - "updated_at": "2022-12-24T15:47:07Z", - "pushed_at": "2022-12-24T15:47:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20420.json b/2022/CVE-2022-20420.json deleted file mode 100644 index 5a4e284796..0000000000 --- a/2022/CVE-2022-20420.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855124, - "name": "CVE-2022-20420", - "full_name": "Live-Hack-CVE\/CVE-2022-20420", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20420", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20420 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:10Z", - "updated_at": "2022-12-24T15:47:10Z", - "pushed_at": "2022-12-24T15:47:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20423.json b/2022/CVE-2022-20423.json deleted file mode 100644 index fd75d3a451..0000000000 --- a/2022/CVE-2022-20423.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855096, - "name": "CVE-2022-20423", - "full_name": "Live-Hack-CVE\/CVE-2022-20423", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20423", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20423 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:03Z", - "updated_at": "2022-12-24T15:47:03Z", - "pushed_at": "2022-12-24T15:47:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20425.json b/2022/CVE-2022-20425.json deleted file mode 100644 index e79a28db19..0000000000 --- a/2022/CVE-2022-20425.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855074, - "name": "CVE-2022-20425", - "full_name": "Live-Hack-CVE\/CVE-2022-20425", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20425", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20425 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:46:57Z", - "updated_at": "2022-12-24T15:46:57Z", - "pushed_at": "2022-12-24T15:46:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20429.json b/2022/CVE-2022-20429.json deleted file mode 100644 index 010ed3188a..0000000000 --- a/2022/CVE-2022-20429.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855083, - "name": "CVE-2022-20429", - "full_name": "Live-Hack-CVE\/CVE-2022-20429", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20429", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20429 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:47:00Z", - "updated_at": "2022-12-24T15:47:00Z", - "pushed_at": "2022-12-24T15:47:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20430.json b/2022/CVE-2022-20430.json deleted file mode 100644 index 131d41f7ba..0000000000 --- a/2022/CVE-2022-20430.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855489, - "name": "CVE-2022-20430", - "full_name": "Live-Hack-CVE\/CVE-2022-20430", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20430", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20430 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:55Z", - "updated_at": "2022-12-24T15:48:55Z", - "pushed_at": "2022-12-24T15:48:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20431.json b/2022/CVE-2022-20431.json deleted file mode 100644 index ecf0e17a9a..0000000000 --- a/2022/CVE-2022-20431.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855697, - "name": "CVE-2022-20431", - "full_name": "Live-Hack-CVE\/CVE-2022-20431", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20431", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20431 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:44Z", - "updated_at": "2022-12-24T15:49:44Z", - "pushed_at": "2022-12-24T15:49:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20433.json b/2022/CVE-2022-20433.json deleted file mode 100644 index 6285deffeb..0000000000 --- a/2022/CVE-2022-20433.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855593, - "name": "CVE-2022-20433", - "full_name": "Live-Hack-CVE\/CVE-2022-20433", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20433", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20433 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:18Z", - "updated_at": "2022-12-24T15:49:18Z", - "pushed_at": "2022-12-24T15:49:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20434.json b/2022/CVE-2022-20434.json deleted file mode 100644 index 5a5a18d8da..0000000000 --- a/2022/CVE-2022-20434.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855681, - "name": "CVE-2022-20434", - "full_name": "Live-Hack-CVE\/CVE-2022-20434", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20434", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20434 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:41Z", - "updated_at": "2022-12-24T15:49:41Z", - "pushed_at": "2022-12-24T15:49:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20435.json b/2022/CVE-2022-20435.json deleted file mode 100644 index ad9c6569b5..0000000000 --- a/2022/CVE-2022-20435.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855502, - "name": "CVE-2022-20435", - "full_name": "Live-Hack-CVE\/CVE-2022-20435", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20435", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20435 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:58Z", - "updated_at": "2022-12-24T15:48:58Z", - "pushed_at": "2022-12-24T15:49:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20436.json b/2022/CVE-2022-20436.json deleted file mode 100644 index 7a498e3b3a..0000000000 --- a/2022/CVE-2022-20436.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848475, - "name": "CVE-2022-20436", - "full_name": "Live-Hack-CVE\/CVE-2022-20436", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20436", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20436 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:52Z", - "updated_at": "2022-12-24T15:15:52Z", - "pushed_at": "2022-12-24T15:15:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20437.json b/2022/CVE-2022-20437.json deleted file mode 100644 index 4a4cced001..0000000000 --- a/2022/CVE-2022-20437.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848462, - "name": "CVE-2022-20437", - "full_name": "Live-Hack-CVE\/CVE-2022-20437", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20437", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20437 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:49Z", - "updated_at": "2022-12-24T15:15:49Z", - "pushed_at": "2022-12-24T15:15:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20438.json b/2022/CVE-2022-20438.json deleted file mode 100644 index 6ff1f65e4b..0000000000 --- a/2022/CVE-2022-20438.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855525, - "name": "CVE-2022-20438", - "full_name": "Live-Hack-CVE\/CVE-2022-20438", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20438", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20438 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:05Z", - "updated_at": "2022-12-24T15:49:05Z", - "pushed_at": "2022-12-24T15:49:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20439.json b/2022/CVE-2022-20439.json deleted file mode 100644 index 56dd283cf0..0000000000 --- a/2022/CVE-2022-20439.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855667, - "name": "CVE-2022-20439", - "full_name": "Live-Hack-CVE\/CVE-2022-20439", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20439", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20439 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:37Z", - "updated_at": "2022-12-24T15:49:37Z", - "pushed_at": "2022-12-24T15:49:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20440.json b/2022/CVE-2022-20440.json deleted file mode 100644 index b715bc2efd..0000000000 --- a/2022/CVE-2022-20440.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856742, - "name": "CVE-2022-20440", - "full_name": "Live-Hack-CVE\/CVE-2022-20440", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20440", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20440 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:54:13Z", - "updated_at": "2022-12-24T15:54:13Z", - "pushed_at": "2022-12-24T15:54:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20864.json b/2022/CVE-2022-20864.json deleted file mode 100644 index 5929904b48..0000000000 --- a/2022/CVE-2022-20864.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847374, - "name": "CVE-2022-20864", - "full_name": "Live-Hack-CVE\/CVE-2022-20864", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20864", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20864 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:11:05Z", - "updated_at": "2022-12-24T15:11:06Z", - "pushed_at": "2022-12-24T15:11:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20870.json b/2022/CVE-2022-20870.json deleted file mode 100644 index fa980f3901..0000000000 --- a/2022/CVE-2022-20870.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847177, - "name": "CVE-2022-20870", - "full_name": "Live-Hack-CVE\/CVE-2022-20870", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20870", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20870 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:11Z", - "updated_at": "2022-12-24T15:10:11Z", - "pushed_at": "2022-12-24T15:10:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20915.json b/2022/CVE-2022-20915.json deleted file mode 100644 index e7139b5abf..0000000000 --- a/2022/CVE-2022-20915.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847232, - "name": "CVE-2022-20915", - "full_name": "Live-Hack-CVE\/CVE-2022-20915", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20915", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20915 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:27Z", - "updated_at": "2022-12-24T15:10:27Z", - "pushed_at": "2022-12-24T15:10:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20920.json b/2022/CVE-2022-20920.json deleted file mode 100644 index afe42d92f2..0000000000 --- a/2022/CVE-2022-20920.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847245, - "name": "CVE-2022-20920", - "full_name": "Live-Hack-CVE\/CVE-2022-20920", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20920", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20920 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:30Z", - "updated_at": "2022-12-24T15:10:30Z", - "pushed_at": "2022-12-24T15:10:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20944.json b/2022/CVE-2022-20944.json deleted file mode 100644 index 82ca64bc8e..0000000000 --- a/2022/CVE-2022-20944.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847300, - "name": "CVE-2022-20944", - "full_name": "Live-Hack-CVE\/CVE-2022-20944", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20944", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20944 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:46Z", - "updated_at": "2022-12-24T15:10:46Z", - "pushed_at": "2022-12-24T15:10:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2200.json b/2022/CVE-2022-2200.json new file mode 100644 index 0000000000..8cc1eeeb11 --- /dev/null +++ b/2022/CVE-2022-2200.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032175, + "name": "CVE-2022-2200", + "full_name": "Live-Hack-CVE\/CVE-2022-2200", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2200", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2200 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:03Z", + "updated_at": "2022-12-25T11:40:03Z", + "pushed_at": "2022-12-25T11:40:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22184.json b/2022/CVE-2022-22184.json new file mode 100644 index 0000000000..fa35494442 --- /dev/null +++ b/2022/CVE-2022-22184.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030591, + "name": "CVE-2022-22184", + "full_name": "Live-Hack-CVE\/CVE-2022-22184", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22184", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22184 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:11Z", + "updated_at": "2022-12-25T11:32:11Z", + "pushed_at": "2022-12-25T11:32:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2226.json b/2022/CVE-2022-2226.json new file mode 100644 index 0000000000..7f25078b5d --- /dev/null +++ b/2022/CVE-2022-2226.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031363, + "name": "CVE-2022-2226", + "full_name": "Live-Hack-CVE\/CVE-2022-2226", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2226", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2226 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:04Z", + "updated_at": "2022-12-25T11:36:04Z", + "pushed_at": "2022-12-25T11:36:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22449.json b/2022/CVE-2022-22449.json new file mode 100644 index 0000000000..b059180db5 --- /dev/null +++ b/2022/CVE-2022-22449.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023272, + "name": "CVE-2022-22449", + "full_name": "Live-Hack-CVE\/CVE-2022-22449", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22449", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22449 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:07Z", + "updated_at": "2022-12-25T10:52:07Z", + "pushed_at": "2022-12-25T10:52:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22456.json b/2022/CVE-2022-22456.json new file mode 100644 index 0000000000..b8f43d29c4 --- /dev/null +++ b/2022/CVE-2022-22456.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030610, + "name": "CVE-2022-22456", + "full_name": "Live-Hack-CVE\/CVE-2022-22456", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22456", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22456 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:17Z", + "updated_at": "2022-12-25T11:32:17Z", + "pushed_at": "2022-12-25T11:32:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22457.json b/2022/CVE-2022-22457.json new file mode 100644 index 0000000000..7b2c5c0706 --- /dev/null +++ b/2022/CVE-2022-22457.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030632, + "name": "CVE-2022-22457", + "full_name": "Live-Hack-CVE\/CVE-2022-22457", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22457", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22457 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:24Z", + "updated_at": "2022-12-25T11:32:24Z", + "pushed_at": "2022-12-25T11:32:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22458.json b/2022/CVE-2022-22458.json new file mode 100644 index 0000000000..e0ae99716c --- /dev/null +++ b/2022/CVE-2022-22458.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030658, + "name": "CVE-2022-22458", + "full_name": "Live-Hack-CVE\/CVE-2022-22458", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22458", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22458 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:30Z", + "updated_at": "2022-12-25T11:32:30Z", + "pushed_at": "2022-12-25T11:32:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22461.json b/2022/CVE-2022-22461.json new file mode 100644 index 0000000000..2f75eda898 --- /dev/null +++ b/2022/CVE-2022-22461.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038836, + "name": "CVE-2022-22461", + "full_name": "Live-Hack-CVE\/CVE-2022-22461", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22461", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22461 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:00Z", + "updated_at": "2022-12-25T12:15:00Z", + "pushed_at": "2022-12-25T12:15:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2249.json b/2022/CVE-2022-2249.json deleted file mode 100644 index a101e5b1f3..0000000000 --- a/2022/CVE-2022-2249.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829804, - "name": "CVE-2022-2249", - "full_name": "Live-Hack-CVE\/CVE-2022-2249", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2249", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2249 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:03Z", - "updated_at": "2022-12-24T13:53:03Z", - "pushed_at": "2022-12-24T13:53:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-22736.json b/2022/CVE-2022-22736.json new file mode 100644 index 0000000000..fb1e21c47f --- /dev/null +++ b/2022/CVE-2022-22736.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031626, + "name": "CVE-2022-22736", + "full_name": "Live-Hack-CVE\/CVE-2022-22736", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22736", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22736 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:13Z", + "updated_at": "2022-12-25T11:37:13Z", + "pushed_at": "2022-12-25T11:37:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22737.json b/2022/CVE-2022-22737.json new file mode 100644 index 0000000000..b1165eeef6 --- /dev/null +++ b/2022/CVE-2022-22737.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038844, + "name": "CVE-2022-22737", + "full_name": "Live-Hack-CVE\/CVE-2022-22737", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22737", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22737 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:03Z", + "updated_at": "2022-12-25T12:15:03Z", + "pushed_at": "2022-12-25T12:15:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22738.json b/2022/CVE-2022-22738.json new file mode 100644 index 0000000000..ddae293753 --- /dev/null +++ b/2022/CVE-2022-22738.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038857, + "name": "CVE-2022-22738", + "full_name": "Live-Hack-CVE\/CVE-2022-22738", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22738", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22738 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:07Z", + "updated_at": "2022-12-25T12:15:07Z", + "pushed_at": "2022-12-25T12:15:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39300.json b/2022/CVE-2022-22739.json similarity index 78% rename from 2022/CVE-2022-39300.json rename to 2022/CVE-2022-22739.json index e472d4c7bf..9b24a94693 100644 --- a/2022/CVE-2022-39300.json +++ b/2022/CVE-2022-22739.json @@ -1,20 +1,20 @@ [ { - "id": 581838370, - "name": "CVE-2022-39300", - "full_name": "Live-Hack-CVE\/CVE-2022-39300", + "id": 582031643, + "name": "CVE-2022-22739", + "full_name": "Live-Hack-CVE\/CVE-2022-22739", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39300", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39300 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22739", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22739 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:30:52Z", - "updated_at": "2022-12-24T14:30:52Z", - "pushed_at": "2022-12-24T14:30:54Z", + "created_at": "2022-12-25T11:37:20Z", + "updated_at": "2022-12-25T11:37:20Z", + "pushed_at": "2022-12-25T11:37:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-22740.json b/2022/CVE-2022-22740.json new file mode 100644 index 0000000000..b49cd7f05f --- /dev/null +++ b/2022/CVE-2022-22740.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038868, + "name": "CVE-2022-22740", + "full_name": "Live-Hack-CVE\/CVE-2022-22740", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22740", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22740 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:10Z", + "updated_at": "2022-12-25T12:15:10Z", + "pushed_at": "2022-12-25T12:15:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22741.json b/2022/CVE-2022-22741.json new file mode 100644 index 0000000000..e19f35d88e --- /dev/null +++ b/2022/CVE-2022-22741.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031664, + "name": "CVE-2022-22741", + "full_name": "Live-Hack-CVE\/CVE-2022-22741", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22741", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22741 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:26Z", + "updated_at": "2022-12-25T11:37:26Z", + "pushed_at": "2022-12-25T11:37:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22742.json b/2022/CVE-2022-22742.json new file mode 100644 index 0000000000..69249deaa0 --- /dev/null +++ b/2022/CVE-2022-22742.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038880, + "name": "CVE-2022-22742", + "full_name": "Live-Hack-CVE\/CVE-2022-22742", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22742", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22742 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:13Z", + "updated_at": "2022-12-25T12:15:13Z", + "pushed_at": "2022-12-25T12:15:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22743.json b/2022/CVE-2022-22743.json new file mode 100644 index 0000000000..1e6dc41911 --- /dev/null +++ b/2022/CVE-2022-22743.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038892, + "name": "CVE-2022-22743", + "full_name": "Live-Hack-CVE\/CVE-2022-22743", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22743", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22743 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:17Z", + "updated_at": "2022-12-25T12:15:17Z", + "pushed_at": "2022-12-25T12:15:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22744.json b/2022/CVE-2022-22744.json new file mode 100644 index 0000000000..7757ff750b --- /dev/null +++ b/2022/CVE-2022-22744.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031675, + "name": "CVE-2022-22744", + "full_name": "Live-Hack-CVE\/CVE-2022-22744", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22744", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22744 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:30Z", + "updated_at": "2022-12-25T11:37:30Z", + "pushed_at": "2022-12-25T11:37:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22745.json b/2022/CVE-2022-22745.json new file mode 100644 index 0000000000..aa224b4d38 --- /dev/null +++ b/2022/CVE-2022-22745.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038908, + "name": "CVE-2022-22745", + "full_name": "Live-Hack-CVE\/CVE-2022-22745", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22745", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22745 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:20Z", + "updated_at": "2022-12-25T12:15:20Z", + "pushed_at": "2022-12-25T12:15:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41083.json b/2022/CVE-2022-22746.json similarity index 78% rename from 2022/CVE-2022-41083.json rename to 2022/CVE-2022-22746.json index 4ae20d7f94..9362d65a06 100644 --- a/2022/CVE-2022-41083.json +++ b/2022/CVE-2022-22746.json @@ -1,20 +1,20 @@ [ { - "id": 581857325, - "name": "CVE-2022-41083", - "full_name": "Live-Hack-CVE\/CVE-2022-41083", + "id": 582031696, + "name": "CVE-2022-22746", + "full_name": "Live-Hack-CVE\/CVE-2022-22746", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41083", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41083 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22746", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22746 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:56:47Z", - "updated_at": "2022-12-24T15:56:47Z", - "pushed_at": "2022-12-24T15:56:49Z", + "created_at": "2022-12-25T11:37:36Z", + "updated_at": "2022-12-25T11:37:36Z", + "pushed_at": "2022-12-25T11:37:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-23634.json b/2022/CVE-2022-22747.json similarity index 77% rename from 2022/CVE-2022-23634.json rename to 2022/CVE-2022-22747.json index 40d3f9dd63..ce841f7301 100644 --- a/2022/CVE-2022-23634.json +++ b/2022/CVE-2022-22747.json @@ -1,20 +1,20 @@ [ { - "id": 581865066, - "name": "CVE-2022-23634", - "full_name": "Live-Hack-CVE\/CVE-2022-23634", + "id": 582038919, + "name": "CVE-2022-22747", + "full_name": "Live-Hack-CVE\/CVE-2022-22747", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23634", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23634 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22747", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22747 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:32:57Z", - "updated_at": "2022-12-24T16:32:57Z", - "pushed_at": "2022-12-24T16:32:59Z", + "created_at": "2022-12-25T12:15:23Z", + "updated_at": "2022-12-25T12:15:23Z", + "pushed_at": "2022-12-25T12:15:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-22748.json b/2022/CVE-2022-22748.json new file mode 100644 index 0000000000..efa5dd0bee --- /dev/null +++ b/2022/CVE-2022-22748.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038926, + "name": "CVE-2022-22748", + "full_name": "Live-Hack-CVE\/CVE-2022-22748", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22748", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22748 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:27Z", + "updated_at": "2022-12-25T12:15:27Z", + "pushed_at": "2022-12-25T12:15:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22749.json b/2022/CVE-2022-22749.json new file mode 100644 index 0000000000..9acb0d80dd --- /dev/null +++ b/2022/CVE-2022-22749.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031729, + "name": "CVE-2022-22749", + "full_name": "Live-Hack-CVE\/CVE-2022-22749", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22749", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22749 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:48Z", + "updated_at": "2022-12-25T11:37:48Z", + "pushed_at": "2022-12-25T11:37:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22750.json b/2022/CVE-2022-22750.json new file mode 100644 index 0000000000..ee16f51acb --- /dev/null +++ b/2022/CVE-2022-22750.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031743, + "name": "CVE-2022-22750", + "full_name": "Live-Hack-CVE\/CVE-2022-22750", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22750", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22750 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:51Z", + "updated_at": "2022-12-25T11:37:52Z", + "pushed_at": "2022-12-25T11:37:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22751.json b/2022/CVE-2022-22751.json new file mode 100644 index 0000000000..d895bb295d --- /dev/null +++ b/2022/CVE-2022-22751.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038942, + "name": "CVE-2022-22751", + "full_name": "Live-Hack-CVE\/CVE-2022-22751", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22751", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22751 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:30Z", + "updated_at": "2022-12-25T12:15:30Z", + "pushed_at": "2022-12-25T12:15:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22752.json b/2022/CVE-2022-22752.json new file mode 100644 index 0000000000..2c3efb6645 --- /dev/null +++ b/2022/CVE-2022-22752.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038951, + "name": "CVE-2022-22752", + "full_name": "Live-Hack-CVE\/CVE-2022-22752", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22752", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22752 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:33Z", + "updated_at": "2022-12-25T12:15:33Z", + "pushed_at": "2022-12-25T12:15:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22753.json b/2022/CVE-2022-22753.json new file mode 100644 index 0000000000..92fdb0b795 --- /dev/null +++ b/2022/CVE-2022-22753.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031763, + "name": "CVE-2022-22753", + "full_name": "Live-Hack-CVE\/CVE-2022-22753", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22753", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22753 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:58Z", + "updated_at": "2022-12-25T11:37:58Z", + "pushed_at": "2022-12-25T11:38:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22754.json b/2022/CVE-2022-22754.json new file mode 100644 index 0000000000..d125a4ca4d --- /dev/null +++ b/2022/CVE-2022-22754.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038964, + "name": "CVE-2022-22754", + "full_name": "Live-Hack-CVE\/CVE-2022-22754", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22754", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22754 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:36Z", + "updated_at": "2022-12-25T12:15:36Z", + "pushed_at": "2022-12-25T12:15:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41190.json b/2022/CVE-2022-22755.json similarity index 77% rename from 2022/CVE-2022-41190.json rename to 2022/CVE-2022-22755.json index c0d73707ca..f6c1e3d45a 100644 --- a/2022/CVE-2022-41190.json +++ b/2022/CVE-2022-22755.json @@ -1,20 +1,20 @@ [ { - "id": 581855782, - "name": "CVE-2022-41190", - "full_name": "Live-Hack-CVE\/CVE-2022-41190", + "id": 582031776, + "name": "CVE-2022-22755", + "full_name": "Live-Hack-CVE\/CVE-2022-22755", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41190", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41190 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22755", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22755 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:50:04Z", - "updated_at": "2022-12-24T15:50:04Z", - "pushed_at": "2022-12-24T15:50:06Z", + "created_at": "2022-12-25T11:38:01Z", + "updated_at": "2022-12-25T11:38:01Z", + "pushed_at": "2022-12-25T11:38:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-22756.json b/2022/CVE-2022-22756.json new file mode 100644 index 0000000000..18b9a6f512 --- /dev/null +++ b/2022/CVE-2022-22756.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038979, + "name": "CVE-2022-22756", + "full_name": "Live-Hack-CVE\/CVE-2022-22756", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22756", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22756 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:40Z", + "updated_at": "2022-12-25T12:15:40Z", + "pushed_at": "2022-12-25T12:15:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22757.json b/2022/CVE-2022-22757.json new file mode 100644 index 0000000000..120a2102ba --- /dev/null +++ b/2022/CVE-2022-22757.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031793, + "name": "CVE-2022-22757", + "full_name": "Live-Hack-CVE\/CVE-2022-22757", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22757", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22757 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:07Z", + "updated_at": "2022-12-25T11:38:08Z", + "pushed_at": "2022-12-25T11:38:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22758.json b/2022/CVE-2022-22758.json new file mode 100644 index 0000000000..7a0e585cf2 --- /dev/null +++ b/2022/CVE-2022-22758.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031821, + "name": "CVE-2022-22758", + "full_name": "Live-Hack-CVE\/CVE-2022-22758", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22758", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22758 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:15Z", + "updated_at": "2022-12-25T11:38:15Z", + "pushed_at": "2022-12-25T11:38:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23332.json b/2022/CVE-2022-22759.json similarity index 78% rename from 2022/CVE-2022-23332.json rename to 2022/CVE-2022-22759.json index b5febbcadb..55108b2b62 100644 --- a/2022/CVE-2022-23332.json +++ b/2022/CVE-2022-22759.json @@ -1,20 +1,20 @@ [ { - "id": 581838731, - "name": "CVE-2022-23332", - "full_name": "Live-Hack-CVE\/CVE-2022-23332", + "id": 582038989, + "name": "CVE-2022-22759", + "full_name": "Live-Hack-CVE\/CVE-2022-22759", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23332", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23332 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22759", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22759 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:32:29Z", - "updated_at": "2022-12-24T14:32:29Z", - "pushed_at": "2022-12-24T14:32:31Z", + "created_at": "2022-12-25T12:15:43Z", + "updated_at": "2022-12-25T12:15:43Z", + "pushed_at": "2022-12-25T12:15:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-22760.json b/2022/CVE-2022-22760.json new file mode 100644 index 0000000000..22a0546500 --- /dev/null +++ b/2022/CVE-2022-22760.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031848, + "name": "CVE-2022-22760", + "full_name": "Live-Hack-CVE\/CVE-2022-22760", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22760", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22760 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:22Z", + "updated_at": "2022-12-25T11:38:22Z", + "pushed_at": "2022-12-25T11:38:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22761.json b/2022/CVE-2022-22761.json new file mode 100644 index 0000000000..51a34f7863 --- /dev/null +++ b/2022/CVE-2022-22761.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039000, + "name": "CVE-2022-22761", + "full_name": "Live-Hack-CVE\/CVE-2022-22761", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22761", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22761 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:46Z", + "updated_at": "2022-12-25T12:15:46Z", + "pushed_at": "2022-12-25T12:15:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22762.json b/2022/CVE-2022-22762.json new file mode 100644 index 0000000000..1aeaddcd74 --- /dev/null +++ b/2022/CVE-2022-22762.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031857, + "name": "CVE-2022-22762", + "full_name": "Live-Hack-CVE\/CVE-2022-22762", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22762", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22762 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:25Z", + "updated_at": "2022-12-25T11:38:25Z", + "pushed_at": "2022-12-25T11:38:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20830.json b/2022/CVE-2022-22763.json similarity index 78% rename from 2022/CVE-2022-20830.json rename to 2022/CVE-2022-22763.json index 95625c4806..a84ca6880e 100644 --- a/2022/CVE-2022-20830.json +++ b/2022/CVE-2022-22763.json @@ -1,20 +1,20 @@ [ { - "id": 581847876, - "name": "CVE-2022-20830", - "full_name": "Live-Hack-CVE\/CVE-2022-20830", + "id": 582039014, + "name": "CVE-2022-22763", + "full_name": "Live-Hack-CVE\/CVE-2022-22763", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20830", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20830 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22763", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22763 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:13:14Z", - "updated_at": "2022-12-24T15:13:14Z", - "pushed_at": "2022-12-24T15:13:16Z", + "created_at": "2022-12-25T12:15:49Z", + "updated_at": "2022-12-25T12:15:49Z", + "pushed_at": "2022-12-25T12:15:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-22764.json b/2022/CVE-2022-22764.json new file mode 100644 index 0000000000..c6cce554c6 --- /dev/null +++ b/2022/CVE-2022-22764.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031882, + "name": "CVE-2022-22764", + "full_name": "Live-Hack-CVE\/CVE-2022-22764", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22764", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22764 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:32Z", + "updated_at": "2022-12-25T11:38:32Z", + "pushed_at": "2022-12-25T11:38:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index 35f61cf80a..1f1d391e3d 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -56,34 +56,5 @@ "forks": 2, "watchers": 0, "score": 0 - }, - { - "id": 581838572, - "name": "CVE-2022-23222", - "full_name": "Live-Hack-CVE\/CVE-2022-23222", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23222", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23222 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:31:50Z", - "updated_at": "2022-12-24T14:31:50Z", - "pushed_at": "2022-12-24T14:31:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23490.json b/2022/CVE-2022-23490.json new file mode 100644 index 0000000000..06433cdf8e --- /dev/null +++ b/2022/CVE-2022-23490.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040192, + "name": "CVE-2022-23490", + "full_name": "Live-Hack-CVE\/CVE-2022-23490", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23490", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23490 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:39Z", + "updated_at": "2022-12-25T12:21:39Z", + "pushed_at": "2022-12-25T12:21:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23513.json b/2022/CVE-2022-23513.json new file mode 100644 index 0000000000..14722befd6 --- /dev/null +++ b/2022/CVE-2022-23513.json @@ -0,0 +1,31 @@ +[ + { + "id": 582025016, + "name": "CVE-2022-23513", + "full_name": "Live-Hack-CVE\/CVE-2022-23513", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23513", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23513 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:41Z", + "updated_at": "2022-12-25T11:01:41Z", + "pushed_at": "2022-12-25T11:01:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23540.json b/2022/CVE-2022-23540.json new file mode 100644 index 0000000000..c632c9fafc --- /dev/null +++ b/2022/CVE-2022-23540.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038539, + "name": "CVE-2022-23540", + "full_name": "Live-Hack-CVE\/CVE-2022-23540", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23540", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23540 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:28Z", + "updated_at": "2022-12-25T12:13:28Z", + "pushed_at": "2022-12-25T12:13:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38051.json b/2022/CVE-2022-23541.json similarity index 77% rename from 2022/CVE-2022-38051.json rename to 2022/CVE-2022-23541.json index a9eefe6fc8..4f444917b8 100644 --- a/2022/CVE-2022-38051.json +++ b/2022/CVE-2022-23541.json @@ -1,20 +1,20 @@ [ { - "id": 581848045, - "name": "CVE-2022-38051", - "full_name": "Live-Hack-CVE\/CVE-2022-38051", + "id": 582039558, + "name": "CVE-2022-23541", + "full_name": "Live-Hack-CVE\/CVE-2022-23541", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38051", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38051 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23541", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23541 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:13:56Z", - "updated_at": "2022-12-24T15:13:56Z", - "pushed_at": "2022-12-24T15:13:58Z", + "created_at": "2022-12-25T12:18:34Z", + "updated_at": "2022-12-25T12:18:35Z", + "pushed_at": "2022-12-25T12:18:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-23547.json b/2022/CVE-2022-23547.json new file mode 100644 index 0000000000..54ef46d0c5 --- /dev/null +++ b/2022/CVE-2022-23547.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024554, + "name": "CVE-2022-23547", + "full_name": "Live-Hack-CVE\/CVE-2022-23547", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23547", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23547 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:14Z", + "updated_at": "2022-12-25T10:59:14Z", + "pushed_at": "2022-12-25T10:59:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23556.json b/2022/CVE-2022-23556.json new file mode 100644 index 0000000000..c9668451c9 --- /dev/null +++ b/2022/CVE-2022-23556.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038662, + "name": "CVE-2022-23556", + "full_name": "Live-Hack-CVE\/CVE-2022-23556", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23556", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23556 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:14:07Z", + "updated_at": "2022-12-25T12:14:07Z", + "pushed_at": "2022-12-25T12:14:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23802.json b/2022/CVE-2022-23802.json deleted file mode 100644 index 045aaeeb8d..0000000000 --- a/2022/CVE-2022-23802.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865357, - "name": "CVE-2022-23802", - "full_name": "Live-Hack-CVE\/CVE-2022-23802", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23802", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23802 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:27Z", - "updated_at": "2022-12-24T16:34:27Z", - "pushed_at": "2022-12-24T16:34:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38388.json b/2022/CVE-2022-23854.json similarity index 75% rename from 2022/CVE-2022-38388.json rename to 2022/CVE-2022-23854.json index b31858f891..f2d415cb4a 100644 --- a/2022/CVE-2022-38388.json +++ b/2022/CVE-2022-23854.json @@ -1,20 +1,20 @@ [ { - "id": 581847998, - "name": "CVE-2022-38388", - "full_name": "Live-Hack-CVE\/CVE-2022-38388", + "id": 582023321, + "name": "CVE-2022-23854", + "full_name": "Live-Hack-CVE\/CVE-2022-23854", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38388", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38388 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23854", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23854 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:13:43Z", - "updated_at": "2022-12-24T15:13:43Z", - "pushed_at": "2022-12-24T15:13:45Z", + "created_at": "2022-12-25T10:52:20Z", + "updated_at": "2022-12-25T10:52:20Z", + "pushed_at": "2022-12-25T10:52:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-24399.json b/2022/CVE-2022-24399.json new file mode 100644 index 0000000000..4739ea72aa --- /dev/null +++ b/2022/CVE-2022-24399.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039701, + "name": "CVE-2022-24399", + "full_name": "Live-Hack-CVE\/CVE-2022-24399", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24399", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24399 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:19:28Z", + "updated_at": "2022-12-25T12:19:28Z", + "pushed_at": "2022-12-25T12:19:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24504.json b/2022/CVE-2022-24504.json deleted file mode 100644 index 1037900c46..0000000000 --- a/2022/CVE-2022-24504.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848300, - "name": "CVE-2022-24504", - "full_name": "Live-Hack-CVE\/CVE-2022-24504", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24504", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24504 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:05Z", - "updated_at": "2022-12-24T15:15:05Z", - "pushed_at": "2022-12-24T15:15:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24790.json b/2022/CVE-2022-24790.json deleted file mode 100644 index 5f28bfe6ae..0000000000 --- a/2022/CVE-2022-24790.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865121, - "name": "CVE-2022-24790", - "full_name": "Live-Hack-CVE\/CVE-2022-24790", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24790", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24790 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:33:10Z", - "updated_at": "2022-12-24T16:33:10Z", - "pushed_at": "2022-12-24T16:33:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37997.json b/2022/CVE-2022-2505.json similarity index 76% rename from 2022/CVE-2022-37997.json rename to 2022/CVE-2022-2505.json index 7200fe82ee..b9ba07e751 100644 --- a/2022/CVE-2022-37997.json +++ b/2022/CVE-2022-2505.json @@ -1,20 +1,20 @@ [ { - "id": 581848363, - "name": "CVE-2022-37997", - "full_name": "Live-Hack-CVE\/CVE-2022-37997", + "id": 582039271, + "name": "CVE-2022-2505", + "full_name": "Live-Hack-CVE\/CVE-2022-2505", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37997", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37997 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2505", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2505 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:15:21Z", - "updated_at": "2022-12-24T15:15:21Z", - "pushed_at": "2022-12-24T15:15:23Z", + "created_at": "2022-12-25T12:17:02Z", + "updated_at": "2022-12-25T12:17:02Z", + "pushed_at": "2022-12-25T12:17:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-25648.json b/2022/CVE-2022-25648.json deleted file mode 100644 index ac47929f55..0000000000 --- a/2022/CVE-2022-25648.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581839113, - "name": "CVE-2022-25648", - "full_name": "Live-Hack-CVE\/CVE-2022-25648", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25648", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25648 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:34:05Z", - "updated_at": "2022-12-24T14:34:05Z", - "pushed_at": "2022-12-24T14:34:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26101.json b/2022/CVE-2022-26101.json new file mode 100644 index 0000000000..d24d4660cb --- /dev/null +++ b/2022/CVE-2022-26101.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039710, + "name": "CVE-2022-26101", + "full_name": "Live-Hack-CVE\/CVE-2022-26101", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26101", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26101 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:19:31Z", + "updated_at": "2022-12-25T12:19:31Z", + "pushed_at": "2022-12-25T12:19:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22633.json b/2022/CVE-2022-26381.json similarity index 74% rename from 2022/CVE-2022-22633.json rename to 2022/CVE-2022-26381.json index 948f11b197..f79ec733d4 100644 --- a/2022/CVE-2022-22633.json +++ b/2022/CVE-2022-26381.json @@ -1,20 +1,20 @@ [ { - "id": 581865645, - "name": "CVE-2022-22633", - "full_name": "Live-Hack-CVE\/CVE-2022-22633", + "id": 582039025, + "name": "CVE-2022-26381", + "full_name": "Live-Hack-CVE\/CVE-2022-26381", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22633", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22633 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26381", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26381 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:35:44Z", - "updated_at": "2022-12-24T16:41:21Z", - "pushed_at": "2022-12-24T16:35:45Z", + "created_at": "2022-12-25T12:15:52Z", + "updated_at": "2022-12-25T12:21:00Z", + "pushed_at": "2022-12-25T12:15:54Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2022/CVE-2022-26382.json b/2022/CVE-2022-26382.json new file mode 100644 index 0000000000..af551cc80d --- /dev/null +++ b/2022/CVE-2022-26382.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031887, + "name": "CVE-2022-26382", + "full_name": "Live-Hack-CVE\/CVE-2022-26382", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26382", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26382 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:35Z", + "updated_at": "2022-12-25T11:38:35Z", + "pushed_at": "2022-12-25T11:38:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26383.json b/2022/CVE-2022-26383.json new file mode 100644 index 0000000000..412b6d3b1b --- /dev/null +++ b/2022/CVE-2022-26383.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039031, + "name": "CVE-2022-26383", + "full_name": "Live-Hack-CVE\/CVE-2022-26383", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26383", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26383 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:55Z", + "updated_at": "2022-12-25T12:15:55Z", + "pushed_at": "2022-12-25T12:15:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26384.json b/2022/CVE-2022-26384.json new file mode 100644 index 0000000000..78c5ddf0fa --- /dev/null +++ b/2022/CVE-2022-26384.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031915, + "name": "CVE-2022-26384", + "full_name": "Live-Hack-CVE\/CVE-2022-26384", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26384", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26384 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:41Z", + "updated_at": "2022-12-25T11:38:41Z", + "pushed_at": "2022-12-25T11:38:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26385.json b/2022/CVE-2022-26385.json new file mode 100644 index 0000000000..042d410c0f --- /dev/null +++ b/2022/CVE-2022-26385.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031931, + "name": "CVE-2022-26385", + "full_name": "Live-Hack-CVE\/CVE-2022-26385", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26385", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26385 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:45Z", + "updated_at": "2022-12-25T11:38:45Z", + "pushed_at": "2022-12-25T11:38:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26386.json b/2022/CVE-2022-26386.json new file mode 100644 index 0000000000..5175d23c2d --- /dev/null +++ b/2022/CVE-2022-26386.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031247, + "name": "CVE-2022-26386", + "full_name": "Live-Hack-CVE\/CVE-2022-26386", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26386", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26386 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:28Z", + "updated_at": "2022-12-25T11:35:28Z", + "pushed_at": "2022-12-25T11:35:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26387.json b/2022/CVE-2022-26387.json new file mode 100644 index 0000000000..34d60b4f18 --- /dev/null +++ b/2022/CVE-2022-26387.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039043, + "name": "CVE-2022-26387", + "full_name": "Live-Hack-CVE\/CVE-2022-26387", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26387", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26387 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:15:59Z", + "updated_at": "2022-12-25T12:15:59Z", + "pushed_at": "2022-12-25T12:16:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26485.json b/2022/CVE-2022-26485.json new file mode 100644 index 0000000000..d5c350fdea --- /dev/null +++ b/2022/CVE-2022-26485.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032005, + "name": "CVE-2022-26485", + "full_name": "Live-Hack-CVE\/CVE-2022-26485", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26485", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26485 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:11Z", + "updated_at": "2022-12-25T11:39:11Z", + "pushed_at": "2022-12-25T11:39:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26486.json b/2022/CVE-2022-26486.json new file mode 100644 index 0000000000..8ae78e1636 --- /dev/null +++ b/2022/CVE-2022-26486.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039054, + "name": "CVE-2022-26486", + "full_name": "Live-Hack-CVE\/CVE-2022-26486", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26486", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26486 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:16:02Z", + "updated_at": "2022-12-25T12:16:02Z", + "pushed_at": "2022-12-25T12:16:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26579.json b/2022/CVE-2022-26579.json new file mode 100644 index 0000000000..11c537229d --- /dev/null +++ b/2022/CVE-2022-26579.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040524, + "name": "CVE-2022-26579", + "full_name": "Live-Hack-CVE\/CVE-2022-26579", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26579", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26579 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:03Z", + "updated_at": "2022-12-25T12:23:03Z", + "pushed_at": "2022-12-25T12:23:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33937.json b/2022/CVE-2022-26580.json similarity index 78% rename from 2022/CVE-2022-33937.json rename to 2022/CVE-2022-26580.json index 4c101b605f..49aaf07bc4 100644 --- a/2022/CVE-2022-33937.json +++ b/2022/CVE-2022-26580.json @@ -1,20 +1,20 @@ [ { - "id": 581838174, - "name": "CVE-2022-33937", - "full_name": "Live-Hack-CVE\/CVE-2022-33937", + "id": 582040407, + "name": "CVE-2022-26580", + "full_name": "Live-Hack-CVE\/CVE-2022-26580", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33937", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33937 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26580", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26580 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:30:01Z", - "updated_at": "2022-12-24T14:30:01Z", - "pushed_at": "2022-12-24T14:30:03Z", + "created_at": "2022-12-25T12:22:32Z", + "updated_at": "2022-12-25T12:22:32Z", + "pushed_at": "2022-12-25T12:22:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-26581.json b/2022/CVE-2022-26581.json new file mode 100644 index 0000000000..618966103c --- /dev/null +++ b/2022/CVE-2022-26581.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040514, + "name": "CVE-2022-26581", + "full_name": "Live-Hack-CVE\/CVE-2022-26581", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26581", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26581 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:00Z", + "updated_at": "2022-12-25T12:23:00Z", + "pushed_at": "2022-12-25T12:23:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26582.json b/2022/CVE-2022-26582.json new file mode 100644 index 0000000000..cca3fd3593 --- /dev/null +++ b/2022/CVE-2022-26582.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040389, + "name": "CVE-2022-26582", + "full_name": "Live-Hack-CVE\/CVE-2022-26582", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26582", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26582 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:29Z", + "updated_at": "2022-12-25T12:22:29Z", + "pushed_at": "2022-12-25T12:22:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26874.json b/2022/CVE-2022-26874.json deleted file mode 100644 index 1ece9d1865..0000000000 --- a/2022/CVE-2022-26874.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838429, - "name": "CVE-2022-26874", - "full_name": "Live-Hack-CVE\/CVE-2022-26874", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26874", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26874 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:31:12Z", - "updated_at": "2022-12-24T14:31:12Z", - "pushed_at": "2022-12-24T14:31:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26966.json b/2022/CVE-2022-26966.json new file mode 100644 index 0000000000..5e9f9b2916 --- /dev/null +++ b/2022/CVE-2022-26966.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039691, + "name": "CVE-2022-26966", + "full_name": "Live-Hack-CVE\/CVE-2022-26966", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26966", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26966 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:19:24Z", + "updated_at": "2022-12-25T12:19:25Z", + "pushed_at": "2022-12-25T12:19:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2720.json b/2022/CVE-2022-2720.json deleted file mode 100644 index 97d485ed2d..0000000000 --- a/2022/CVE-2022-2720.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837547, - "name": "CVE-2022-2720", - "full_name": "Live-Hack-CVE\/CVE-2022-2720", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2720", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2720 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:12Z", - "updated_at": "2022-12-24T14:27:12Z", - "pushed_at": "2022-12-24T14:27:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-27224.json b/2022/CVE-2022-27224.json deleted file mode 100644 index e0d62f023a..0000000000 --- a/2022/CVE-2022-27224.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865350, - "name": "CVE-2022-27224", - "full_name": "Live-Hack-CVE\/CVE-2022-27224", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27224", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27224 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:24Z", - "updated_at": "2022-12-24T16:34:24Z", - "pushed_at": "2022-12-24T16:34:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-27943.json b/2022/CVE-2022-27943.json new file mode 100644 index 0000000000..8e13561701 --- /dev/null +++ b/2022/CVE-2022-27943.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039750, + "name": "CVE-2022-27943", + "full_name": "Live-Hack-CVE\/CVE-2022-27943", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27943", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27943 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:19:42Z", + "updated_at": "2022-12-25T12:19:43Z", + "pushed_at": "2022-12-25T12:19:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28184.json b/2022/CVE-2022-28184.json deleted file mode 100644 index 99cc80ff2d..0000000000 --- a/2022/CVE-2022-28184.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865554, - "name": "CVE-2022-28184", - "full_name": "Live-Hack-CVE\/CVE-2022-28184", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28184", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28184 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:21Z", - "updated_at": "2022-12-24T16:35:21Z", - "pushed_at": "2022-12-24T16:35:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28185.json b/2022/CVE-2022-28185.json deleted file mode 100644 index b1540ca28d..0000000000 --- a/2022/CVE-2022-28185.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865545, - "name": "CVE-2022-28185", - "full_name": "Live-Hack-CVE\/CVE-2022-28185", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28185", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28185 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:17Z", - "updated_at": "2022-12-24T16:35:17Z", - "pushed_at": "2022-12-24T16:35:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28193.json b/2022/CVE-2022-28193.json deleted file mode 100644 index 5629c26b79..0000000000 --- a/2022/CVE-2022-28193.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581846446, - "name": "CVE-2022-28193", - "full_name": "Live-Hack-CVE\/CVE-2022-28193", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28193", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28193 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:07:07Z", - "updated_at": "2022-12-24T15:07:07Z", - "pushed_at": "2022-12-24T15:07:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28194.json b/2022/CVE-2022-28194.json deleted file mode 100644 index ae95a5549c..0000000000 --- a/2022/CVE-2022-28194.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838784, - "name": "CVE-2022-28194", - "full_name": "Live-Hack-CVE\/CVE-2022-28194", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28194", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28194 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:32:42Z", - "updated_at": "2022-12-24T14:32:42Z", - "pushed_at": "2022-12-24T14:32:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28195.json b/2022/CVE-2022-28195.json deleted file mode 100644 index bbf1576cfa..0000000000 --- a/2022/CVE-2022-28195.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838795, - "name": "CVE-2022-28195", - "full_name": "Live-Hack-CVE\/CVE-2022-28195", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28195", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28195 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:32:45Z", - "updated_at": "2022-12-24T14:32:45Z", - "pushed_at": "2022-12-24T14:32:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28197.json b/2022/CVE-2022-28197.json deleted file mode 100644 index c5b7e0c900..0000000000 --- a/2022/CVE-2022-28197.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581846561, - "name": "CVE-2022-28197", - "full_name": "Live-Hack-CVE\/CVE-2022-28197", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28197", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28197 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:07:33Z", - "updated_at": "2022-12-24T15:07:33Z", - "pushed_at": "2022-12-24T15:07:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3220.json b/2022/CVE-2022-28228.json similarity index 78% rename from 2022/CVE-2022-3220.json rename to 2022/CVE-2022-28228.json index 4dd701a450..6cdf4f9015 100644 --- a/2022/CVE-2022-3220.json +++ b/2022/CVE-2022-28228.json @@ -1,20 +1,20 @@ [ { - "id": 581863991, - "name": "CVE-2022-3220", - "full_name": "Live-Hack-CVE\/CVE-2022-3220", + "id": 582023367, + "name": "CVE-2022-28228", + "full_name": "Live-Hack-CVE\/CVE-2022-28228", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3220", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3220 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28228", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28228 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:27:55Z", - "updated_at": "2022-12-24T16:27:55Z", - "pushed_at": "2022-12-24T16:27:57Z", + "created_at": "2022-12-25T10:52:34Z", + "updated_at": "2022-12-25T10:52:34Z", + "pushed_at": "2022-12-25T10:52:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-28229.json b/2022/CVE-2022-28229.json new file mode 100644 index 0000000000..1c1cb9f5fc --- /dev/null +++ b/2022/CVE-2022-28229.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023379, + "name": "CVE-2022-28229", + "full_name": "Live-Hack-CVE\/CVE-2022-28229", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28229", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28229 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:37Z", + "updated_at": "2022-12-25T10:52:37Z", + "pushed_at": "2022-12-25T10:52:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2828.json b/2022/CVE-2022-2828.json deleted file mode 100644 index 447203666d..0000000000 --- a/2022/CVE-2022-2828.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837700, - "name": "CVE-2022-2828", - "full_name": "Live-Hack-CVE\/CVE-2022-2828", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2828", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2828 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:50Z", - "updated_at": "2022-12-24T14:27:50Z", - "pushed_at": "2022-12-24T14:27:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28281.json b/2022/CVE-2022-28281.json index d119cd1caa..82b9e781f9 100644 --- a/2022/CVE-2022-28281.json +++ b/2022/CVE-2022-28281.json @@ -34,5 +34,34 @@ "forks": 13, "watchers": 72, "score": 0 + }, + { + "id": 582032029, + "name": "CVE-2022-28281", + "full_name": "Live-Hack-CVE\/CVE-2022-28281", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28281", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28281 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:18Z", + "updated_at": "2022-12-25T11:39:18Z", + "pushed_at": "2022-12-25T11:39:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-28282.json b/2022/CVE-2022-28282.json new file mode 100644 index 0000000000..853c08c292 --- /dev/null +++ b/2022/CVE-2022-28282.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039061, + "name": "CVE-2022-28282", + "full_name": "Live-Hack-CVE\/CVE-2022-28282", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28282", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28282 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:16:05Z", + "updated_at": "2022-12-25T12:16:05Z", + "pushed_at": "2022-12-25T12:16:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3452.json b/2022/CVE-2022-28283.json similarity index 75% rename from 2022/CVE-2022-3452.json rename to 2022/CVE-2022-28283.json index 8c7c4fc305..5d6c5ee23f 100644 --- a/2022/CVE-2022-3452.json +++ b/2022/CVE-2022-28283.json @@ -1,20 +1,20 @@ [ { - "id": 581865683, - "name": "CVE-2022-3452", - "full_name": "Live-Hack-CVE\/CVE-2022-3452", + "id": 582032039, + "name": "CVE-2022-28283", + "full_name": "Live-Hack-CVE\/CVE-2022-28283", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3452", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3452 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28283", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28283 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:35:50Z", - "updated_at": "2022-12-24T16:35:50Z", - "pushed_at": "2022-12-24T16:35:52Z", + "created_at": "2022-12-25T11:39:21Z", + "updated_at": "2022-12-25T11:39:21Z", + "pushed_at": "2022-12-25T11:39:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-37993.json b/2022/CVE-2022-28284.json similarity index 78% rename from 2022/CVE-2022-37993.json rename to 2022/CVE-2022-28284.json index c303036d56..79cda37c18 100644 --- a/2022/CVE-2022-37993.json +++ b/2022/CVE-2022-28284.json @@ -1,20 +1,20 @@ [ { - "id": 581864629, - "name": "CVE-2022-37993", - "full_name": "Live-Hack-CVE\/CVE-2022-37993", + "id": 582031309, + "name": "CVE-2022-28284", + "full_name": "Live-Hack-CVE\/CVE-2022-28284", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37993", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37993 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28284", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28284 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:30:42Z", - "updated_at": "2022-12-24T16:30:42Z", - "pushed_at": "2022-12-24T16:30:44Z", + "created_at": "2022-12-25T11:35:51Z", + "updated_at": "2022-12-25T11:35:51Z", + "pushed_at": "2022-12-25T11:35:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-28285.json b/2022/CVE-2022-28285.json new file mode 100644 index 0000000000..060079d480 --- /dev/null +++ b/2022/CVE-2022-28285.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039075, + "name": "CVE-2022-28285", + "full_name": "Live-Hack-CVE\/CVE-2022-28285", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28285", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28285 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:16:08Z", + "updated_at": "2022-12-25T12:16:08Z", + "pushed_at": "2022-12-25T12:16:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41595.json b/2022/CVE-2022-28286.json similarity index 78% rename from 2022/CVE-2022-41595.json rename to 2022/CVE-2022-28286.json index ca0a52c7e7..8b30c90412 100644 --- a/2022/CVE-2022-41595.json +++ b/2022/CVE-2022-28286.json @@ -1,20 +1,20 @@ [ { - "id": 581829333, - "name": "CVE-2022-41595", - "full_name": "Live-Hack-CVE\/CVE-2022-41595", + "id": 582032074, + "name": "CVE-2022-28286", + "full_name": "Live-Hack-CVE\/CVE-2022-28286", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41595", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41595 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28286", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28286 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T13:51:04Z", - "updated_at": "2022-12-24T13:51:04Z", - "pushed_at": "2022-12-24T13:51:06Z", + "created_at": "2022-12-25T11:39:34Z", + "updated_at": "2022-12-25T11:39:34Z", + "pushed_at": "2022-12-25T11:39:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-28287.json b/2022/CVE-2022-28287.json new file mode 100644 index 0000000000..e0bd3c3df8 --- /dev/null +++ b/2022/CVE-2022-28287.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031323, + "name": "CVE-2022-28287", + "full_name": "Live-Hack-CVE\/CVE-2022-28287", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28287", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28287 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:54Z", + "updated_at": "2022-12-25T11:35:54Z", + "pushed_at": "2022-12-25T11:35:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28288.json b/2022/CVE-2022-28288.json new file mode 100644 index 0000000000..c7b134b805 --- /dev/null +++ b/2022/CVE-2022-28288.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039090, + "name": "CVE-2022-28288", + "full_name": "Live-Hack-CVE\/CVE-2022-28288", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28288", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28288 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:16:12Z", + "updated_at": "2022-12-25T12:16:12Z", + "pushed_at": "2022-12-25T12:16:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28289.json b/2022/CVE-2022-28289.json new file mode 100644 index 0000000000..af081680d1 --- /dev/null +++ b/2022/CVE-2022-28289.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032090, + "name": "CVE-2022-28289", + "full_name": "Live-Hack-CVE\/CVE-2022-28289", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28289", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28289 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:40Z", + "updated_at": "2022-12-25T11:39:40Z", + "pushed_at": "2022-12-25T11:39:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28866.json b/2022/CVE-2022-28866.json deleted file mode 100644 index d1078857ee..0000000000 --- a/2022/CVE-2022-28866.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848170, - "name": "CVE-2022-28866", - "full_name": "Live-Hack-CVE\/CVE-2022-28866", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28866", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28866 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:29Z", - "updated_at": "2022-12-24T15:14:29Z", - "pushed_at": "2022-12-24T15:14:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29006.json b/2022/CVE-2022-29006.json index b0e926fc36..e20da89753 100644 --- a/2022/CVE-2022-29006.json +++ b/2022/CVE-2022-29006.json @@ -27,34 +27,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 581865343, - "name": "CVE-2022-29006", - "full_name": "Live-Hack-CVE\/CVE-2022-29006", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29006", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29006 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:21Z", - "updated_at": "2022-12-24T16:34:21Z", - "pushed_at": "2022-12-24T16:34:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29007.json b/2022/CVE-2022-29007.json index 7742ec971b..a881812c8e 100644 --- a/2022/CVE-2022-29007.json +++ b/2022/CVE-2022-29007.json @@ -27,34 +27,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 581865330, - "name": "CVE-2022-29007", - "full_name": "Live-Hack-CVE\/CVE-2022-29007", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29007", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29007 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:18Z", - "updated_at": "2022-12-24T16:34:18Z", - "pushed_at": "2022-12-24T16:34:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-2938.json b/2022/CVE-2022-2938.json new file mode 100644 index 0000000000..303d0248b7 --- /dev/null +++ b/2022/CVE-2022-2938.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024734, + "name": "CVE-2022-2938", + "full_name": "Live-Hack-CVE\/CVE-2022-2938", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2938", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2938 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:16Z", + "updated_at": "2022-12-25T11:00:16Z", + "pushed_at": "2022-12-25T11:00:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2978.json b/2022/CVE-2022-2978.json new file mode 100644 index 0000000000..0aafef153d --- /dev/null +++ b/2022/CVE-2022-2978.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023872, + "name": "CVE-2022-2978", + "full_name": "Live-Hack-CVE\/CVE-2022-2978", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2978", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2978 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:26Z", + "updated_at": "2022-12-25T10:55:26Z", + "pushed_at": "2022-12-25T10:55:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2981.json b/2022/CVE-2022-2981.json deleted file mode 100644 index 8568832ac3..0000000000 --- a/2022/CVE-2022-2981.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856658, - "name": "CVE-2022-2981", - "full_name": "Live-Hack-CVE\/CVE-2022-2981", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2981", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2981 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:49Z", - "updated_at": "2022-12-24T15:53:49Z", - "pushed_at": "2022-12-24T15:53:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29909.json b/2022/CVE-2022-29909.json new file mode 100644 index 0000000000..7aa61f55a0 --- /dev/null +++ b/2022/CVE-2022-29909.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039109, + "name": "CVE-2022-29909", + "full_name": "Live-Hack-CVE\/CVE-2022-29909", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29909", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29909 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:16:16Z", + "updated_at": "2022-12-25T12:16:16Z", + "pushed_at": "2022-12-25T12:16:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29910.json b/2022/CVE-2022-29910.json new file mode 100644 index 0000000000..b7afabdd1f --- /dev/null +++ b/2022/CVE-2022-29910.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031334, + "name": "CVE-2022-29910", + "full_name": "Live-Hack-CVE\/CVE-2022-29910", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29910", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29910 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:57Z", + "updated_at": "2022-12-25T11:35:57Z", + "pushed_at": "2022-12-25T11:35:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29911.json b/2022/CVE-2022-29911.json new file mode 100644 index 0000000000..9ff2451a73 --- /dev/null +++ b/2022/CVE-2022-29911.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032101, + "name": "CVE-2022-29911", + "full_name": "Live-Hack-CVE\/CVE-2022-29911", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29911", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29911 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:44Z", + "updated_at": "2022-12-25T11:39:44Z", + "pushed_at": "2022-12-25T11:39:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29912.json b/2022/CVE-2022-29912.json new file mode 100644 index 0000000000..0eb9e73ff4 --- /dev/null +++ b/2022/CVE-2022-29912.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039124, + "name": "CVE-2022-29912", + "full_name": "Live-Hack-CVE\/CVE-2022-29912", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29912", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29912 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:16:19Z", + "updated_at": "2022-12-25T12:16:19Z", + "pushed_at": "2022-12-25T12:16:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41523.json b/2022/CVE-2022-29913.json similarity index 78% rename from 2022/CVE-2022-41523.json rename to 2022/CVE-2022-29913.json index 9e0e7d0f7d..1e46d45c5f 100644 --- a/2022/CVE-2022-41523.json +++ b/2022/CVE-2022-29913.json @@ -1,20 +1,20 @@ [ { - "id": 581865254, - "name": "CVE-2022-41523", - "full_name": "Live-Hack-CVE\/CVE-2022-41523", + "id": 582031351, + "name": "CVE-2022-29913", + "full_name": "Live-Hack-CVE\/CVE-2022-29913", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41523", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41523 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29913", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29913 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:33:55Z", - "updated_at": "2022-12-24T16:33:55Z", - "pushed_at": "2022-12-24T16:33:57Z", + "created_at": "2022-12-25T11:36:00Z", + "updated_at": "2022-12-25T11:36:00Z", + "pushed_at": "2022-12-25T11:36:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-29914.json b/2022/CVE-2022-29914.json new file mode 100644 index 0000000000..0df275371e --- /dev/null +++ b/2022/CVE-2022-29914.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032127, + "name": "CVE-2022-29914", + "full_name": "Live-Hack-CVE\/CVE-2022-29914", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29914", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29914 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:53Z", + "updated_at": "2022-12-25T11:39:53Z", + "pushed_at": "2022-12-25T11:39:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29915.json b/2022/CVE-2022-29915.json new file mode 100644 index 0000000000..7e12718be0 --- /dev/null +++ b/2022/CVE-2022-29915.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032154, + "name": "CVE-2022-29915", + "full_name": "Live-Hack-CVE\/CVE-2022-29915", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29915", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29915 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:00Z", + "updated_at": "2022-12-25T11:40:00Z", + "pushed_at": "2022-12-25T11:40:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29916.json b/2022/CVE-2022-29916.json new file mode 100644 index 0000000000..f45223e5cb --- /dev/null +++ b/2022/CVE-2022-29916.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039135, + "name": "CVE-2022-29916", + "full_name": "Live-Hack-CVE\/CVE-2022-29916", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29916", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29916 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:16:23Z", + "updated_at": "2022-12-25T12:16:23Z", + "pushed_at": "2022-12-25T12:16:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40494.json b/2022/CVE-2022-29917.json similarity index 78% rename from 2022/CVE-2022-40494.json rename to 2022/CVE-2022-29917.json index 17b30b7495..9696c03f73 100644 --- a/2022/CVE-2022-40494.json +++ b/2022/CVE-2022-29917.json @@ -1,20 +1,20 @@ [ { - "id": 581848516, - "name": "CVE-2022-40494", - "full_name": "Live-Hack-CVE\/CVE-2022-40494", + "id": 582039157, + "name": "CVE-2022-29917", + "full_name": "Live-Hack-CVE\/CVE-2022-29917", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40494", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40494 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29917", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29917 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:16:03Z", - "updated_at": "2022-12-24T15:16:03Z", - "pushed_at": "2022-12-24T15:16:05Z", + "created_at": "2022-12-25T12:16:29Z", + "updated_at": "2022-12-25T12:16:29Z", + "pushed_at": "2022-12-25T12:16:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-41200.json b/2022/CVE-2022-29918.json similarity index 78% rename from 2022/CVE-2022-41200.json rename to 2022/CVE-2022-29918.json index 413d7ef0fd..b1561fb7dc 100644 --- a/2022/CVE-2022-41200.json +++ b/2022/CVE-2022-29918.json @@ -1,20 +1,20 @@ [ { - "id": 581855923, - "name": "CVE-2022-41200", - "full_name": "Live-Hack-CVE\/CVE-2022-41200", + "id": 582039143, + "name": "CVE-2022-29918", + "full_name": "Live-Hack-CVE\/CVE-2022-29918", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41200", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41200 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29918", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29918 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:50:40Z", - "updated_at": "2022-12-24T15:50:40Z", - "pushed_at": "2022-12-24T15:50:42Z", + "created_at": "2022-12-25T12:16:26Z", + "updated_at": "2022-12-25T12:16:26Z", + "pushed_at": "2022-12-25T12:16:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-30293.json b/2022/CVE-2022-30293.json deleted file mode 100644 index e16ee37b8b..0000000000 --- a/2022/CVE-2022-30293.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838762, - "name": "CVE-2022-30293", - "full_name": "Live-Hack-CVE\/CVE-2022-30293", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30293", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30293 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:32:35Z", - "updated_at": "2022-12-24T14:32:35Z", - "pushed_at": "2022-12-24T14:32:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3032.json b/2022/CVE-2022-3032.json new file mode 100644 index 0000000000..27e9825b5d --- /dev/null +++ b/2022/CVE-2022-3032.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039534, + "name": "CVE-2022-3032", + "full_name": "Live-Hack-CVE\/CVE-2022-3032", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3032", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3032 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:28Z", + "updated_at": "2022-12-25T12:18:28Z", + "pushed_at": "2022-12-25T12:18:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41387.json b/2022/CVE-2022-3033.json similarity index 76% rename from 2022/CVE-2022-41387.json rename to 2022/CVE-2022-3033.json index ea2012c340..bc81499930 100644 --- a/2022/CVE-2022-41387.json +++ b/2022/CVE-2022-3033.json @@ -1,20 +1,20 @@ [ { - "id": 581855350, - "name": "CVE-2022-41387", - "full_name": "Live-Hack-CVE\/CVE-2022-41387", + "id": 582031510, + "name": "CVE-2022-3033", + "full_name": "Live-Hack-CVE\/CVE-2022-3033", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41387", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41387 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3033", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3033 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:48:15Z", - "updated_at": "2022-12-24T15:48:15Z", - "pushed_at": "2022-12-24T15:48:17Z", + "created_at": "2022-12-25T11:36:42Z", + "updated_at": "2022-12-25T11:36:42Z", + "pushed_at": "2022-12-25T11:36:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-3034.json b/2022/CVE-2022-3034.json new file mode 100644 index 0000000000..33ebff8912 --- /dev/null +++ b/2022/CVE-2022-3034.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032471, + "name": "CVE-2022-3034", + "full_name": "Live-Hack-CVE\/CVE-2022-3034", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3034", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3034 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:32Z", + "updated_at": "2022-12-25T11:41:32Z", + "pushed_at": "2022-12-25T11:41:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30689.json b/2022/CVE-2022-30689.json new file mode 100644 index 0000000000..3e22adac36 --- /dev/null +++ b/2022/CVE-2022-30689.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039796, + "name": "CVE-2022-30689", + "full_name": "Live-Hack-CVE\/CVE-2022-30689", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30689", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30689 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:19:57Z", + "updated_at": "2022-12-25T12:19:57Z", + "pushed_at": "2022-12-25T12:19:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30763.json b/2022/CVE-2022-30763.json deleted file mode 100644 index 4a9ec1cca8..0000000000 --- a/2022/CVE-2022-30763.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864369, - "name": "CVE-2022-30763", - "full_name": "Live-Hack-CVE\/CVE-2022-30763", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30763", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30763 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:29:38Z", - "updated_at": "2022-12-24T16:29:38Z", - "pushed_at": "2022-12-24T16:29:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31029.json b/2022/CVE-2022-31029.json new file mode 100644 index 0000000000..a72921fe47 --- /dev/null +++ b/2022/CVE-2022-31029.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024505, + "name": "CVE-2022-31029", + "full_name": "Live-Hack-CVE\/CVE-2022-31029", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31029", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31029 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:58:56Z", + "updated_at": "2022-12-25T10:58:56Z", + "pushed_at": "2022-12-25T10:58:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31228.json b/2022/CVE-2022-31228.json deleted file mode 100644 index 5432a0ec59..0000000000 --- a/2022/CVE-2022-31228.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829816, - "name": "CVE-2022-31228", - "full_name": "Live-Hack-CVE\/CVE-2022-31228", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31228", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31228 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:06Z", - "updated_at": "2022-12-24T13:53:06Z", - "pushed_at": "2022-12-24T13:53:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3136.json b/2022/CVE-2022-3136.json deleted file mode 100644 index 2899269453..0000000000 --- a/2022/CVE-2022-3136.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864072, - "name": "CVE-2022-3136", - "full_name": "Live-Hack-CVE\/CVE-2022-3136", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3136", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3136 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:28:15Z", - "updated_at": "2022-12-24T16:28:15Z", - "pushed_at": "2022-12-24T16:28:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3137.json b/2022/CVE-2022-3137.json deleted file mode 100644 index 15a0ec3532..0000000000 --- a/2022/CVE-2022-3137.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864042, - "name": "CVE-2022-3137", - "full_name": "Live-Hack-CVE\/CVE-2022-3137", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3137", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3137 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:28:09Z", - "updated_at": "2022-12-24T16:28:09Z", - "pushed_at": "2022-12-24T16:28:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3154.json b/2022/CVE-2022-3154.json deleted file mode 100644 index cd5fa5ecca..0000000000 --- a/2022/CVE-2022-3154.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848139, - "name": "CVE-2022-3154", - "full_name": "Live-Hack-CVE\/CVE-2022-3154", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3154", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3154 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:22Z", - "updated_at": "2022-12-24T15:14:22Z", - "pushed_at": "2022-12-24T15:14:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3155.json b/2022/CVE-2022-3155.json new file mode 100644 index 0000000000..2f033a778c --- /dev/null +++ b/2022/CVE-2022-3155.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032484, + "name": "CVE-2022-3155", + "full_name": "Live-Hack-CVE\/CVE-2022-3155", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3155", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3155 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:35Z", + "updated_at": "2022-12-25T11:41:35Z", + "pushed_at": "2022-12-25T11:41:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3165.json b/2022/CVE-2022-3165.json new file mode 100644 index 0000000000..231cd58ad8 --- /dev/null +++ b/2022/CVE-2022-3165.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024708, + "name": "CVE-2022-3165", + "full_name": "Live-Hack-CVE\/CVE-2022-3165", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3165", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3165 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:10Z", + "updated_at": "2022-12-25T11:00:10Z", + "pushed_at": "2022-12-25T11:00:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31682.json b/2022/CVE-2022-31682.json deleted file mode 100644 index 2df220eb21..0000000000 --- a/2022/CVE-2022-31682.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847850, - "name": "CVE-2022-31682", - "full_name": "Live-Hack-CVE\/CVE-2022-31682", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31682", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31682 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:06Z", - "updated_at": "2022-12-24T15:13:06Z", - "pushed_at": "2022-12-24T15:13:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3169.json b/2022/CVE-2022-3169.json new file mode 100644 index 0000000000..9645eaf59c --- /dev/null +++ b/2022/CVE-2022-3169.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040489, + "name": "CVE-2022-3169", + "full_name": "Live-Hack-CVE\/CVE-2022-3169", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3169", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3169 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:54Z", + "updated_at": "2022-12-25T12:22:54Z", + "pushed_at": "2022-12-25T12:22:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31736.json b/2022/CVE-2022-31736.json new file mode 100644 index 0000000000..103138affe --- /dev/null +++ b/2022/CVE-2022-31736.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032200, + "name": "CVE-2022-31736", + "full_name": "Live-Hack-CVE\/CVE-2022-31736", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31736", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31736 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:10Z", + "updated_at": "2022-12-25T11:40:10Z", + "pushed_at": "2022-12-25T11:40:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20415.json b/2022/CVE-2022-31737.json similarity index 76% rename from 2022/CVE-2022-20415.json rename to 2022/CVE-2022-31737.json index 452dac6fcd..df233c4305 100644 --- a/2022/CVE-2022-20415.json +++ b/2022/CVE-2022-31737.json @@ -1,20 +1,20 @@ [ { - "id": 581855154, - "name": "CVE-2022-20415", - "full_name": "Live-Hack-CVE\/CVE-2022-20415", + "id": 582032253, + "name": "CVE-2022-31737", + "full_name": "Live-Hack-CVE\/CVE-2022-31737", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20415", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20415 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31737", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31737 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:47:20Z", - "updated_at": "2022-12-24T15:47:20Z", - "pushed_at": "2022-12-24T15:47:22Z", + "created_at": "2022-12-25T11:40:29Z", + "updated_at": "2022-12-25T11:40:29Z", + "pushed_at": "2022-12-25T11:40:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-39861.json b/2022/CVE-2022-31738.json similarity index 78% rename from 2022/CVE-2022-39861.json rename to 2022/CVE-2022-31738.json index 76e54816bd..78313adbac 100644 --- a/2022/CVE-2022-39861.json +++ b/2022/CVE-2022-31738.json @@ -1,20 +1,20 @@ [ { - "id": 581865405, - "name": "CVE-2022-39861", - "full_name": "Live-Hack-CVE\/CVE-2022-39861", + "id": 582039277, + "name": "CVE-2022-31738", + "full_name": "Live-Hack-CVE\/CVE-2022-31738", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39861", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39861 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31738", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31738 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:34:38Z", - "updated_at": "2022-12-24T16:34:38Z", - "pushed_at": "2022-12-24T16:34:40Z", + "created_at": "2022-12-25T12:17:06Z", + "updated_at": "2022-12-25T12:17:06Z", + "pushed_at": "2022-12-25T12:17:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-31739.json b/2022/CVE-2022-31739.json new file mode 100644 index 0000000000..e74d8a3ac1 --- /dev/null +++ b/2022/CVE-2022-31739.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031380, + "name": "CVE-2022-31739", + "full_name": "Live-Hack-CVE\/CVE-2022-31739", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31739", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31739 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:07Z", + "updated_at": "2022-12-25T11:36:07Z", + "pushed_at": "2022-12-25T11:36:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31740.json b/2022/CVE-2022-31740.json new file mode 100644 index 0000000000..c1847a123e --- /dev/null +++ b/2022/CVE-2022-31740.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032265, + "name": "CVE-2022-31740", + "full_name": "Live-Hack-CVE\/CVE-2022-31740", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31740", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31740 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:32Z", + "updated_at": "2022-12-25T11:40:32Z", + "pushed_at": "2022-12-25T11:40:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31741.json b/2022/CVE-2022-31741.json new file mode 100644 index 0000000000..53117396d1 --- /dev/null +++ b/2022/CVE-2022-31741.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031390, + "name": "CVE-2022-31741", + "full_name": "Live-Hack-CVE\/CVE-2022-31741", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31741", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31741 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:10Z", + "updated_at": "2022-12-25T11:36:10Z", + "pushed_at": "2022-12-25T11:36:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40176.json b/2022/CVE-2022-31742.json similarity index 76% rename from 2022/CVE-2022-40176.json rename to 2022/CVE-2022-31742.json index 62c6bce27f..e2f262429d 100644 --- a/2022/CVE-2022-40176.json +++ b/2022/CVE-2022-31742.json @@ -1,20 +1,20 @@ [ { - "id": 581864033, - "name": "CVE-2022-40176", - "full_name": "Live-Hack-CVE\/CVE-2022-40176", + "id": 582039290, + "name": "CVE-2022-31742", + "full_name": "Live-Hack-CVE\/CVE-2022-31742", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40176", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40176 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31742", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31742 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:28:06Z", - "updated_at": "2022-12-24T16:28:06Z", - "pushed_at": "2022-12-24T16:28:08Z", + "created_at": "2022-12-25T12:17:09Z", + "updated_at": "2022-12-25T12:17:09Z", + "pushed_at": "2022-12-25T12:17:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-31743.json b/2022/CVE-2022-31743.json new file mode 100644 index 0000000000..2af43519f5 --- /dev/null +++ b/2022/CVE-2022-31743.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039295, + "name": "CVE-2022-31743", + "full_name": "Live-Hack-CVE\/CVE-2022-31743", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31743", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31743 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:12Z", + "updated_at": "2022-12-25T12:17:12Z", + "pushed_at": "2022-12-25T12:17:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31744.json b/2022/CVE-2022-31744.json new file mode 100644 index 0000000000..2beaf1660a --- /dev/null +++ b/2022/CVE-2022-31744.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039309, + "name": "CVE-2022-31744", + "full_name": "Live-Hack-CVE\/CVE-2022-31744", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31744", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31744 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:15Z", + "updated_at": "2022-12-25T12:17:16Z", + "pushed_at": "2022-12-25T12:17:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31745.json b/2022/CVE-2022-31745.json new file mode 100644 index 0000000000..4353b3bb59 --- /dev/null +++ b/2022/CVE-2022-31745.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032275, + "name": "CVE-2022-31745", + "full_name": "Live-Hack-CVE\/CVE-2022-31745", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31745", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31745 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:35Z", + "updated_at": "2022-12-25T11:40:36Z", + "pushed_at": "2022-12-25T11:40:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31746.json b/2022/CVE-2022-31746.json new file mode 100644 index 0000000000..a6d31278e0 --- /dev/null +++ b/2022/CVE-2022-31746.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039316, + "name": "CVE-2022-31746", + "full_name": "Live-Hack-CVE\/CVE-2022-31746", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31746", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31746 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:19Z", + "updated_at": "2022-12-25T12:17:19Z", + "pushed_at": "2022-12-25T12:17:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40631.json b/2022/CVE-2022-31747.json similarity index 77% rename from 2022/CVE-2022-40631.json rename to 2022/CVE-2022-31747.json index 1bca6cba62..128fc1dc20 100644 --- a/2022/CVE-2022-40631.json +++ b/2022/CVE-2022-31747.json @@ -1,20 +1,20 @@ [ { - "id": 581837558, - "name": "CVE-2022-40631", - "full_name": "Live-Hack-CVE\/CVE-2022-40631", + "id": 582032290, + "name": "CVE-2022-31747", + "full_name": "Live-Hack-CVE\/CVE-2022-31747", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40631", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40631 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31747", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31747 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:27:15Z", - "updated_at": "2022-12-24T14:27:15Z", - "pushed_at": "2022-12-24T14:27:17Z", + "created_at": "2022-12-25T11:40:39Z", + "updated_at": "2022-12-25T11:40:39Z", + "pushed_at": "2022-12-25T11:40:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-31748.json b/2022/CVE-2022-31748.json new file mode 100644 index 0000000000..ae868c9e64 --- /dev/null +++ b/2022/CVE-2022-31748.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039325, + "name": "CVE-2022-31748", + "full_name": "Live-Hack-CVE\/CVE-2022-31748", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31748", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31748 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:22Z", + "updated_at": "2022-12-25T12:17:22Z", + "pushed_at": "2022-12-25T12:17:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31766.json b/2022/CVE-2022-31766.json deleted file mode 100644 index 2672012411..0000000000 --- a/2022/CVE-2022-31766.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837610, - "name": "CVE-2022-31766", - "full_name": "Live-Hack-CVE\/CVE-2022-31766", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31766", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31766 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:25Z", - "updated_at": "2022-12-24T14:27:25Z", - "pushed_at": "2022-12-24T14:27:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3207.json b/2022/CVE-2022-3207.json deleted file mode 100644 index 3a3056c5e1..0000000000 --- a/2022/CVE-2022-3207.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856807, - "name": "CVE-2022-3207", - "full_name": "Live-Hack-CVE\/CVE-2022-3207", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3207", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3207 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:54:33Z", - "updated_at": "2022-12-24T15:54:33Z", - "pushed_at": "2022-12-24T15:54:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3208.json b/2022/CVE-2022-3208.json deleted file mode 100644 index b55e264b16..0000000000 --- a/2022/CVE-2022-3208.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848157, - "name": "CVE-2022-3208", - "full_name": "Live-Hack-CVE\/CVE-2022-3208", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3208", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3208 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:26Z", - "updated_at": "2022-12-24T15:14:26Z", - "pushed_at": "2022-12-24T15:14:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3209.json b/2022/CVE-2022-3209.json deleted file mode 100644 index e462ca580d..0000000000 --- a/2022/CVE-2022-3209.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864018, - "name": "CVE-2022-3209", - "full_name": "Live-Hack-CVE\/CVE-2022-3209", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3209", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3209 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:28:02Z", - "updated_at": "2022-12-24T16:28:02Z", - "pushed_at": "2022-12-24T16:28:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32483.json b/2022/CVE-2022-32483.json deleted file mode 100644 index 6c69389212..0000000000 --- a/2022/CVE-2022-32483.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829826, - "name": "CVE-2022-32483", - "full_name": "Live-Hack-CVE\/CVE-2022-32483", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32483", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32483 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:10Z", - "updated_at": "2022-12-24T13:53:10Z", - "pushed_at": "2022-12-24T13:53:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32484.json b/2022/CVE-2022-32484.json deleted file mode 100644 index 96822042ff..0000000000 --- a/2022/CVE-2022-32484.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829893, - "name": "CVE-2022-32484", - "full_name": "Live-Hack-CVE\/CVE-2022-32484", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32484", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32484 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:27Z", - "updated_at": "2022-12-24T13:53:27Z", - "pushed_at": "2022-12-24T13:53:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32486.json b/2022/CVE-2022-32486.json deleted file mode 100644 index df9bcfc20b..0000000000 --- a/2022/CVE-2022-32486.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581839256, - "name": "CVE-2022-32486", - "full_name": "Live-Hack-CVE\/CVE-2022-32486", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32486", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32486 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:34:43Z", - "updated_at": "2022-12-24T14:34:43Z", - "pushed_at": "2022-12-24T14:34:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32487.json b/2022/CVE-2022-32487.json deleted file mode 100644 index 0e03996544..0000000000 --- a/2022/CVE-2022-32487.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829867, - "name": "CVE-2022-32487", - "full_name": "Live-Hack-CVE\/CVE-2022-32487", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32487", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32487 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:21Z", - "updated_at": "2022-12-24T13:53:21Z", - "pushed_at": "2022-12-24T13:53:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32488.json b/2022/CVE-2022-32488.json deleted file mode 100644 index e2cd6be54d..0000000000 --- a/2022/CVE-2022-32488.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829851, - "name": "CVE-2022-32488", - "full_name": "Live-Hack-CVE\/CVE-2022-32488", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32488", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32488 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:17Z", - "updated_at": "2022-12-24T13:53:17Z", - "pushed_at": "2022-12-24T13:53:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32489.json b/2022/CVE-2022-32489.json deleted file mode 100644 index e6eb27891b..0000000000 --- a/2022/CVE-2022-32489.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829882, - "name": "CVE-2022-32489", - "full_name": "Live-Hack-CVE\/CVE-2022-32489", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32489", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32489 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:24Z", - "updated_at": "2022-12-24T13:53:24Z", - "pushed_at": "2022-12-24T13:53:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32491.json b/2022/CVE-2022-32491.json deleted file mode 100644 index ad6874195b..0000000000 --- a/2022/CVE-2022-32491.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829908, - "name": "CVE-2022-32491", - "full_name": "Live-Hack-CVE\/CVE-2022-32491", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32491", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32491 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:31Z", - "updated_at": "2022-12-24T13:53:31Z", - "pushed_at": "2022-12-24T13:53:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32492.json b/2022/CVE-2022-32492.json deleted file mode 100644 index dda9549f34..0000000000 --- a/2022/CVE-2022-32492.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581839268, - "name": "CVE-2022-32492", - "full_name": "Live-Hack-CVE\/CVE-2022-32492", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32492", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32492 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:34:46Z", - "updated_at": "2022-12-24T14:34:46Z", - "pushed_at": "2022-12-24T14:34:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32589.json b/2022/CVE-2022-32589.json deleted file mode 100644 index 5a354a1ee7..0000000000 --- a/2022/CVE-2022-32589.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864937, - "name": "CVE-2022-32589", - "full_name": "Live-Hack-CVE\/CVE-2022-32589", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32589", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32589 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:14Z", - "updated_at": "2022-12-24T16:32:14Z", - "pushed_at": "2022-12-24T16:32:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32590.json b/2022/CVE-2022-32590.json deleted file mode 100644 index 402b4c68c3..0000000000 --- a/2022/CVE-2022-32590.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864901, - "name": "CVE-2022-32590", - "full_name": "Live-Hack-CVE\/CVE-2022-32590", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32590", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32590 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:02Z", - "updated_at": "2022-12-24T16:32:02Z", - "pushed_at": "2022-12-24T16:32:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32591.json b/2022/CVE-2022-32591.json deleted file mode 100644 index 586901b08a..0000000000 --- a/2022/CVE-2022-32591.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864926, - "name": "CVE-2022-32591", - "full_name": "Live-Hack-CVE\/CVE-2022-32591", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32591", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32591 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:11Z", - "updated_at": "2022-12-24T16:32:11Z", - "pushed_at": "2022-12-24T16:32:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32592.json b/2022/CVE-2022-32592.json deleted file mode 100644 index 37dba26aee..0000000000 --- a/2022/CVE-2022-32592.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865022, - "name": "CVE-2022-32592", - "full_name": "Live-Hack-CVE\/CVE-2022-32592", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32592", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32592 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:41Z", - "updated_at": "2022-12-24T16:32:41Z", - "pushed_at": "2022-12-24T16:32:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32593.json b/2022/CVE-2022-32593.json deleted file mode 100644 index a68b282d79..0000000000 --- a/2022/CVE-2022-32593.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864964, - "name": "CVE-2022-32593", - "full_name": "Live-Hack-CVE\/CVE-2022-32593", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32593", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32593 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:21Z", - "updated_at": "2022-12-24T16:32:22Z", - "pushed_at": "2022-12-24T16:32:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3266.json b/2022/CVE-2022-3266.json new file mode 100644 index 0000000000..bdd11aa2b5 --- /dev/null +++ b/2022/CVE-2022-3266.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032494, + "name": "CVE-2022-3266", + "full_name": "Live-Hack-CVE\/CVE-2022-3266", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3266", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3266 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:38Z", + "updated_at": "2022-12-25T11:41:38Z", + "pushed_at": "2022-12-25T11:41:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33106.json b/2022/CVE-2022-33106.json deleted file mode 100644 index 9cea3a030d..0000000000 --- a/2022/CVE-2022-33106.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829767, - "name": "CVE-2022-33106", - "full_name": "Live-Hack-CVE\/CVE-2022-33106", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33106", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33106 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:52:52Z", - "updated_at": "2022-12-24T13:52:52Z", - "pushed_at": "2022-12-24T13:52:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33324.json b/2022/CVE-2022-33324.json new file mode 100644 index 0000000000..7b7a2b50c0 --- /dev/null +++ b/2022/CVE-2022-33324.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024974, + "name": "CVE-2022-33324", + "full_name": "Live-Hack-CVE\/CVE-2022-33324", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33324", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33324 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:28Z", + "updated_at": "2022-12-25T11:01:28Z", + "pushed_at": "2022-12-25T11:01:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33634.json b/2022/CVE-2022-33634.json deleted file mode 100644 index 51aa81eb88..0000000000 --- a/2022/CVE-2022-33634.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848283, - "name": "CVE-2022-33634", - "full_name": "Live-Hack-CVE\/CVE-2022-33634", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33634", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33634 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:01Z", - "updated_at": "2022-12-24T15:15:01Z", - "pushed_at": "2022-12-24T15:15:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33635.json b/2022/CVE-2022-33635.json deleted file mode 100644 index 0a1bac771e..0000000000 --- a/2022/CVE-2022-33635.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864688, - "name": "CVE-2022-33635", - "full_name": "Live-Hack-CVE\/CVE-2022-33635", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33635", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33635 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:01Z", - "updated_at": "2022-12-24T16:31:01Z", - "pushed_at": "2022-12-24T16:31:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33645.json b/2022/CVE-2022-33645.json deleted file mode 100644 index d6b0025e39..0000000000 --- a/2022/CVE-2022-33645.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864677, - "name": "CVE-2022-33645", - "full_name": "Live-Hack-CVE\/CVE-2022-33645", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33645", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33645 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:30:58Z", - "updated_at": "2022-12-24T16:30:58Z", - "pushed_at": "2022-12-24T16:31:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33749.json b/2022/CVE-2022-33749.json deleted file mode 100644 index 4abcd7e304..0000000000 --- a/2022/CVE-2022-33749.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838908, - "name": "CVE-2022-33749", - "full_name": "Live-Hack-CVE\/CVE-2022-33749", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33749", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33749 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:33:14Z", - "updated_at": "2022-12-24T14:33:14Z", - "pushed_at": "2022-12-24T14:33:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3376.json b/2022/CVE-2022-3376.json deleted file mode 100644 index 3a157cf6a6..0000000000 --- a/2022/CVE-2022-3376.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865322, - "name": "CVE-2022-3376", - "full_name": "Live-Hack-CVE\/CVE-2022-3376", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3376", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3376 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:14Z", - "updated_at": "2022-12-24T16:34:14Z", - "pushed_at": "2022-12-24T16:34:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33918.json b/2022/CVE-2022-33918.json deleted file mode 100644 index 825473f305..0000000000 --- a/2022/CVE-2022-33918.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838110, - "name": "CVE-2022-33918", - "full_name": "Live-Hack-CVE\/CVE-2022-33918", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33918", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33918 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:45Z", - "updated_at": "2022-12-24T14:29:45Z", - "pushed_at": "2022-12-24T14:29:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33919.json b/2022/CVE-2022-33919.json deleted file mode 100644 index c873bf9b42..0000000000 --- a/2022/CVE-2022-33919.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838122, - "name": "CVE-2022-33919", - "full_name": "Live-Hack-CVE\/CVE-2022-33919", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33919", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33919 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:48Z", - "updated_at": "2022-12-24T14:29:48Z", - "pushed_at": "2022-12-24T14:29:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33920.json b/2022/CVE-2022-33920.json deleted file mode 100644 index c9c4d2f539..0000000000 --- a/2022/CVE-2022-33920.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838136, - "name": "CVE-2022-33920", - "full_name": "Live-Hack-CVE\/CVE-2022-33920", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33920", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33920 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:51Z", - "updated_at": "2022-12-24T14:29:51Z", - "pushed_at": "2022-12-24T14:29:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33921.json b/2022/CVE-2022-33921.json deleted file mode 100644 index 6d564a160b..0000000000 --- a/2022/CVE-2022-33921.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838152, - "name": "CVE-2022-33921", - "full_name": "Live-Hack-CVE\/CVE-2022-33921", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33921", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33921 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:54Z", - "updated_at": "2022-12-24T14:29:54Z", - "pushed_at": "2022-12-24T14:29:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33922.json b/2022/CVE-2022-33922.json deleted file mode 100644 index 3cedc54810..0000000000 --- a/2022/CVE-2022-33922.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838164, - "name": "CVE-2022-33922", - "full_name": "Live-Hack-CVE\/CVE-2022-33922", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33922", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33922 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:58Z", - "updated_at": "2022-12-24T14:29:58Z", - "pushed_at": "2022-12-24T14:30:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34021.json b/2022/CVE-2022-34021.json deleted file mode 100644 index af89d1217c..0000000000 --- a/2022/CVE-2022-34021.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838092, - "name": "CVE-2022-34021", - "full_name": "Live-Hack-CVE\/CVE-2022-34021", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34021", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34021 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:42Z", - "updated_at": "2022-12-24T14:29:42Z", - "pushed_at": "2022-12-24T14:29:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34334.json b/2022/CVE-2022-34334.json deleted file mode 100644 index eebd243bf4..0000000000 --- a/2022/CVE-2022-34334.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856690, - "name": "CVE-2022-34334", - "full_name": "Live-Hack-CVE\/CVE-2022-34334", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34334", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34334 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:57Z", - "updated_at": "2022-12-24T15:53:57Z", - "pushed_at": "2022-12-24T15:53:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34390.json b/2022/CVE-2022-34390.json deleted file mode 100644 index 8c70acaedd..0000000000 --- a/2022/CVE-2022-34390.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847652, - "name": "CVE-2022-34390", - "full_name": "Live-Hack-CVE\/CVE-2022-34390", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34390", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34390 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:12Z", - "updated_at": "2022-12-24T15:12:12Z", - "pushed_at": "2022-12-24T15:12:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34391.json b/2022/CVE-2022-34391.json deleted file mode 100644 index d8b9993878..0000000000 --- a/2022/CVE-2022-34391.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847663, - "name": "CVE-2022-34391", - "full_name": "Live-Hack-CVE\/CVE-2022-34391", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34391", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34391 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:15Z", - "updated_at": "2022-12-24T15:12:15Z", - "pushed_at": "2022-12-24T15:12:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34402.json b/2022/CVE-2022-34402.json deleted file mode 100644 index 9c36accc23..0000000000 --- a/2022/CVE-2022-34402.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856717, - "name": "CVE-2022-34402", - "full_name": "Live-Hack-CVE\/CVE-2022-34402", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34402", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34402 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:54:03Z", - "updated_at": "2022-12-24T15:54:03Z", - "pushed_at": "2022-12-24T15:54:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34425.json b/2022/CVE-2022-34425.json deleted file mode 100644 index 29ddd72ede..0000000000 --- a/2022/CVE-2022-34425.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848054, - "name": "CVE-2022-34425", - "full_name": "Live-Hack-CVE\/CVE-2022-34425", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34425", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34425 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:59Z", - "updated_at": "2022-12-24T15:13:59Z", - "pushed_at": "2022-12-24T15:14:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34426.json b/2022/CVE-2022-34426.json deleted file mode 100644 index 4c2135b4e3..0000000000 --- a/2022/CVE-2022-34426.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838273, - "name": "CVE-2022-34426", - "full_name": "Live-Hack-CVE\/CVE-2022-34426", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34426", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34426 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:30:30Z", - "updated_at": "2022-12-24T14:30:30Z", - "pushed_at": "2022-12-24T14:30:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34427.json b/2022/CVE-2022-34427.json deleted file mode 100644 index 1ee4634d52..0000000000 --- a/2022/CVE-2022-34427.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847955, - "name": "CVE-2022-34427", - "full_name": "Live-Hack-CVE\/CVE-2022-34427", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34427", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34427 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:34Z", - "updated_at": "2022-12-24T15:13:34Z", - "pushed_at": "2022-12-24T15:13:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34430.json b/2022/CVE-2022-34430.json deleted file mode 100644 index bedb8c2583..0000000000 --- a/2022/CVE-2022-34430.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847857, - "name": "CVE-2022-34430", - "full_name": "Live-Hack-CVE\/CVE-2022-34430", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34430", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34430 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:10Z", - "updated_at": "2022-12-24T15:13:10Z", - "pushed_at": "2022-12-24T15:13:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34431.json b/2022/CVE-2022-34431.json deleted file mode 100644 index afb6417ef7..0000000000 --- a/2022/CVE-2022-34431.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847937, - "name": "CVE-2022-34431", - "full_name": "Live-Hack-CVE\/CVE-2022-34431", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34431", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34431 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:30Z", - "updated_at": "2022-12-24T15:13:30Z", - "pushed_at": "2022-12-24T15:13:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34432.json b/2022/CVE-2022-34432.json deleted file mode 100644 index df9f2c7215..0000000000 --- a/2022/CVE-2022-34432.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847902, - "name": "CVE-2022-34432", - "full_name": "Live-Hack-CVE\/CVE-2022-34432", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34432", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34432 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:20Z", - "updated_at": "2022-12-24T15:13:20Z", - "pushed_at": "2022-12-24T15:13:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34468.json b/2022/CVE-2022-34468.json new file mode 100644 index 0000000000..c255fba8dd --- /dev/null +++ b/2022/CVE-2022-34468.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032304, + "name": "CVE-2022-34468", + "full_name": "Live-Hack-CVE\/CVE-2022-34468", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34468", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34468 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:42Z", + "updated_at": "2022-12-25T11:40:42Z", + "pushed_at": "2022-12-25T11:40:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34469.json b/2022/CVE-2022-34469.json new file mode 100644 index 0000000000..42cf07c5ca --- /dev/null +++ b/2022/CVE-2022-34469.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039335, + "name": "CVE-2022-34469", + "full_name": "Live-Hack-CVE\/CVE-2022-34469", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34469", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34469 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:25Z", + "updated_at": "2022-12-25T12:17:25Z", + "pushed_at": "2022-12-25T12:17:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30198.json b/2022/CVE-2022-34470.json similarity index 74% rename from 2022/CVE-2022-30198.json rename to 2022/CVE-2022-34470.json index 9f764d6721..dc2f55917d 100644 --- a/2022/CVE-2022-30198.json +++ b/2022/CVE-2022-34470.json @@ -1,20 +1,20 @@ [ { - "id": 581848322, - "name": "CVE-2022-30198", - "full_name": "Live-Hack-CVE\/CVE-2022-30198", + "id": 582032338, + "name": "CVE-2022-34470", + "full_name": "Live-Hack-CVE\/CVE-2022-34470", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30198", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30198 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34470", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34470 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:15:11Z", - "updated_at": "2022-12-24T15:20:55Z", - "pushed_at": "2022-12-24T15:15:13Z", + "created_at": "2022-12-25T11:40:52Z", + "updated_at": "2022-12-25T11:42:15Z", + "pushed_at": "2022-12-25T11:40:54Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2022/CVE-2022-34471.json b/2022/CVE-2022-34471.json new file mode 100644 index 0000000000..d772925f57 --- /dev/null +++ b/2022/CVE-2022-34471.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039347, + "name": "CVE-2022-34471", + "full_name": "Live-Hack-CVE\/CVE-2022-34471", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34471", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34471 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:28Z", + "updated_at": "2022-12-25T12:17:28Z", + "pushed_at": "2022-12-25T12:17:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37609.json b/2022/CVE-2022-34472.json similarity index 78% rename from 2022/CVE-2022-37609.json rename to 2022/CVE-2022-34472.json index 0818c8bafa..9374276d3d 100644 --- a/2022/CVE-2022-37609.json +++ b/2022/CVE-2022-34472.json @@ -1,20 +1,20 @@ [ { - "id": 581847036, - "name": "CVE-2022-37609", - "full_name": "Live-Hack-CVE\/CVE-2022-37609", + "id": 582031398, + "name": "CVE-2022-34472", + "full_name": "Live-Hack-CVE\/CVE-2022-34472", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37609", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37609 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34472", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34472 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:09:37Z", - "updated_at": "2022-12-24T15:09:37Z", - "pushed_at": "2022-12-24T15:09:38Z", + "created_at": "2022-12-25T11:36:13Z", + "updated_at": "2022-12-25T11:36:13Z", + "pushed_at": "2022-12-25T11:36:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-34473.json b/2022/CVE-2022-34473.json new file mode 100644 index 0000000000..ca0d953ee9 --- /dev/null +++ b/2022/CVE-2022-34473.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039358, + "name": "CVE-2022-34473", + "full_name": "Live-Hack-CVE\/CVE-2022-34473", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34473", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34473 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:32Z", + "updated_at": "2022-12-25T12:17:32Z", + "pushed_at": "2022-12-25T12:17:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35297.json b/2022/CVE-2022-34474.json similarity index 74% rename from 2022/CVE-2022-35297.json rename to 2022/CVE-2022-34474.json index e91a20a350..bffca9f7a8 100644 --- a/2022/CVE-2022-35297.json +++ b/2022/CVE-2022-34474.json @@ -1,20 +1,20 @@ [ { - "id": 581857127, - "name": "CVE-2022-35297", - "full_name": "Live-Hack-CVE\/CVE-2022-35297", + "id": 582032343, + "name": "CVE-2022-34474", + "full_name": "Live-Hack-CVE\/CVE-2022-34474", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35297", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35297 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34474", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34474 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:55:56Z", - "updated_at": "2022-12-24T16:01:20Z", - "pushed_at": "2022-12-24T15:55:58Z", + "created_at": "2022-12-25T11:40:55Z", + "updated_at": "2022-12-25T11:41:53Z", + "pushed_at": "2022-12-25T11:40:57Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2022/CVE-2022-34475.json b/2022/CVE-2022-34475.json new file mode 100644 index 0000000000..80da9d8ebf --- /dev/null +++ b/2022/CVE-2022-34475.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039369, + "name": "CVE-2022-34475", + "full_name": "Live-Hack-CVE\/CVE-2022-34475", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34475", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34475 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:35Z", + "updated_at": "2022-12-25T12:17:35Z", + "pushed_at": "2022-12-25T12:17:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34476.json b/2022/CVE-2022-34476.json new file mode 100644 index 0000000000..4341774501 --- /dev/null +++ b/2022/CVE-2022-34476.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031454, + "name": "CVE-2022-34476", + "full_name": "Live-Hack-CVE\/CVE-2022-34476", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34476", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34476 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:25Z", + "updated_at": "2022-12-25T11:36:25Z", + "pushed_at": "2022-12-25T11:36:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39271.json b/2022/CVE-2022-34477.json similarity index 75% rename from 2022/CVE-2022-39271.json rename to 2022/CVE-2022-34477.json index 28d27f51b4..553ee94d7f 100644 --- a/2022/CVE-2022-39271.json +++ b/2022/CVE-2022-34477.json @@ -1,22 +1,22 @@ [ { - "id": 581847893, - "name": "CVE-2022-39271", - "full_name": "Live-Hack-CVE\/CVE-2022-39271", + "id": 582032353, + "name": "CVE-2022-34477", + "full_name": "Live-Hack-CVE\/CVE-2022-34477", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39271", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39271 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34477", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34477 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:13:17Z", - "updated_at": "2022-12-24T15:13:17Z", - "pushed_at": "2022-12-24T15:13:19Z", - "stargazers_count": 0, - "watchers_count": 0, + "created_at": "2022-12-25T11:40:59Z", + "updated_at": "2022-12-25T11:41:08Z", + "pushed_at": "2022-12-25T11:41:00Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-34478.json b/2022/CVE-2022-34478.json new file mode 100644 index 0000000000..3bce58d6b9 --- /dev/null +++ b/2022/CVE-2022-34478.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039378, + "name": "CVE-2022-34478", + "full_name": "Live-Hack-CVE\/CVE-2022-34478", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34478", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34478 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:38Z", + "updated_at": "2022-12-25T12:17:38Z", + "pushed_at": "2022-12-25T12:17:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34479.json b/2022/CVE-2022-34479.json new file mode 100644 index 0000000000..d661312f73 --- /dev/null +++ b/2022/CVE-2022-34479.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031466, + "name": "CVE-2022-34479", + "full_name": "Live-Hack-CVE\/CVE-2022-34479", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34479", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34479 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:29Z", + "updated_at": "2022-12-25T11:36:29Z", + "pushed_at": "2022-12-25T11:36:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34480.json b/2022/CVE-2022-34480.json new file mode 100644 index 0000000000..0112693b0f --- /dev/null +++ b/2022/CVE-2022-34480.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032366, + "name": "CVE-2022-34480", + "full_name": "Live-Hack-CVE\/CVE-2022-34480", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34480", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34480 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:02Z", + "updated_at": "2022-12-25T11:41:02Z", + "pushed_at": "2022-12-25T11:41:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34481.json b/2022/CVE-2022-34481.json new file mode 100644 index 0000000000..1a42b021ac --- /dev/null +++ b/2022/CVE-2022-34481.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039392, + "name": "CVE-2022-34481", + "full_name": "Live-Hack-CVE\/CVE-2022-34481", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34481", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34481 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:41Z", + "updated_at": "2022-12-25T12:17:41Z", + "pushed_at": "2022-12-25T12:17:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34482.json b/2022/CVE-2022-34482.json new file mode 100644 index 0000000000..36b91ab877 --- /dev/null +++ b/2022/CVE-2022-34482.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039403, + "name": "CVE-2022-34482", + "full_name": "Live-Hack-CVE\/CVE-2022-34482", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34482", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34482 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:17:45Z", + "updated_at": "2022-12-25T12:17:45Z", + "pushed_at": "2022-12-25T12:17:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34483.json b/2022/CVE-2022-34483.json new file mode 100644 index 0000000000..8475c3dbc3 --- /dev/null +++ b/2022/CVE-2022-34483.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032373, + "name": "CVE-2022-34483", + "full_name": "Live-Hack-CVE\/CVE-2022-34483", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34483", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34483 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:05Z", + "updated_at": "2022-12-25T11:41:05Z", + "pushed_at": "2022-12-25T11:41:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34484.json b/2022/CVE-2022-34484.json new file mode 100644 index 0000000000..83a86c012b --- /dev/null +++ b/2022/CVE-2022-34484.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031479, + "name": "CVE-2022-34484", + "full_name": "Live-Hack-CVE\/CVE-2022-34484", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34484", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34484 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:32Z", + "updated_at": "2022-12-25T11:36:32Z", + "pushed_at": "2022-12-25T11:36:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34485.json b/2022/CVE-2022-34485.json new file mode 100644 index 0000000000..e83cc93da8 --- /dev/null +++ b/2022/CVE-2022-34485.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039439, + "name": "CVE-2022-34485", + "full_name": "Live-Hack-CVE\/CVE-2022-34485", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34485", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34485 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:03Z", + "updated_at": "2022-12-25T12:18:03Z", + "pushed_at": "2022-12-25T12:18:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3453.json b/2022/CVE-2022-3453.json deleted file mode 100644 index 8ed3de0d53..0000000000 --- a/2022/CVE-2022-3453.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865694, - "name": "CVE-2022-3453", - "full_name": "Live-Hack-CVE\/CVE-2022-3453", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3453", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3453 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:53Z", - "updated_at": "2022-12-24T16:35:53Z", - "pushed_at": "2022-12-24T16:35:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3456.json b/2022/CVE-2022-3456.json deleted file mode 100644 index c6f560966d..0000000000 --- a/2022/CVE-2022-3456.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581839041, - "name": "CVE-2022-3456", - "full_name": "Live-Hack-CVE\/CVE-2022-3456", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3456", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3456 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:33:49Z", - "updated_at": "2022-12-24T14:33:49Z", - "pushed_at": "2022-12-24T14:33:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3457.json b/2022/CVE-2022-3457.json deleted file mode 100644 index 3e4c77032c..0000000000 --- a/2022/CVE-2022-3457.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838934, - "name": "CVE-2022-3457", - "full_name": "Live-Hack-CVE\/CVE-2022-3457", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3457", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3457 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:33:21Z", - "updated_at": "2022-12-24T14:33:21Z", - "pushed_at": "2022-12-24T14:33:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3458.json b/2022/CVE-2022-3458.json deleted file mode 100644 index 41ed21a3fb..0000000000 --- a/2022/CVE-2022-3458.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855062, - "name": "CVE-2022-3458", - "full_name": "Live-Hack-CVE\/CVE-2022-3458", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3458", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3458 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:46:52Z", - "updated_at": "2022-12-24T15:46:52Z", - "pushed_at": "2022-12-24T15:46:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3464.json b/2022/CVE-2022-3464.json deleted file mode 100644 index 684bc382af..0000000000 --- a/2022/CVE-2022-3464.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837529, - "name": "CVE-2022-3464", - "full_name": "Live-Hack-CVE\/CVE-2022-3464", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3464", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3464 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:08Z", - "updated_at": "2022-12-24T14:27:08Z", - "pushed_at": "2022-12-24T14:27:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3465.json b/2022/CVE-2022-3465.json deleted file mode 100644 index 97540e2b44..0000000000 --- a/2022/CVE-2022-3465.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829795, - "name": "CVE-2022-3465", - "full_name": "Live-Hack-CVE\/CVE-2022-3465", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3465", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3465 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:00Z", - "updated_at": "2022-12-24T13:53:00Z", - "pushed_at": "2022-12-24T13:53:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34689.json b/2022/CVE-2022-34689.json deleted file mode 100644 index cd1a9135d6..0000000000 --- a/2022/CVE-2022-34689.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864666, - "name": "CVE-2022-34689", - "full_name": "Live-Hack-CVE\/CVE-2022-34689", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34689", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34689 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:30:55Z", - "updated_at": "2022-12-24T16:30:55Z", - "pushed_at": "2022-12-24T16:30:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3470.json b/2022/CVE-2022-3470.json deleted file mode 100644 index 2df39bc6f2..0000000000 --- a/2022/CVE-2022-3470.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847729, - "name": "CVE-2022-3470", - "full_name": "Live-Hack-CVE\/CVE-2022-3470", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3470", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3470 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:37Z", - "updated_at": "2022-12-24T15:12:37Z", - "pushed_at": "2022-12-24T15:12:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3472.json b/2022/CVE-2022-3472.json deleted file mode 100644 index 95f824934d..0000000000 --- a/2022/CVE-2022-3472.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847707, - "name": "CVE-2022-3472", - "full_name": "Live-Hack-CVE\/CVE-2022-3472", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3472", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3472 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:28Z", - "updated_at": "2022-12-24T15:12:28Z", - "pushed_at": "2022-12-24T15:12:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3473.json b/2022/CVE-2022-3473.json deleted file mode 100644 index e101715964..0000000000 --- a/2022/CVE-2022-3473.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829951, - "name": "CVE-2022-3473", - "full_name": "Live-Hack-CVE\/CVE-2022-3473", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3473", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3473 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:44Z", - "updated_at": "2022-12-24T13:53:44Z", - "pushed_at": "2022-12-24T13:53:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3492.json b/2022/CVE-2022-3492.json deleted file mode 100644 index 98880f0cc7..0000000000 --- a/2022/CVE-2022-3492.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838037, - "name": "CVE-2022-3492", - "full_name": "Live-Hack-CVE\/CVE-2022-3492", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3492", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3492 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:25Z", - "updated_at": "2022-12-24T14:29:25Z", - "pushed_at": "2022-12-24T14:29:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3493.json b/2022/CVE-2022-3493.json deleted file mode 100644 index 63615d539a..0000000000 --- a/2022/CVE-2022-3493.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838043, - "name": "CVE-2022-3493", - "full_name": "Live-Hack-CVE\/CVE-2022-3493", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3493", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3493 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:28Z", - "updated_at": "2022-12-24T14:29:28Z", - "pushed_at": "2022-12-24T14:29:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35040.json b/2022/CVE-2022-35040.json deleted file mode 100644 index cf17124605..0000000000 --- a/2022/CVE-2022-35040.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829229, - "name": "CVE-2022-35040", - "full_name": "Live-Hack-CVE\/CVE-2022-35040", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35040", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35040 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:39Z", - "updated_at": "2022-12-24T13:50:39Z", - "pushed_at": "2022-12-24T13:50:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35041.json b/2022/CVE-2022-35041.json deleted file mode 100644 index c0bb23667d..0000000000 --- a/2022/CVE-2022-35041.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829217, - "name": "CVE-2022-35041", - "full_name": "Live-Hack-CVE\/CVE-2022-35041", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35041", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35041 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:35Z", - "updated_at": "2022-12-24T13:50:35Z", - "pushed_at": "2022-12-24T13:50:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35042.json b/2022/CVE-2022-35042.json deleted file mode 100644 index 8e762d4bde..0000000000 --- a/2022/CVE-2022-35042.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829180, - "name": "CVE-2022-35042", - "full_name": "Live-Hack-CVE\/CVE-2022-35042", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35042", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35042 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:26Z", - "updated_at": "2022-12-24T13:50:26Z", - "pushed_at": "2022-12-24T13:50:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35043.json b/2022/CVE-2022-35043.json deleted file mode 100644 index 3024fe93ad..0000000000 --- a/2022/CVE-2022-35043.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829194, - "name": "CVE-2022-35043", - "full_name": "Live-Hack-CVE\/CVE-2022-35043", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35043", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35043 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:29Z", - "updated_at": "2022-12-24T13:50:29Z", - "pushed_at": "2022-12-24T13:50:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35044.json b/2022/CVE-2022-35044.json deleted file mode 100644 index 890d71f5f4..0000000000 --- a/2022/CVE-2022-35044.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829207, - "name": "CVE-2022-35044", - "full_name": "Live-Hack-CVE\/CVE-2022-35044", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35044", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35044 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:32Z", - "updated_at": "2022-12-24T13:50:32Z", - "pushed_at": "2022-12-24T13:50:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35045.json b/2022/CVE-2022-35045.json deleted file mode 100644 index 960578a840..0000000000 --- a/2022/CVE-2022-35045.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829158, - "name": "CVE-2022-35045", - "full_name": "Live-Hack-CVE\/CVE-2022-35045", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35045", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35045 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:19Z", - "updated_at": "2022-12-24T13:50:19Z", - "pushed_at": "2022-12-24T13:50:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35058.json b/2022/CVE-2022-35058.json deleted file mode 100644 index 6a75b3a5f9..0000000000 --- a/2022/CVE-2022-35058.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829140, - "name": "CVE-2022-35058", - "full_name": "Live-Hack-CVE\/CVE-2022-35058", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35058", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35058 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:13Z", - "updated_at": "2022-12-24T13:50:13Z", - "pushed_at": "2022-12-24T13:50:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35059.json b/2022/CVE-2022-35059.json deleted file mode 100644 index b35429bf32..0000000000 --- a/2022/CVE-2022-35059.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829148, - "name": "CVE-2022-35059", - "full_name": "Live-Hack-CVE\/CVE-2022-35059", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35059", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35059 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:16Z", - "updated_at": "2022-12-24T13:50:16Z", - "pushed_at": "2022-12-24T13:50:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35081.json b/2022/CVE-2022-35081.json deleted file mode 100644 index 38fa444d1e..0000000000 --- a/2022/CVE-2022-35081.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837092, - "name": "CVE-2022-35081", - "full_name": "Live-Hack-CVE\/CVE-2022-35081", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35081", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35081 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:25:24Z", - "updated_at": "2022-12-24T14:25:24Z", - "pushed_at": "2022-12-24T14:25:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35134.json b/2022/CVE-2022-35134.json deleted file mode 100644 index 70d5c5db7b..0000000000 --- a/2022/CVE-2022-35134.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838291, - "name": "CVE-2022-35134", - "full_name": "Live-Hack-CVE\/CVE-2022-35134", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35134", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35134 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:30:33Z", - "updated_at": "2022-12-24T14:30:33Z", - "pushed_at": "2022-12-24T14:30:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35135.json b/2022/CVE-2022-35135.json deleted file mode 100644 index b952283f62..0000000000 --- a/2022/CVE-2022-35135.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838198, - "name": "CVE-2022-35135", - "full_name": "Live-Hack-CVE\/CVE-2022-35135", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35135", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35135 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:30:07Z", - "updated_at": "2022-12-24T14:30:07Z", - "pushed_at": "2022-12-24T14:30:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35136.json b/2022/CVE-2022-35136.json deleted file mode 100644 index ec1d4ff598..0000000000 --- a/2022/CVE-2022-35136.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838184, - "name": "CVE-2022-35136", - "full_name": "Live-Hack-CVE\/CVE-2022-35136", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35136", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35136 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:30:04Z", - "updated_at": "2022-12-24T14:30:04Z", - "pushed_at": "2022-12-24T14:30:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3521.json b/2022/CVE-2022-3521.json new file mode 100644 index 0000000000..b5c60980cb --- /dev/null +++ b/2022/CVE-2022-3521.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023839, + "name": "CVE-2022-3521", + "full_name": "Live-Hack-CVE\/CVE-2022-3521", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3521", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3521 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:17Z", + "updated_at": "2022-12-25T10:55:17Z", + "pushed_at": "2022-12-25T10:55:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3524.json b/2022/CVE-2022-3524.json new file mode 100644 index 0000000000..39d3c0620d --- /dev/null +++ b/2022/CVE-2022-3524.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023854, + "name": "CVE-2022-3524", + "full_name": "Live-Hack-CVE\/CVE-2022-3524", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3524", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3524 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:21Z", + "updated_at": "2022-12-25T10:55:21Z", + "pushed_at": "2022-12-25T10:55:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35261.json b/2022/CVE-2022-35261.json new file mode 100644 index 0000000000..6e7a0c3b37 --- /dev/null +++ b/2022/CVE-2022-35261.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031037, + "name": "CVE-2022-35261", + "full_name": "Live-Hack-CVE\/CVE-2022-35261", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35261", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35261 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:33Z", + "updated_at": "2022-12-25T11:34:33Z", + "pushed_at": "2022-12-25T11:34:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35262.json b/2022/CVE-2022-35262.json new file mode 100644 index 0000000000..78155ca2d7 --- /dev/null +++ b/2022/CVE-2022-35262.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031000, + "name": "CVE-2022-35262", + "full_name": "Live-Hack-CVE\/CVE-2022-35262", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35262", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35262 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:20Z", + "updated_at": "2022-12-25T11:34:20Z", + "pushed_at": "2022-12-25T11:34:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35263.json b/2022/CVE-2022-35263.json new file mode 100644 index 0000000000..cfacb46187 --- /dev/null +++ b/2022/CVE-2022-35263.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031005, + "name": "CVE-2022-35263", + "full_name": "Live-Hack-CVE\/CVE-2022-35263", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35263", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35263 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:23Z", + "updated_at": "2022-12-25T11:34:23Z", + "pushed_at": "2022-12-25T11:34:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35264.json b/2022/CVE-2022-35264.json new file mode 100644 index 0000000000..a5382263f9 --- /dev/null +++ b/2022/CVE-2022-35264.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031017, + "name": "CVE-2022-35264", + "full_name": "Live-Hack-CVE\/CVE-2022-35264", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35264", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35264 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:26Z", + "updated_at": "2022-12-25T11:34:26Z", + "pushed_at": "2022-12-25T11:34:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41183.json b/2022/CVE-2022-35265.json similarity index 78% rename from 2022/CVE-2022-41183.json rename to 2022/CVE-2022-35265.json index b4bb8da789..77a1568ed6 100644 --- a/2022/CVE-2022-41183.json +++ b/2022/CVE-2022-35265.json @@ -1,20 +1,20 @@ [ { - "id": 581856046, - "name": "CVE-2022-41183", - "full_name": "Live-Hack-CVE\/CVE-2022-41183", + "id": 582031052, + "name": "CVE-2022-35265", + "full_name": "Live-Hack-CVE\/CVE-2022-35265", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41183", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41183 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35265", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35265 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:51:12Z", - "updated_at": "2022-12-24T15:51:12Z", - "pushed_at": "2022-12-24T15:51:14Z", + "created_at": "2022-12-25T11:34:36Z", + "updated_at": "2022-12-25T11:34:36Z", + "pushed_at": "2022-12-25T11:34:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-35266.json b/2022/CVE-2022-35266.json new file mode 100644 index 0000000000..f662394968 --- /dev/null +++ b/2022/CVE-2022-35266.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031060, + "name": "CVE-2022-35266", + "full_name": "Live-Hack-CVE\/CVE-2022-35266", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35266", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35266 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:39Z", + "updated_at": "2022-12-25T11:34:39Z", + "pushed_at": "2022-12-25T11:34:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35267.json b/2022/CVE-2022-35267.json new file mode 100644 index 0000000000..890bd04c0e --- /dev/null +++ b/2022/CVE-2022-35267.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031074, + "name": "CVE-2022-35267", + "full_name": "Live-Hack-CVE\/CVE-2022-35267", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35267", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35267 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:43Z", + "updated_at": "2022-12-25T11:34:43Z", + "pushed_at": "2022-12-25T11:34:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35268.json b/2022/CVE-2022-35268.json new file mode 100644 index 0000000000..0043d05787 --- /dev/null +++ b/2022/CVE-2022-35268.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031091, + "name": "CVE-2022-35268", + "full_name": "Live-Hack-CVE\/CVE-2022-35268", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35268", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35268 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:46Z", + "updated_at": "2022-12-25T11:34:46Z", + "pushed_at": "2022-12-25T11:34:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35269.json b/2022/CVE-2022-35269.json new file mode 100644 index 0000000000..bdd2eb1e49 --- /dev/null +++ b/2022/CVE-2022-35269.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031109, + "name": "CVE-2022-35269", + "full_name": "Live-Hack-CVE\/CVE-2022-35269", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35269", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35269 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:49Z", + "updated_at": "2022-12-25T11:34:49Z", + "pushed_at": "2022-12-25T11:34:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35270.json b/2022/CVE-2022-35270.json new file mode 100644 index 0000000000..10b5aeb213 --- /dev/null +++ b/2022/CVE-2022-35270.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031028, + "name": "CVE-2022-35270", + "full_name": "Live-Hack-CVE\/CVE-2022-35270", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35270", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35270 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:34:30Z", + "updated_at": "2022-12-25T11:34:30Z", + "pushed_at": "2022-12-25T11:34:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20432.json b/2022/CVE-2022-35271.json similarity index 75% rename from 2022/CVE-2022-20432.json rename to 2022/CVE-2022-35271.json index 7067d3e051..6e93b9f412 100644 --- a/2022/CVE-2022-20432.json +++ b/2022/CVE-2022-35271.json @@ -1,20 +1,20 @@ [ { - "id": 581855508, - "name": "CVE-2022-20432", - "full_name": "Live-Hack-CVE\/CVE-2022-20432", + "id": 582031119, + "name": "CVE-2022-35271", + "full_name": "Live-Hack-CVE\/CVE-2022-35271", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20432", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20432 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35271", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35271 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:49:02Z", - "updated_at": "2022-12-24T15:49:02Z", - "pushed_at": "2022-12-24T15:49:04Z", + "created_at": "2022-12-25T11:34:53Z", + "updated_at": "2022-12-25T11:34:53Z", + "pushed_at": "2022-12-25T11:34:55Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-35296.json b/2022/CVE-2022-35296.json deleted file mode 100644 index cff213ad54..0000000000 --- a/2022/CVE-2022-35296.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857074, - "name": "CVE-2022-35296", - "full_name": "Live-Hack-CVE\/CVE-2022-35296", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35296", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35296 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:55:39Z", - "updated_at": "2022-12-24T15:55:39Z", - "pushed_at": "2022-12-24T15:55:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35299.json b/2022/CVE-2022-35299.json deleted file mode 100644 index e842ddba44..0000000000 --- a/2022/CVE-2022-35299.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856961, - "name": "CVE-2022-35299", - "full_name": "Live-Hack-CVE\/CVE-2022-35299", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35299", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35299 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:55:10Z", - "updated_at": "2022-12-24T15:55:10Z", - "pushed_at": "2022-12-24T15:55:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3545.json b/2022/CVE-2022-3545.json new file mode 100644 index 0000000000..76fa31a53f --- /dev/null +++ b/2022/CVE-2022-3545.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024718, + "name": "CVE-2022-3545", + "full_name": "Live-Hack-CVE\/CVE-2022-3545", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3545", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3545 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:13Z", + "updated_at": "2022-12-25T11:00:13Z", + "pushed_at": "2022-12-25T11:00:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35611.json b/2022/CVE-2022-35611.json deleted file mode 100644 index c7864306cc..0000000000 --- a/2022/CVE-2022-35611.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837999, - "name": "CVE-2022-35611", - "full_name": "Live-Hack-CVE\/CVE-2022-35611", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35611", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35611 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:14Z", - "updated_at": "2022-12-24T14:29:14Z", - "pushed_at": "2022-12-24T14:29:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35612.json b/2022/CVE-2022-35612.json deleted file mode 100644 index c5f1c0cbdd..0000000000 --- a/2022/CVE-2022-35612.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838307, - "name": "CVE-2022-35612", - "full_name": "Live-Hack-CVE\/CVE-2022-35612", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35612", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35612 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:30:36Z", - "updated_at": "2022-12-24T14:30:36Z", - "pushed_at": "2022-12-24T14:30:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3564.json b/2022/CVE-2022-3564.json new file mode 100644 index 0000000000..1166ebf88e --- /dev/null +++ b/2022/CVE-2022-3564.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023812, + "name": "CVE-2022-3564", + "full_name": "Live-Hack-CVE\/CVE-2022-3564", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3564", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3564 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:10Z", + "updated_at": "2022-12-25T10:55:10Z", + "pushed_at": "2022-12-25T10:55:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35646.json b/2022/CVE-2022-35646.json new file mode 100644 index 0000000000..c7576e89b6 --- /dev/null +++ b/2022/CVE-2022-35646.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032386, + "name": "CVE-2022-35646", + "full_name": "Live-Hack-CVE\/CVE-2022-35646", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35646", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35646 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:08Z", + "updated_at": "2022-12-25T11:41:08Z", + "pushed_at": "2022-12-25T11:41:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3565.json b/2022/CVE-2022-3565.json new file mode 100644 index 0000000000..6fa8b8ef5f --- /dev/null +++ b/2022/CVE-2022-3565.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023825, + "name": "CVE-2022-3565", + "full_name": "Live-Hack-CVE\/CVE-2022-3565", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3565", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3565 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:13Z", + "updated_at": "2022-12-25T10:55:13Z", + "pushed_at": "2022-12-25T10:55:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35770.json b/2022/CVE-2022-35770.json deleted file mode 100644 index 8bb1b51bd8..0000000000 --- a/2022/CVE-2022-35770.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864639, - "name": "CVE-2022-35770", - "full_name": "Live-Hack-CVE\/CVE-2022-35770", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35770", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35770 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:30:45Z", - "updated_at": "2022-12-24T16:30:45Z", - "pushed_at": "2022-12-24T16:30:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35823.json b/2022/CVE-2022-35823.json new file mode 100644 index 0000000000..e44934d9cb --- /dev/null +++ b/2022/CVE-2022-35823.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039772, + "name": "CVE-2022-35823", + "full_name": "Live-Hack-CVE\/CVE-2022-35823", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35823", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35823 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:19:49Z", + "updated_at": "2022-12-25T12:19:49Z", + "pushed_at": "2022-12-25T12:19:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35829.json b/2022/CVE-2022-35829.json deleted file mode 100644 index 1d7133d69d..0000000000 --- a/2022/CVE-2022-35829.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837991, - "name": "CVE-2022-35829", - "full_name": "Live-Hack-CVE\/CVE-2022-35829", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35829", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35829 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:11Z", - "updated_at": "2022-12-24T14:29:11Z", - "pushed_at": "2022-12-24T14:29:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3594.json b/2022/CVE-2022-3594.json new file mode 100644 index 0000000000..b5f69c85ea --- /dev/null +++ b/2022/CVE-2022-3594.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023801, + "name": "CVE-2022-3594", + "full_name": "Live-Hack-CVE\/CVE-2022-3594", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3594", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3594 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:06Z", + "updated_at": "2022-12-25T10:55:06Z", + "pushed_at": "2022-12-25T10:55:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36063.json b/2022/CVE-2022-36063.json deleted file mode 100644 index c0e7da50ce..0000000000 --- a/2022/CVE-2022-36063.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856723, - "name": "CVE-2022-36063", - "full_name": "Live-Hack-CVE\/CVE-2022-36063", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36063", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36063 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:54:07Z", - "updated_at": "2022-12-24T15:54:07Z", - "pushed_at": "2022-12-24T15:54:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41380.json b/2022/CVE-2022-36314.json similarity index 76% rename from 2022/CVE-2022-41380.json rename to 2022/CVE-2022-36314.json index f64517d498..9aef5a85be 100644 --- a/2022/CVE-2022-41380.json +++ b/2022/CVE-2022-36314.json @@ -1,20 +1,20 @@ [ { - "id": 581856635, - "name": "CVE-2022-41380", - "full_name": "Live-Hack-CVE\/CVE-2022-41380", + "id": 582031492, + "name": "CVE-2022-36314", + "full_name": "Live-Hack-CVE\/CVE-2022-36314", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41380", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41380 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36314", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36314 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:53:43Z", - "updated_at": "2022-12-24T15:53:43Z", - "pushed_at": "2022-12-24T15:53:45Z", + "created_at": "2022-12-25T11:36:35Z", + "updated_at": "2022-12-25T11:36:35Z", + "pushed_at": "2022-12-25T11:36:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-36315.json b/2022/CVE-2022-36315.json new file mode 100644 index 0000000000..a9b35c8b10 --- /dev/null +++ b/2022/CVE-2022-36315.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039457, + "name": "CVE-2022-36315", + "full_name": "Live-Hack-CVE\/CVE-2022-36315", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36315", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36315 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:06Z", + "updated_at": "2022-12-25T12:18:06Z", + "pushed_at": "2022-12-25T12:18:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36316.json b/2022/CVE-2022-36316.json new file mode 100644 index 0000000000..2ebafbe5cf --- /dev/null +++ b/2022/CVE-2022-36316.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039472, + "name": "CVE-2022-36316", + "full_name": "Live-Hack-CVE\/CVE-2022-36316", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36316", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36316 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:12Z", + "updated_at": "2022-12-25T12:18:12Z", + "pushed_at": "2022-12-25T12:18:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36317.json b/2022/CVE-2022-36317.json new file mode 100644 index 0000000000..3c2b0f5597 --- /dev/null +++ b/2022/CVE-2022-36317.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032395, + "name": "CVE-2022-36317", + "full_name": "Live-Hack-CVE\/CVE-2022-36317", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36317", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36317 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:12Z", + "updated_at": "2022-12-25T11:41:12Z", + "pushed_at": "2022-12-25T11:41:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36318.json b/2022/CVE-2022-36318.json new file mode 100644 index 0000000000..de01183c5d --- /dev/null +++ b/2022/CVE-2022-36318.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039481, + "name": "CVE-2022-36318", + "full_name": "Live-Hack-CVE\/CVE-2022-36318", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36318", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36318 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:15Z", + "updated_at": "2022-12-25T12:18:15Z", + "pushed_at": "2022-12-25T12:18:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36319.json b/2022/CVE-2022-36319.json new file mode 100644 index 0000000000..1a0c627b8c --- /dev/null +++ b/2022/CVE-2022-36319.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032407, + "name": "CVE-2022-36319", + "full_name": "Live-Hack-CVE\/CVE-2022-36319", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36319", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36319 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:15Z", + "updated_at": "2022-12-25T11:41:15Z", + "pushed_at": "2022-12-25T11:41:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36320.json b/2022/CVE-2022-36320.json new file mode 100644 index 0000000000..1e830e8101 --- /dev/null +++ b/2022/CVE-2022-36320.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031505, + "name": "CVE-2022-36320", + "full_name": "Live-Hack-CVE\/CVE-2022-36320", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36320", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36320 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:39Z", + "updated_at": "2022-12-25T11:36:39Z", + "pushed_at": "2022-12-25T11:36:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36354.json b/2022/CVE-2022-36354.json new file mode 100644 index 0000000000..aad69e5df3 --- /dev/null +++ b/2022/CVE-2022-36354.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030683, + "name": "CVE-2022-36354", + "full_name": "Live-Hack-CVE\/CVE-2022-36354", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36354", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36354 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:40Z", + "updated_at": "2022-12-25T11:32:40Z", + "pushed_at": "2022-12-25T11:32:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36360.json b/2022/CVE-2022-36360.json deleted file mode 100644 index 30155b71f2..0000000000 --- a/2022/CVE-2022-36360.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865042, - "name": "CVE-2022-36360", - "full_name": "Live-Hack-CVE\/CVE-2022-36360", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36360", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36360 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:51Z", - "updated_at": "2022-12-24T16:32:51Z", - "pushed_at": "2022-12-24T16:32:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36361.json b/2022/CVE-2022-36361.json deleted file mode 100644 index acbb247475..0000000000 --- a/2022/CVE-2022-36361.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865037, - "name": "CVE-2022-36361", - "full_name": "Live-Hack-CVE\/CVE-2022-36361", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36361", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36361 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:47Z", - "updated_at": "2022-12-24T16:32:47Z", - "pushed_at": "2022-12-24T16:32:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36362.json b/2022/CVE-2022-36362.json deleted file mode 100644 index 6561169e78..0000000000 --- a/2022/CVE-2022-36362.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865012, - "name": "CVE-2022-36362", - "full_name": "Live-Hack-CVE\/CVE-2022-36362", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36362", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36362 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:38Z", - "updated_at": "2022-12-24T16:32:38Z", - "pushed_at": "2022-12-24T16:32:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36363.json b/2022/CVE-2022-36363.json deleted file mode 100644 index 341c0f3d74..0000000000 --- a/2022/CVE-2022-36363.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864999, - "name": "CVE-2022-36363", - "full_name": "Live-Hack-CVE\/CVE-2022-36363", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36363", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36363 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:35Z", - "updated_at": "2022-12-24T16:32:35Z", - "pushed_at": "2022-12-24T16:32:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38041.json b/2022/CVE-2022-3640.json similarity index 77% rename from 2022/CVE-2022-38041.json rename to 2022/CVE-2022-3640.json index 8416686ce1..0bb3e16c03 100644 --- a/2022/CVE-2022-38041.json +++ b/2022/CVE-2022-3640.json @@ -1,20 +1,20 @@ [ { - "id": 581856475, - "name": "CVE-2022-38041", - "full_name": "Live-Hack-CVE\/CVE-2022-38041", + "id": 582023790, + "name": "CVE-2022-3640", + "full_name": "Live-Hack-CVE\/CVE-2022-3640", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38041", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38041 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3640", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3640 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:52:57Z", - "updated_at": "2022-12-24T15:52:57Z", - "pushed_at": "2022-12-24T15:52:59Z", + "created_at": "2022-12-25T10:55:02Z", + "updated_at": "2022-12-25T10:55:02Z", + "pushed_at": "2022-12-25T10:55:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-3643.json b/2022/CVE-2022-3643.json new file mode 100644 index 0000000000..14a13db518 --- /dev/null +++ b/2022/CVE-2022-3643.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023729, + "name": "CVE-2022-3643", + "full_name": "Live-Hack-CVE\/CVE-2022-3643", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3643", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3643 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:54:44Z", + "updated_at": "2022-12-25T10:54:44Z", + "pushed_at": "2022-12-25T10:54:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36774.json b/2022/CVE-2022-36774.json deleted file mode 100644 index 7ad1f68632..0000000000 --- a/2022/CVE-2022-36774.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829630, - "name": "CVE-2022-36774", - "full_name": "Live-Hack-CVE\/CVE-2022-36774", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36774", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36774 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:52:18Z", - "updated_at": "2022-12-24T13:52:18Z", - "pushed_at": "2022-12-24T13:52:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json index 36998f1406..9a389280d9 100644 --- a/2022/CVE-2022-3699.json +++ b/2022/CVE-2022-3699.json @@ -13,19 +13,19 @@ "description": "CVE-2022-3699 with arbitrary kernel code execution capability", "fork": false, "created_at": "2022-12-25T04:34:26Z", - "updated_at": "2022-12-25T04:37:06Z", + "updated_at": "2022-12-25T09:28:07Z", "pushed_at": "2022-12-25T05:00:39Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 2, "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-37208.json b/2022/CVE-2022-37208.json deleted file mode 100644 index b56a3e6eb4..0000000000 --- a/2022/CVE-2022-37208.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855028, - "name": "CVE-2022-37208", - "full_name": "Live-Hack-CVE\/CVE-2022-37208", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37208", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37208 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:46:45Z", - "updated_at": "2022-12-24T15:46:45Z", - "pushed_at": "2022-12-24T15:46:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37611.json b/2022/CVE-2022-37611.json deleted file mode 100644 index 86829b7ec2..0000000000 --- a/2022/CVE-2022-37611.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837710, - "name": "CVE-2022-37611", - "full_name": "Live-Hack-CVE\/CVE-2022-37611", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37611", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37611 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:53Z", - "updated_at": "2022-12-24T14:27:53Z", - "pushed_at": "2022-12-24T14:27:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37614.json b/2022/CVE-2022-37614.json deleted file mode 100644 index 040c5f0071..0000000000 --- a/2022/CVE-2022-37614.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838010, - "name": "CVE-2022-37614", - "full_name": "Live-Hack-CVE\/CVE-2022-37614", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37614", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37614 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:17Z", - "updated_at": "2022-12-24T14:29:17Z", - "pushed_at": "2022-12-24T14:29:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37617.json b/2022/CVE-2022-37617.json deleted file mode 100644 index 53e95a99c4..0000000000 --- a/2022/CVE-2022-37617.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848106, - "name": "CVE-2022-37617", - "full_name": "Live-Hack-CVE\/CVE-2022-37617", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37617", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37617 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:12Z", - "updated_at": "2022-12-24T15:14:13Z", - "pushed_at": "2022-12-24T15:14:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37832.json b/2022/CVE-2022-37832.json new file mode 100644 index 0000000000..c8a81b9cb8 --- /dev/null +++ b/2022/CVE-2022-37832.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040075, + "name": "CVE-2022-37832", + "full_name": "Live-Hack-CVE\/CVE-2022-37832", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37832", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37832 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:12Z", + "updated_at": "2022-12-25T12:21:12Z", + "pushed_at": "2022-12-25T12:21:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37864.json b/2022/CVE-2022-37864.json deleted file mode 100644 index 2e42361b65..0000000000 --- a/2022/CVE-2022-37864.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864946, - "name": "CVE-2022-37864", - "full_name": "Live-Hack-CVE\/CVE-2022-37864", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37864", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37864 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:32:17Z", - "updated_at": "2022-12-24T16:32:17Z", - "pushed_at": "2022-12-24T16:32:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3794.json b/2022/CVE-2022-3794.json new file mode 100644 index 0000000000..62fa1ab6f7 --- /dev/null +++ b/2022/CVE-2022-3794.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031167, + "name": "CVE-2022-3794", + "full_name": "Live-Hack-CVE\/CVE-2022-3794", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3794", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3794 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:09Z", + "updated_at": "2022-12-25T11:35:09Z", + "pushed_at": "2022-12-25T11:35:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37965.json b/2022/CVE-2022-37965.json deleted file mode 100644 index 16545d6357..0000000000 --- a/2022/CVE-2022-37965.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864601, - "name": "CVE-2022-37965", - "full_name": "Live-Hack-CVE\/CVE-2022-37965", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37965", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37965 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:30:36Z", - "updated_at": "2022-12-24T16:30:36Z", - "pushed_at": "2022-12-24T16:30:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37968.json b/2022/CVE-2022-37968.json deleted file mode 100644 index e68d02fb30..0000000000 --- a/2022/CVE-2022-37968.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864586, - "name": "CVE-2022-37968", - "full_name": "Live-Hack-CVE\/CVE-2022-37968", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37968", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37968 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:30:32Z", - "updated_at": "2022-12-24T16:30:33Z", - "pushed_at": "2022-12-24T16:30:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37970.json b/2022/CVE-2022-37970.json deleted file mode 100644 index 95b0527d94..0000000000 --- a/2022/CVE-2022-37970.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864451, - "name": "CVE-2022-37970", - "full_name": "Live-Hack-CVE\/CVE-2022-37970", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37970", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37970 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:30:01Z", - "updated_at": "2022-12-24T16:30:02Z", - "pushed_at": "2022-12-24T16:30:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37971.json b/2022/CVE-2022-37971.json deleted file mode 100644 index a026346412..0000000000 --- a/2022/CVE-2022-37971.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864437, - "name": "CVE-2022-37971", - "full_name": "Live-Hack-CVE\/CVE-2022-37971", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37971", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37971 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:29:55Z", - "updated_at": "2022-12-24T16:29:55Z", - "pushed_at": "2022-12-24T16:29:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37972.json b/2022/CVE-2022-37972.json new file mode 100644 index 0000000000..46b8403b99 --- /dev/null +++ b/2022/CVE-2022-37972.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039758, + "name": "CVE-2022-37972", + "full_name": "Live-Hack-CVE\/CVE-2022-37972", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37972", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37972 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:19:46Z", + "updated_at": "2022-12-25T12:19:46Z", + "pushed_at": "2022-12-25T12:19:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37974.json b/2022/CVE-2022-37974.json deleted file mode 100644 index cde525c788..0000000000 --- a/2022/CVE-2022-37974.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856497, - "name": "CVE-2022-37974", - "full_name": "Live-Hack-CVE\/CVE-2022-37974", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37974", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37974 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:02Z", - "updated_at": "2022-12-24T15:53:02Z", - "pushed_at": "2022-12-24T15:53:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37976.json b/2022/CVE-2022-37976.json deleted file mode 100644 index 20f9c71353..0000000000 --- a/2022/CVE-2022-37976.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856699, - "name": "CVE-2022-37976", - "full_name": "Live-Hack-CVE\/CVE-2022-37976", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37976", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37976 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:54:00Z", - "updated_at": "2022-12-24T15:54:00Z", - "pushed_at": "2022-12-24T15:54:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37977.json b/2022/CVE-2022-37977.json deleted file mode 100644 index e438315c8c..0000000000 --- a/2022/CVE-2022-37977.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848199, - "name": "CVE-2022-37977", - "full_name": "Live-Hack-CVE\/CVE-2022-37977", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37977", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37977 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:36Z", - "updated_at": "2022-12-24T15:14:36Z", - "pushed_at": "2022-12-24T15:14:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37978.json b/2022/CVE-2022-37978.json deleted file mode 100644 index ea1e78f8d1..0000000000 --- a/2022/CVE-2022-37978.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848179, - "name": "CVE-2022-37978", - "full_name": "Live-Hack-CVE\/CVE-2022-37978", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37978", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37978 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:33Z", - "updated_at": "2022-12-24T15:14:33Z", - "pushed_at": "2022-12-24T15:14:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37981.json b/2022/CVE-2022-37981.json deleted file mode 100644 index 15d0c122c8..0000000000 --- a/2022/CVE-2022-37981.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848385, - "name": "CVE-2022-37981", - "full_name": "Live-Hack-CVE\/CVE-2022-37981", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37981", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37981 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:27Z", - "updated_at": "2022-12-24T15:15:27Z", - "pushed_at": "2022-12-24T15:15:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37982.json b/2022/CVE-2022-37982.json deleted file mode 100644 index d02dea1781..0000000000 --- a/2022/CVE-2022-37982.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848378, - "name": "CVE-2022-37982", - "full_name": "Live-Hack-CVE\/CVE-2022-37982", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37982", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37982 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:24Z", - "updated_at": "2022-12-24T15:15:24Z", - "pushed_at": "2022-12-24T15:15:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37985.json b/2022/CVE-2022-37985.json deleted file mode 100644 index e662df3ef9..0000000000 --- a/2022/CVE-2022-37985.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856872, - "name": "CVE-2022-37985", - "full_name": "Live-Hack-CVE\/CVE-2022-37985", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37985", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37985 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:54:49Z", - "updated_at": "2022-12-24T15:54:49Z", - "pushed_at": "2022-12-24T15:54:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37986.json b/2022/CVE-2022-37986.json deleted file mode 100644 index ff5038b17e..0000000000 --- a/2022/CVE-2022-37986.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856839, - "name": "CVE-2022-37986", - "full_name": "Live-Hack-CVE\/CVE-2022-37986", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37986", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37986 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:54:40Z", - "updated_at": "2022-12-24T15:54:40Z", - "pushed_at": "2022-12-24T15:54:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37987.json b/2022/CVE-2022-37987.json deleted file mode 100644 index e9fde0569c..0000000000 --- a/2022/CVE-2022-37987.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864618, - "name": "CVE-2022-37987", - "full_name": "Live-Hack-CVE\/CVE-2022-37987", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37987", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37987 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:30:39Z", - "updated_at": "2022-12-24T16:30:39Z", - "pushed_at": "2022-12-24T16:30:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37989.json b/2022/CVE-2022-37989.json deleted file mode 100644 index 2f7a7b75eb..0000000000 --- a/2022/CVE-2022-37989.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864421, - "name": "CVE-2022-37989", - "full_name": "Live-Hack-CVE\/CVE-2022-37989", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37989", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37989 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:29:52Z", - "updated_at": "2022-12-24T16:29:52Z", - "pushed_at": "2022-12-24T16:29:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37990.json b/2022/CVE-2022-37990.json deleted file mode 100644 index aea4849874..0000000000 --- a/2022/CVE-2022-37990.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864725, - "name": "CVE-2022-37990", - "full_name": "Live-Hack-CVE\/CVE-2022-37990", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37990", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37990 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:11Z", - "updated_at": "2022-12-24T16:31:11Z", - "pushed_at": "2022-12-24T16:31:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37994.json b/2022/CVE-2022-37994.json deleted file mode 100644 index 666514ef16..0000000000 --- a/2022/CVE-2022-37994.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864855, - "name": "CVE-2022-37994", - "full_name": "Live-Hack-CVE\/CVE-2022-37994", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37994", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37994 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:52Z", - "updated_at": "2022-12-24T16:31:52Z", - "pushed_at": "2022-12-24T16:31:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37995.json b/2022/CVE-2022-37995.json deleted file mode 100644 index 8298ce2b1e..0000000000 --- a/2022/CVE-2022-37995.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864809, - "name": "CVE-2022-37995", - "full_name": "Live-Hack-CVE\/CVE-2022-37995", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37995", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37995 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:35Z", - "updated_at": "2022-12-24T16:31:35Z", - "pushed_at": "2022-12-24T16:31:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37996.json b/2022/CVE-2022-37996.json deleted file mode 100644 index 745d27c253..0000000000 --- a/2022/CVE-2022-37996.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864775, - "name": "CVE-2022-37996", - "full_name": "Live-Hack-CVE\/CVE-2022-37996", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37996", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37996 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:25Z", - "updated_at": "2022-12-24T16:31:25Z", - "pushed_at": "2022-12-24T16:31:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37998.json b/2022/CVE-2022-37998.json deleted file mode 100644 index 705b332875..0000000000 --- a/2022/CVE-2022-37998.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848527, - "name": "CVE-2022-37998", - "full_name": "Live-Hack-CVE\/CVE-2022-37998", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37998", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37998 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:16:06Z", - "updated_at": "2022-12-24T15:16:06Z", - "pushed_at": "2022-12-24T15:16:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37999.json b/2022/CVE-2022-37999.json deleted file mode 100644 index 4b515aab9b..0000000000 --- a/2022/CVE-2022-37999.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848542, - "name": "CVE-2022-37999", - "full_name": "Live-Hack-CVE\/CVE-2022-37999", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37999", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37999 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:16:09Z", - "updated_at": "2022-12-24T15:16:09Z", - "pushed_at": "2022-12-24T15:16:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38000.json b/2022/CVE-2022-38000.json deleted file mode 100644 index b3d301f530..0000000000 --- a/2022/CVE-2022-38000.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855013, - "name": "CVE-2022-38000", - "full_name": "Live-Hack-CVE\/CVE-2022-38000", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38000", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38000 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:46:42Z", - "updated_at": "2022-12-24T15:46:42Z", - "pushed_at": "2022-12-24T15:46:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38003.json b/2022/CVE-2022-38003.json deleted file mode 100644 index 013c599529..0000000000 --- a/2022/CVE-2022-38003.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856997, - "name": "CVE-2022-38003", - "full_name": "Live-Hack-CVE\/CVE-2022-38003", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38003", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38003 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:55:20Z", - "updated_at": "2022-12-24T15:55:20Z", - "pushed_at": "2022-12-24T15:55:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38016.json b/2022/CVE-2022-38016.json deleted file mode 100644 index cf39bfd57b..0000000000 --- a/2022/CVE-2022-38016.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856969, - "name": "CVE-2022-38016", - "full_name": "Live-Hack-CVE\/CVE-2022-38016", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38016", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38016 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:55:13Z", - "updated_at": "2022-12-24T15:55:13Z", - "pushed_at": "2022-12-24T15:55:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38017.json b/2022/CVE-2022-38017.json deleted file mode 100644 index 5876a8b901..0000000000 --- a/2022/CVE-2022-38017.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857414, - "name": "CVE-2022-38017", - "full_name": "Live-Hack-CVE\/CVE-2022-38017", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38017", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38017 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:57:07Z", - "updated_at": "2022-12-24T15:57:07Z", - "pushed_at": "2022-12-24T15:57:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38021.json b/2022/CVE-2022-38021.json deleted file mode 100644 index 2b22adade9..0000000000 --- a/2022/CVE-2022-38021.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857433, - "name": "CVE-2022-38021", - "full_name": "Live-Hack-CVE\/CVE-2022-38021", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38021", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38021 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:57:10Z", - "updated_at": "2022-12-24T15:57:11Z", - "pushed_at": "2022-12-24T15:57:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38025.json b/2022/CVE-2022-38025.json deleted file mode 100644 index 211e8cf339..0000000000 --- a/2022/CVE-2022-38025.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857454, - "name": "CVE-2022-38025", - "full_name": "Live-Hack-CVE\/CVE-2022-38025", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38025", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38025 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:57:17Z", - "updated_at": "2022-12-24T15:57:17Z", - "pushed_at": "2022-12-24T15:57:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38026.json b/2022/CVE-2022-38026.json deleted file mode 100644 index a644c53918..0000000000 --- a/2022/CVE-2022-38026.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857491, - "name": "CVE-2022-38026", - "full_name": "Live-Hack-CVE\/CVE-2022-38026", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38026", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38026 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:57:27Z", - "updated_at": "2022-12-24T15:57:27Z", - "pushed_at": "2022-12-24T15:57:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38027.json b/2022/CVE-2022-38027.json deleted file mode 100644 index 1cd69e10a8..0000000000 --- a/2022/CVE-2022-38027.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857476, - "name": "CVE-2022-38027", - "full_name": "Live-Hack-CVE\/CVE-2022-38027", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38027", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38027 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:57:23Z", - "updated_at": "2022-12-24T15:57:24Z", - "pushed_at": "2022-12-24T15:57:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38028.json b/2022/CVE-2022-38028.json deleted file mode 100644 index cd98834279..0000000000 --- a/2022/CVE-2022-38028.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857379, - "name": "CVE-2022-38028", - "full_name": "Live-Hack-CVE\/CVE-2022-38028", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38028", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38028 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:57:00Z", - "updated_at": "2022-12-24T15:57:01Z", - "pushed_at": "2022-12-24T15:57:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38029.json b/2022/CVE-2022-38029.json deleted file mode 100644 index 155a67823b..0000000000 --- a/2022/CVE-2022-38029.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857199, - "name": "CVE-2022-38029", - "full_name": "Live-Hack-CVE\/CVE-2022-38029", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38029", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38029 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:13Z", - "updated_at": "2022-12-24T15:56:13Z", - "pushed_at": "2022-12-24T15:56:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38030.json b/2022/CVE-2022-38030.json deleted file mode 100644 index aa527feaf2..0000000000 --- a/2022/CVE-2022-38030.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857167, - "name": "CVE-2022-38030", - "full_name": "Live-Hack-CVE\/CVE-2022-38030", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38030", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38030 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:06Z", - "updated_at": "2022-12-24T15:56:06Z", - "pushed_at": "2022-12-24T15:56:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38031.json b/2022/CVE-2022-38031.json deleted file mode 100644 index c3f1744856..0000000000 --- a/2022/CVE-2022-38031.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857391, - "name": "CVE-2022-38031", - "full_name": "Live-Hack-CVE\/CVE-2022-38031", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38031", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38031 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:57:04Z", - "updated_at": "2022-12-24T15:57:04Z", - "pushed_at": "2022-12-24T15:57:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38033.json b/2022/CVE-2022-38033.json deleted file mode 100644 index 54736059ae..0000000000 --- a/2022/CVE-2022-38033.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857154, - "name": "CVE-2022-38033", - "full_name": "Live-Hack-CVE\/CVE-2022-38033", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38033", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38033 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:03Z", - "updated_at": "2022-12-24T15:56:03Z", - "pushed_at": "2022-12-24T15:56:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38036.json b/2022/CVE-2022-38036.json deleted file mode 100644 index 423dfeebb9..0000000000 --- a/2022/CVE-2022-38036.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857219, - "name": "CVE-2022-38036", - "full_name": "Live-Hack-CVE\/CVE-2022-38036", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38036", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38036 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:20Z", - "updated_at": "2022-12-24T15:56:20Z", - "pushed_at": "2022-12-24T15:56:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38039.json b/2022/CVE-2022-38039.json deleted file mode 100644 index 4f5526656e..0000000000 --- a/2022/CVE-2022-38039.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857366, - "name": "CVE-2022-38039", - "full_name": "Live-Hack-CVE\/CVE-2022-38039", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38039", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38039 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:57Z", - "updated_at": "2022-12-24T15:56:57Z", - "pushed_at": "2022-12-24T15:56:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38040.json b/2022/CVE-2022-38040.json deleted file mode 100644 index 001196e925..0000000000 --- a/2022/CVE-2022-38040.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857209, - "name": "CVE-2022-38040", - "full_name": "Live-Hack-CVE\/CVE-2022-38040", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38040", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38040 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:16Z", - "updated_at": "2022-12-24T15:56:16Z", - "pushed_at": "2022-12-24T15:56:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38044.json b/2022/CVE-2022-38044.json deleted file mode 100644 index 04774a0a9e..0000000000 --- a/2022/CVE-2022-38044.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856466, - "name": "CVE-2022-38044", - "full_name": "Live-Hack-CVE\/CVE-2022-38044", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38044", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38044 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:54Z", - "updated_at": "2022-12-24T15:52:54Z", - "pushed_at": "2022-12-24T15:52:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38047.json b/2022/CVE-2022-38047.json deleted file mode 100644 index 45acb670fa..0000000000 --- a/2022/CVE-2022-38047.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848007, - "name": "CVE-2022-38047", - "full_name": "Live-Hack-CVE\/CVE-2022-38047", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38047", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38047 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:46Z", - "updated_at": "2022-12-24T15:13:46Z", - "pushed_at": "2022-12-24T15:13:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38048.json b/2022/CVE-2022-38048.json deleted file mode 100644 index 259c1fb775..0000000000 --- a/2022/CVE-2022-38048.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856522, - "name": "CVE-2022-38048", - "full_name": "Live-Hack-CVE\/CVE-2022-38048", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38048", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38048 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:08Z", - "updated_at": "2022-12-24T15:53:08Z", - "pushed_at": "2022-12-24T15:53:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38049.json b/2022/CVE-2022-38049.json deleted file mode 100644 index 0ddcd1c202..0000000000 --- a/2022/CVE-2022-38049.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848034, - "name": "CVE-2022-38049", - "full_name": "Live-Hack-CVE\/CVE-2022-38049", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38049", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38049 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:53Z", - "updated_at": "2022-12-24T15:13:53Z", - "pushed_at": "2022-12-24T15:13:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3805.json b/2022/CVE-2022-3805.json new file mode 100644 index 0000000000..6cc167144a --- /dev/null +++ b/2022/CVE-2022-3805.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031187, + "name": "CVE-2022-3805", + "full_name": "Live-Hack-CVE\/CVE-2022-3805", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3805", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3805 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:13Z", + "updated_at": "2022-12-25T11:35:13Z", + "pushed_at": "2022-12-25T11:35:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38050.json b/2022/CVE-2022-38050.json deleted file mode 100644 index e74a36a372..0000000000 --- a/2022/CVE-2022-38050.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848020, - "name": "CVE-2022-38050", - "full_name": "Live-Hack-CVE\/CVE-2022-38050", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38050", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38050 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:13:50Z", - "updated_at": "2022-12-24T15:13:50Z", - "pushed_at": "2022-12-24T15:13:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38053.json b/2022/CVE-2022-38053.json deleted file mode 100644 index 6842ffab92..0000000000 --- a/2022/CVE-2022-38053.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848067, - "name": "CVE-2022-38053", - "full_name": "Live-Hack-CVE\/CVE-2022-38053", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38053", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38053 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:03Z", - "updated_at": "2022-12-24T15:14:03Z", - "pushed_at": "2022-12-24T15:14:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38086.json b/2022/CVE-2022-38086.json deleted file mode 100644 index 699fb85b75..0000000000 --- a/2022/CVE-2022-38086.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857139, - "name": "CVE-2022-38086", - "full_name": "Live-Hack-CVE\/CVE-2022-38086", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38086", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38086 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:55:59Z", - "updated_at": "2022-12-24T15:55:59Z", - "pushed_at": "2022-12-24T15:56:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38143.json b/2022/CVE-2022-38143.json new file mode 100644 index 0000000000..96b3d1d3b4 --- /dev/null +++ b/2022/CVE-2022-38143.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030792, + "name": "CVE-2022-38143", + "full_name": "Live-Hack-CVE\/CVE-2022-38143", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38143", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38143 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:17Z", + "updated_at": "2022-12-25T11:33:17Z", + "pushed_at": "2022-12-25T11:33:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41174.json b/2022/CVE-2022-38472.json similarity index 78% rename from 2022/CVE-2022-41174.json rename to 2022/CVE-2022-38472.json index 04908ef7d4..02aabe35ea 100644 --- a/2022/CVE-2022-41174.json +++ b/2022/CVE-2022-38472.json @@ -1,20 +1,20 @@ [ { - "id": 581856384, - "name": "CVE-2022-41174", - "full_name": "Live-Hack-CVE\/CVE-2022-41174", + "id": 582039497, + "name": "CVE-2022-38472", + "full_name": "Live-Hack-CVE\/CVE-2022-38472", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41174", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41174 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38472", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38472 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:52:33Z", - "updated_at": "2022-12-24T15:52:34Z", - "pushed_at": "2022-12-24T15:52:35Z", + "created_at": "2022-12-25T12:18:19Z", + "updated_at": "2022-12-25T12:18:19Z", + "pushed_at": "2022-12-25T12:18:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-38473.json b/2022/CVE-2022-38473.json new file mode 100644 index 0000000000..741c288a5f --- /dev/null +++ b/2022/CVE-2022-38473.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039511, + "name": "CVE-2022-38473", + "full_name": "Live-Hack-CVE\/CVE-2022-38473", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38473", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38473 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:22Z", + "updated_at": "2022-12-25T12:18:22Z", + "pushed_at": "2022-12-25T12:18:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41496.json b/2022/CVE-2022-38474.json similarity index 76% rename from 2022/CVE-2022-41496.json rename to 2022/CVE-2022-38474.json index 96932a11ad..4a34d7b1bc 100644 --- a/2022/CVE-2022-41496.json +++ b/2022/CVE-2022-38474.json @@ -1,20 +1,20 @@ [ { - "id": 581838894, - "name": "CVE-2022-41496", - "full_name": "Live-Hack-CVE\/CVE-2022-41496", + "id": 582032417, + "name": "CVE-2022-38474", + "full_name": "Live-Hack-CVE\/CVE-2022-38474", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41496", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41496 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38474", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38474 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:33:11Z", - "updated_at": "2022-12-24T14:33:11Z", - "pushed_at": "2022-12-24T14:33:13Z", + "created_at": "2022-12-25T11:41:18Z", + "updated_at": "2022-12-25T11:41:18Z", + "pushed_at": "2022-12-25T11:41:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-38475.json b/2022/CVE-2022-38475.json new file mode 100644 index 0000000000..3d74a2f286 --- /dev/null +++ b/2022/CVE-2022-38475.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039522, + "name": "CVE-2022-38475", + "full_name": "Live-Hack-CVE\/CVE-2022-38475", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38475", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38475 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:25Z", + "updated_at": "2022-12-25T12:18:25Z", + "pushed_at": "2022-12-25T12:18:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38476.json b/2022/CVE-2022-38476.json new file mode 100644 index 0000000000..31a4bd43d0 --- /dev/null +++ b/2022/CVE-2022-38476.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032432, + "name": "CVE-2022-38476", + "full_name": "Live-Hack-CVE\/CVE-2022-38476", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38476", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38476 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:21Z", + "updated_at": "2022-12-25T11:41:21Z", + "pushed_at": "2022-12-25T11:41:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38477.json b/2022/CVE-2022-38477.json new file mode 100644 index 0000000000..44d521bc47 --- /dev/null +++ b/2022/CVE-2022-38477.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032443, + "name": "CVE-2022-38477", + "full_name": "Live-Hack-CVE\/CVE-2022-38477", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38477", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38477 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:24Z", + "updated_at": "2022-12-25T11:41:24Z", + "pushed_at": "2022-12-25T11:41:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38478.json b/2022/CVE-2022-38478.json new file mode 100644 index 0000000000..6365a50adf --- /dev/null +++ b/2022/CVE-2022-38478.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032453, + "name": "CVE-2022-38478", + "full_name": "Live-Hack-CVE\/CVE-2022-38478", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38478", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38478 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:28Z", + "updated_at": "2022-12-25T11:41:28Z", + "pushed_at": "2022-12-25T11:41:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39013.json b/2022/CVE-2022-38658.json similarity index 78% rename from 2022/CVE-2022-39013.json rename to 2022/CVE-2022-38658.json index 021da199cd..99023d637f 100644 --- a/2022/CVE-2022-39013.json +++ b/2022/CVE-2022-38658.json @@ -1,20 +1,20 @@ [ { - "id": 581837752, - "name": "CVE-2022-39013", - "full_name": "Live-Hack-CVE\/CVE-2022-39013", + "id": 582023290, + "name": "CVE-2022-38658", + "full_name": "Live-Hack-CVE\/CVE-2022-38658", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39013", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39013 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38658", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38658 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:28:03Z", - "updated_at": "2022-12-24T14:28:03Z", - "pushed_at": "2022-12-24T14:28:05Z", + "created_at": "2022-12-25T10:52:10Z", + "updated_at": "2022-12-25T10:52:10Z", + "pushed_at": "2022-12-25T10:52:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-38709.json b/2022/CVE-2022-38709.json deleted file mode 100644 index 0e198d9932..0000000000 --- a/2022/CVE-2022-38709.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829641, - "name": "CVE-2022-38709", - "full_name": "Live-Hack-CVE\/CVE-2022-38709", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38709", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38709 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:52:21Z", - "updated_at": "2022-12-24T13:52:21Z", - "pushed_at": "2022-12-24T13:52:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38756.json b/2022/CVE-2022-38756.json new file mode 100644 index 0000000000..46b3bf963f --- /dev/null +++ b/2022/CVE-2022-38756.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040214, + "name": "CVE-2022-38756", + "full_name": "Live-Hack-CVE\/CVE-2022-38756", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38756", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38756 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:45Z", + "updated_at": "2022-12-25T12:21:45Z", + "pushed_at": "2022-12-25T12:21:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22035.json b/2022/CVE-2022-38757.json similarity index 75% rename from 2022/CVE-2022-22035.json rename to 2022/CVE-2022-38757.json index 531d593c99..4078148709 100644 --- a/2022/CVE-2022-22035.json +++ b/2022/CVE-2022-38757.json @@ -1,20 +1,20 @@ [ { - "id": 581848338, - "name": "CVE-2022-22035", - "full_name": "Live-Hack-CVE\/CVE-2022-22035", + "id": 582024602, + "name": "CVE-2022-38757", + "full_name": "Live-Hack-CVE\/CVE-2022-38757", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22035", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22035 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38757", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38757 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:15:14Z", - "updated_at": "2022-12-24T15:15:14Z", - "pushed_at": "2022-12-24T15:15:16Z", + "created_at": "2022-12-25T10:59:34Z", + "updated_at": "2022-12-25T10:59:34Z", + "pushed_at": "2022-12-25T10:59:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-39015.json b/2022/CVE-2022-39015.json deleted file mode 100644 index 67efa0599b..0000000000 --- a/2022/CVE-2022-39015.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837724, - "name": "CVE-2022-39015", - "full_name": "Live-Hack-CVE\/CVE-2022-39015", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39015", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39015 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:56Z", - "updated_at": "2022-12-24T14:27:56Z", - "pushed_at": "2022-12-24T14:27:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39164.json b/2022/CVE-2022-39164.json new file mode 100644 index 0000000000..2280ed1a1f --- /dev/null +++ b/2022/CVE-2022-39164.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023393, + "name": "CVE-2022-39164", + "full_name": "Live-Hack-CVE\/CVE-2022-39164", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39164", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39164 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:44Z", + "updated_at": "2022-12-25T10:52:44Z", + "pushed_at": "2022-12-25T10:52:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39165.json b/2022/CVE-2022-39165.json new file mode 100644 index 0000000000..c84baef5a9 --- /dev/null +++ b/2022/CVE-2022-39165.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023964, + "name": "CVE-2022-39165", + "full_name": "Live-Hack-CVE\/CVE-2022-39165", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39165", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39165 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:57Z", + "updated_at": "2022-12-25T10:55:57Z", + "pushed_at": "2022-12-25T10:55:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39296.json b/2022/CVE-2022-39296.json deleted file mode 100644 index a24af2ddde..0000000000 --- a/2022/CVE-2022-39296.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847100, - "name": "CVE-2022-39296", - "full_name": "Live-Hack-CVE\/CVE-2022-39296", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39296", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39296 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:09:52Z", - "updated_at": "2022-12-24T15:09:52Z", - "pushed_at": "2022-12-24T15:09:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39297.json b/2022/CVE-2022-39297.json deleted file mode 100644 index 81191e7ff6..0000000000 --- a/2022/CVE-2022-39297.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847717, - "name": "CVE-2022-39297", - "full_name": "Live-Hack-CVE\/CVE-2022-39297", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39297", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39297 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:31Z", - "updated_at": "2022-12-24T15:12:31Z", - "pushed_at": "2022-12-24T15:12:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39298.json b/2022/CVE-2022-39298.json deleted file mode 100644 index ed8f1eea89..0000000000 --- a/2022/CVE-2022-39298.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847724, - "name": "CVE-2022-39298", - "full_name": "Live-Hack-CVE\/CVE-2022-39298", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39298", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39298 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:34Z", - "updated_at": "2022-12-24T15:12:34Z", - "pushed_at": "2022-12-24T15:12:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39803.json b/2022/CVE-2022-39803.json deleted file mode 100644 index 6b5dd6a64b..0000000000 --- a/2022/CVE-2022-39803.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856451, - "name": "CVE-2022-39803", - "full_name": "Live-Hack-CVE\/CVE-2022-39803", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39803", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39803 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:50Z", - "updated_at": "2022-12-24T15:52:50Z", - "pushed_at": "2022-12-24T15:52:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39804.json b/2022/CVE-2022-39804.json deleted file mode 100644 index ff43825e66..0000000000 --- a/2022/CVE-2022-39804.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856235, - "name": "CVE-2022-39804", - "full_name": "Live-Hack-CVE\/CVE-2022-39804", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39804", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39804 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:57Z", - "updated_at": "2022-12-24T15:51:57Z", - "pushed_at": "2022-12-24T15:51:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39805.json b/2022/CVE-2022-39805.json deleted file mode 100644 index a6320cb428..0000000000 --- a/2022/CVE-2022-39805.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856222, - "name": "CVE-2022-39805", - "full_name": "Live-Hack-CVE\/CVE-2022-39805", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39805", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39805 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:53Z", - "updated_at": "2022-12-24T15:51:53Z", - "pushed_at": "2022-12-24T15:51:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39806.json b/2022/CVE-2022-39806.json deleted file mode 100644 index 1f4e636013..0000000000 --- a/2022/CVE-2022-39806.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856250, - "name": "CVE-2022-39806", - "full_name": "Live-Hack-CVE\/CVE-2022-39806", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39806", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39806 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:00Z", - "updated_at": "2022-12-24T15:52:00Z", - "pushed_at": "2022-12-24T15:52:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39807.json b/2022/CVE-2022-39807.json deleted file mode 100644 index b07c675dda..0000000000 --- a/2022/CVE-2022-39807.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856175, - "name": "CVE-2022-39807", - "full_name": "Live-Hack-CVE\/CVE-2022-39807", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39807", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39807 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:40Z", - "updated_at": "2022-12-24T15:51:40Z", - "pushed_at": "2022-12-24T15:51:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39808.json b/2022/CVE-2022-39808.json deleted file mode 100644 index 03d3f7d0b8..0000000000 --- a/2022/CVE-2022-39808.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856197, - "name": "CVE-2022-39808", - "full_name": "Live-Hack-CVE\/CVE-2022-39808", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39808", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39808 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:47Z", - "updated_at": "2022-12-24T15:51:47Z", - "pushed_at": "2022-12-24T15:51:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39862.json b/2022/CVE-2022-39862.json deleted file mode 100644 index 1dc91479e8..0000000000 --- a/2022/CVE-2022-39862.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865383, - "name": "CVE-2022-39862", - "full_name": "Live-Hack-CVE\/CVE-2022-39862", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39862", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39862 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:34Z", - "updated_at": "2022-12-24T16:34:34Z", - "pushed_at": "2022-12-24T16:34:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39863.json b/2022/CVE-2022-39863.json deleted file mode 100644 index 1617dd4bf1..0000000000 --- a/2022/CVE-2022-39863.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865520, - "name": "CVE-2022-39863", - "full_name": "Live-Hack-CVE\/CVE-2022-39863", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39863", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39863 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:11Z", - "updated_at": "2022-12-24T16:35:11Z", - "pushed_at": "2022-12-24T16:35:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39864.json b/2022/CVE-2022-39864.json deleted file mode 100644 index ea7869f48a..0000000000 --- a/2022/CVE-2022-39864.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865530, - "name": "CVE-2022-39864", - "full_name": "Live-Hack-CVE\/CVE-2022-39864", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39864", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39864 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:14Z", - "updated_at": "2022-12-24T16:35:14Z", - "pushed_at": "2022-12-24T16:35:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40011.json b/2022/CVE-2022-40011.json new file mode 100644 index 0000000000..846c8bacde --- /dev/null +++ b/2022/CVE-2022-40011.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023256, + "name": "CVE-2022-40011", + "full_name": "Live-Hack-CVE\/CVE-2022-40011", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40011", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40011 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:00Z", + "updated_at": "2022-12-25T10:52:00Z", + "pushed_at": "2022-12-25T10:52:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40047.json b/2022/CVE-2022-40047.json deleted file mode 100644 index e542e10291..0000000000 --- a/2022/CVE-2022-40047.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848080, - "name": "CVE-2022-40047", - "full_name": "Live-Hack-CVE\/CVE-2022-40047", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40047", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40047 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:06Z", - "updated_at": "2022-12-24T15:14:06Z", - "pushed_at": "2022-12-24T15:14:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40147.json b/2022/CVE-2022-40147.json deleted file mode 100644 index a27b00af9a..0000000000 --- a/2022/CVE-2022-40147.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864795, - "name": "CVE-2022-40147", - "full_name": "Live-Hack-CVE\/CVE-2022-40147", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40147", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40147 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:29Z", - "updated_at": "2022-12-24T16:31:29Z", - "pushed_at": "2022-12-24T16:31:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32485.json b/2022/CVE-2022-40149.json similarity index 78% rename from 2022/CVE-2022-32485.json rename to 2022/CVE-2022-40149.json index 5d9db37ba4..803e4c89a3 100644 --- a/2022/CVE-2022-32485.json +++ b/2022/CVE-2022-40149.json @@ -1,20 +1,20 @@ [ { - "id": 581829840, - "name": "CVE-2022-32485", - "full_name": "Live-Hack-CVE\/CVE-2022-32485", + "id": 582039740, + "name": "CVE-2022-40149", + "full_name": "Live-Hack-CVE\/CVE-2022-40149", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32485", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32485 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40149", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40149 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T13:53:14Z", - "updated_at": "2022-12-24T13:53:14Z", - "pushed_at": "2022-12-24T13:53:16Z", + "created_at": "2022-12-25T12:19:39Z", + "updated_at": "2022-12-25T12:19:39Z", + "pushed_at": "2022-12-25T12:19:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-40177.json b/2022/CVE-2022-40177.json deleted file mode 100644 index 98600e4e7b..0000000000 --- a/2022/CVE-2022-40177.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864085, - "name": "CVE-2022-40177", - "full_name": "Live-Hack-CVE\/CVE-2022-40177", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40177", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40177 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:28:18Z", - "updated_at": "2022-12-24T16:28:19Z", - "pushed_at": "2022-12-24T16:28:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40178.json b/2022/CVE-2022-40178.json deleted file mode 100644 index 2335d2620c..0000000000 --- a/2022/CVE-2022-40178.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857181, - "name": "CVE-2022-40178", - "full_name": "Live-Hack-CVE\/CVE-2022-40178", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40178", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40178 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:10Z", - "updated_at": "2022-12-24T15:56:10Z", - "pushed_at": "2022-12-24T15:56:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40179.json b/2022/CVE-2022-40179.json deleted file mode 100644 index 67d19e9549..0000000000 --- a/2022/CVE-2022-40179.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857291, - "name": "CVE-2022-40179", - "full_name": "Live-Hack-CVE\/CVE-2022-40179", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40179", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40179 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:37Z", - "updated_at": "2022-12-24T15:56:37Z", - "pushed_at": "2022-12-24T15:56:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40180.json b/2022/CVE-2022-40180.json deleted file mode 100644 index 4bde53a869..0000000000 --- a/2022/CVE-2022-40180.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864008, - "name": "CVE-2022-40180", - "full_name": "Live-Hack-CVE\/CVE-2022-40180", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40180", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40180 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:27:59Z", - "updated_at": "2022-12-24T16:27:59Z", - "pushed_at": "2022-12-24T16:28:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40181.json b/2022/CVE-2022-40181.json deleted file mode 100644 index 6f2a806a4d..0000000000 --- a/2022/CVE-2022-40181.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864346, - "name": "CVE-2022-40181", - "full_name": "Live-Hack-CVE\/CVE-2022-40181", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40181", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40181 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:29:32Z", - "updated_at": "2022-12-24T16:29:32Z", - "pushed_at": "2022-12-24T16:29:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40182.json b/2022/CVE-2022-40182.json deleted file mode 100644 index 8a09f5a4cb..0000000000 --- a/2022/CVE-2022-40182.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864360, - "name": "CVE-2022-40182", - "full_name": "Live-Hack-CVE\/CVE-2022-40182", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40182", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40182 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:29:35Z", - "updated_at": "2022-12-24T16:29:35Z", - "pushed_at": "2022-12-24T16:29:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40187.json b/2022/CVE-2022-40187.json deleted file mode 100644 index 5df27bd17e..0000000000 --- a/2022/CVE-2022-40187.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829918, - "name": "CVE-2022-40187", - "full_name": "Live-Hack-CVE\/CVE-2022-40187", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40187", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40187 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:34Z", - "updated_at": "2022-12-24T13:53:34Z", - "pushed_at": "2022-12-24T13:53:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40226.json b/2022/CVE-2022-40226.json deleted file mode 100644 index 3a4093e86b..0000000000 --- a/2022/CVE-2022-40226.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864752, - "name": "CVE-2022-40226", - "full_name": "Live-Hack-CVE\/CVE-2022-40226", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40226", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40226 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:17Z", - "updated_at": "2022-12-24T16:31:17Z", - "pushed_at": "2022-12-24T16:31:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40227.json b/2022/CVE-2022-40227.json deleted file mode 100644 index 4b6beea80d..0000000000 --- a/2022/CVE-2022-40227.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837577, - "name": "CVE-2022-40227", - "full_name": "Live-Hack-CVE\/CVE-2022-40227", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40227", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40227 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:18Z", - "updated_at": "2022-12-24T14:27:18Z", - "pushed_at": "2022-12-24T14:27:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40233.json b/2022/CVE-2022-40233.json new file mode 100644 index 0000000000..22e4ea6820 --- /dev/null +++ b/2022/CVE-2022-40233.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023984, + "name": "CVE-2022-40233", + "full_name": "Live-Hack-CVE\/CVE-2022-40233", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40233", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40233 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:00Z", + "updated_at": "2022-12-25T10:56:00Z", + "pushed_at": "2022-12-25T10:56:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40284.json b/2022/CVE-2022-40284.json new file mode 100644 index 0000000000..a15f2b547f --- /dev/null +++ b/2022/CVE-2022-40284.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030937, + "name": "CVE-2022-40284", + "full_name": "Live-Hack-CVE\/CVE-2022-40284", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40284", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40284 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:59Z", + "updated_at": "2022-12-25T11:33:59Z", + "pushed_at": "2022-12-25T11:34:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40440.json b/2022/CVE-2022-40440.json deleted file mode 100644 index 6ad909c37d..0000000000 --- a/2022/CVE-2022-40440.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829940, - "name": "CVE-2022-40440", - "full_name": "Live-Hack-CVE\/CVE-2022-40440", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40440", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40440 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:53:41Z", - "updated_at": "2022-12-24T13:53:41Z", - "pushed_at": "2022-12-24T13:53:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40777.json b/2022/CVE-2022-40777.json deleted file mode 100644 index df22328f09..0000000000 --- a/2022/CVE-2022-40777.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847331, - "name": "CVE-2022-40777", - "full_name": "Live-Hack-CVE\/CVE-2022-40777", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40777", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40777 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:56Z", - "updated_at": "2022-12-24T15:10:56Z", - "pushed_at": "2022-12-24T15:10:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40871.json b/2022/CVE-2022-40871.json deleted file mode 100644 index 8eebe53ac5..0000000000 --- a/2022/CVE-2022-40871.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829753, - "name": "CVE-2022-40871", - "full_name": "Live-Hack-CVE\/CVE-2022-40871", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40871", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40871 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:52:48Z", - "updated_at": "2022-12-24T13:52:48Z", - "pushed_at": "2022-12-24T13:52:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40897.json b/2022/CVE-2022-40897.json new file mode 100644 index 0000000000..4953ac830f --- /dev/null +++ b/2022/CVE-2022-40897.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030492, + "name": "CVE-2022-40897", + "full_name": "Live-Hack-CVE\/CVE-2022-40897", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40897", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40897 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:31:45Z", + "updated_at": "2022-12-25T11:31:45Z", + "pushed_at": "2022-12-25T11:31:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40898.json b/2022/CVE-2022-40898.json new file mode 100644 index 0000000000..a1fd92d986 --- /dev/null +++ b/2022/CVE-2022-40898.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030508, + "name": "CVE-2022-40898", + "full_name": "Live-Hack-CVE\/CVE-2022-40898", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40898", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40898 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:31:49Z", + "updated_at": "2022-12-25T11:31:49Z", + "pushed_at": "2022-12-25T11:31:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40899.json b/2022/CVE-2022-40899.json new file mode 100644 index 0000000000..6300c1bd72 --- /dev/null +++ b/2022/CVE-2022-40899.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030516, + "name": "CVE-2022-40899", + "full_name": "Live-Hack-CVE\/CVE-2022-40899", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40899", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40899 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:31:52Z", + "updated_at": "2022-12-25T11:31:52Z", + "pushed_at": "2022-12-25T11:31:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40921.json b/2022/CVE-2022-40921.json deleted file mode 100644 index 48e63701fd..0000000000 --- a/2022/CVE-2022-40921.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848507, - "name": "CVE-2022-40921", - "full_name": "Live-Hack-CVE\/CVE-2022-40921", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40921", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40921 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:59Z", - "updated_at": "2022-12-24T15:15:59Z", - "pushed_at": "2022-12-24T15:16:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40956.json b/2022/CVE-2022-40956.json new file mode 100644 index 0000000000..571a80aa97 --- /dev/null +++ b/2022/CVE-2022-40956.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032501, + "name": "CVE-2022-40956", + "full_name": "Live-Hack-CVE\/CVE-2022-40956", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40956", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40956 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:41Z", + "updated_at": "2022-12-25T11:41:41Z", + "pushed_at": "2022-12-25T11:41:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40957.json b/2022/CVE-2022-40957.json new file mode 100644 index 0000000000..d26eedc492 --- /dev/null +++ b/2022/CVE-2022-40957.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032513, + "name": "CVE-2022-40957", + "full_name": "Live-Hack-CVE\/CVE-2022-40957", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40957", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40957 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:44Z", + "updated_at": "2022-12-25T11:41:44Z", + "pushed_at": "2022-12-25T11:41:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40958.json b/2022/CVE-2022-40958.json new file mode 100644 index 0000000000..e18aed73fc --- /dev/null +++ b/2022/CVE-2022-40958.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032525, + "name": "CVE-2022-40958", + "full_name": "Live-Hack-CVE\/CVE-2022-40958", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40958", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40958 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:48Z", + "updated_at": "2022-12-25T11:41:48Z", + "pushed_at": "2022-12-25T11:41:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40959.json b/2022/CVE-2022-40959.json new file mode 100644 index 0000000000..ced03c56ea --- /dev/null +++ b/2022/CVE-2022-40959.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032535, + "name": "CVE-2022-40959", + "full_name": "Live-Hack-CVE\/CVE-2022-40959", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40959", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40959 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:51Z", + "updated_at": "2022-12-25T11:41:51Z", + "pushed_at": "2022-12-25T11:41:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40960.json b/2022/CVE-2022-40960.json new file mode 100644 index 0000000000..1f17645ba0 --- /dev/null +++ b/2022/CVE-2022-40960.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032552, + "name": "CVE-2022-40960", + "full_name": "Live-Hack-CVE\/CVE-2022-40960", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40960", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40960 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:54Z", + "updated_at": "2022-12-25T11:41:54Z", + "pushed_at": "2022-12-25T11:41:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40961.json b/2022/CVE-2022-40961.json new file mode 100644 index 0000000000..c40e2b7a22 --- /dev/null +++ b/2022/CVE-2022-40961.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032568, + "name": "CVE-2022-40961", + "full_name": "Live-Hack-CVE\/CVE-2022-40961", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40961", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40961 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:41:57Z", + "updated_at": "2022-12-25T11:41:57Z", + "pushed_at": "2022-12-25T11:41:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40962.json b/2022/CVE-2022-40962.json new file mode 100644 index 0000000000..ea496e2644 --- /dev/null +++ b/2022/CVE-2022-40962.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031551, + "name": "CVE-2022-40962", + "full_name": "Live-Hack-CVE\/CVE-2022-40962", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40962", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40962 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:36:52Z", + "updated_at": "2022-12-25T11:36:52Z", + "pushed_at": "2022-12-25T11:36:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41031.json b/2022/CVE-2022-41031.json deleted file mode 100644 index 47989a2e7d..0000000000 --- a/2022/CVE-2022-41031.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848089, - "name": "CVE-2022-41031", - "full_name": "Live-Hack-CVE\/CVE-2022-41031", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41031", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41031 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:09Z", - "updated_at": "2022-12-24T15:14:09Z", - "pushed_at": "2022-12-24T15:14:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41033.json b/2022/CVE-2022-41033.json deleted file mode 100644 index 3787e59aae..0000000000 --- a/2022/CVE-2022-41033.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848113, - "name": "CVE-2022-41033", - "full_name": "Live-Hack-CVE\/CVE-2022-41033", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41033", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41033 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:16Z", - "updated_at": "2022-12-24T15:14:16Z", - "pushed_at": "2022-12-24T15:14:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41034.json b/2022/CVE-2022-41034.json deleted file mode 100644 index de0065fa67..0000000000 --- a/2022/CVE-2022-41034.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848128, - "name": "CVE-2022-41034", - "full_name": "Live-Hack-CVE\/CVE-2022-41034", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41034", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41034 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:14:19Z", - "updated_at": "2022-12-24T15:14:19Z", - "pushed_at": "2022-12-24T15:14:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41037.json b/2022/CVE-2022-41037.json deleted file mode 100644 index dbd97313a8..0000000000 --- a/2022/CVE-2022-41037.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581863960, - "name": "CVE-2022-41037", - "full_name": "Live-Hack-CVE\/CVE-2022-41037", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41037", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41037 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:27:48Z", - "updated_at": "2022-12-24T16:27:48Z", - "pushed_at": "2022-12-24T16:27:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41042.json b/2022/CVE-2022-41042.json deleted file mode 100644 index e11ccff242..0000000000 --- a/2022/CVE-2022-41042.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857312, - "name": "CVE-2022-41042", - "full_name": "Live-Hack-CVE\/CVE-2022-41042", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41042", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41042 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:44Z", - "updated_at": "2022-12-24T15:56:44Z", - "pushed_at": "2022-12-24T15:56:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41081.json b/2022/CVE-2022-41081.json deleted file mode 100644 index b5512506ab..0000000000 --- a/2022/CVE-2022-41081.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581857339, - "name": "CVE-2022-41081", - "full_name": "Live-Hack-CVE\/CVE-2022-41081", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41081", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41081 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:56:50Z", - "updated_at": "2022-12-24T15:56:51Z", - "pushed_at": "2022-12-24T15:56:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41166.json b/2022/CVE-2022-41166.json deleted file mode 100644 index 82c408f2c1..0000000000 --- a/2022/CVE-2022-41166.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856210, - "name": "CVE-2022-41166", - "full_name": "Live-Hack-CVE\/CVE-2022-41166", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41166", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41166 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:50Z", - "updated_at": "2022-12-24T15:51:50Z", - "pushed_at": "2022-12-24T15:51:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41168.json b/2022/CVE-2022-41168.json deleted file mode 100644 index cf522dd99a..0000000000 --- a/2022/CVE-2022-41168.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856267, - "name": "CVE-2022-41168", - "full_name": "Live-Hack-CVE\/CVE-2022-41168", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41168", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41168 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:04Z", - "updated_at": "2022-12-24T15:52:04Z", - "pushed_at": "2022-12-24T15:52:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41169.json b/2022/CVE-2022-41169.json deleted file mode 100644 index c1652c8773..0000000000 --- a/2022/CVE-2022-41169.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856396, - "name": "CVE-2022-41169", - "full_name": "Live-Hack-CVE\/CVE-2022-41169", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41169", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41169 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:37Z", - "updated_at": "2022-12-24T15:52:37Z", - "pushed_at": "2022-12-24T15:52:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41170.json b/2022/CVE-2022-41170.json deleted file mode 100644 index 43a39d5ad7..0000000000 --- a/2022/CVE-2022-41170.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856301, - "name": "CVE-2022-41170", - "full_name": "Live-Hack-CVE\/CVE-2022-41170", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41170", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41170 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:13Z", - "updated_at": "2022-12-24T15:52:13Z", - "pushed_at": "2022-12-24T15:52:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41171.json b/2022/CVE-2022-41171.json deleted file mode 100644 index 1ed2ead692..0000000000 --- a/2022/CVE-2022-41171.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856280, - "name": "CVE-2022-41171", - "full_name": "Live-Hack-CVE\/CVE-2022-41171", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41171", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41171 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:07Z", - "updated_at": "2022-12-24T15:52:07Z", - "pushed_at": "2022-12-24T15:52:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41172.json b/2022/CVE-2022-41172.json deleted file mode 100644 index ac194e9b69..0000000000 --- a/2022/CVE-2022-41172.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856312, - "name": "CVE-2022-41172", - "full_name": "Live-Hack-CVE\/CVE-2022-41172", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41172", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41172 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:16Z", - "updated_at": "2022-12-24T15:52:17Z", - "pushed_at": "2022-12-24T15:52:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41173.json b/2022/CVE-2022-41173.json deleted file mode 100644 index 32d5071470..0000000000 --- a/2022/CVE-2022-41173.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856290, - "name": "CVE-2022-41173", - "full_name": "Live-Hack-CVE\/CVE-2022-41173", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41173", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41173 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:10Z", - "updated_at": "2022-12-24T15:52:10Z", - "pushed_at": "2022-12-24T15:52:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41175.json b/2022/CVE-2022-41175.json deleted file mode 100644 index a3fdb4c5aa..0000000000 --- a/2022/CVE-2022-41175.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856412, - "name": "CVE-2022-41175", - "full_name": "Live-Hack-CVE\/CVE-2022-41175", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41175", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41175 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:40Z", - "updated_at": "2022-12-24T15:52:40Z", - "pushed_at": "2022-12-24T15:52:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41176.json b/2022/CVE-2022-41176.json deleted file mode 100644 index 02272c2a19..0000000000 --- a/2022/CVE-2022-41176.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856440, - "name": "CVE-2022-41176", - "full_name": "Live-Hack-CVE\/CVE-2022-41176", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41176", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41176 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:47Z", - "updated_at": "2022-12-24T15:52:47Z", - "pushed_at": "2022-12-24T15:52:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41177.json b/2022/CVE-2022-41177.json deleted file mode 100644 index 343e069468..0000000000 --- a/2022/CVE-2022-41177.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856427, - "name": "CVE-2022-41177", - "full_name": "Live-Hack-CVE\/CVE-2022-41177", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41177", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41177 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:52:43Z", - "updated_at": "2022-12-24T15:52:43Z", - "pushed_at": "2022-12-24T15:52:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41178.json b/2022/CVE-2022-41178.json deleted file mode 100644 index 04b9bdec6b..0000000000 --- a/2022/CVE-2022-41178.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855982, - "name": "CVE-2022-41178", - "full_name": "Live-Hack-CVE\/CVE-2022-41178", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41178", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41178 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:56Z", - "updated_at": "2022-12-24T15:50:56Z", - "pushed_at": "2022-12-24T15:50:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41179.json b/2022/CVE-2022-41179.json deleted file mode 100644 index 21bf3adfba..0000000000 --- a/2022/CVE-2022-41179.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855995, - "name": "CVE-2022-41179", - "full_name": "Live-Hack-CVE\/CVE-2022-41179", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41179", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41179 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:59Z", - "updated_at": "2022-12-24T15:50:59Z", - "pushed_at": "2022-12-24T15:51:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41180.json b/2022/CVE-2022-41180.json deleted file mode 100644 index d6d35f3d98..0000000000 --- a/2022/CVE-2022-41180.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856028, - "name": "CVE-2022-41180", - "full_name": "Live-Hack-CVE\/CVE-2022-41180", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41180", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41180 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:09Z", - "updated_at": "2022-12-24T15:51:09Z", - "pushed_at": "2022-12-24T15:51:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41181.json b/2022/CVE-2022-41181.json deleted file mode 100644 index e336abf9dc..0000000000 --- a/2022/CVE-2022-41181.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856010, - "name": "CVE-2022-41181", - "full_name": "Live-Hack-CVE\/CVE-2022-41181", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41181", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41181 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:03Z", - "updated_at": "2022-12-24T15:51:03Z", - "pushed_at": "2022-12-24T15:51:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41182.json b/2022/CVE-2022-41182.json deleted file mode 100644 index 1e40c3c0d6..0000000000 --- a/2022/CVE-2022-41182.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856063, - "name": "CVE-2022-41182", - "full_name": "Live-Hack-CVE\/CVE-2022-41182", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41182", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41182 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:15Z", - "updated_at": "2022-12-24T15:51:15Z", - "pushed_at": "2022-12-24T15:51:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41184.json b/2022/CVE-2022-41184.json deleted file mode 100644 index 5d98b40e94..0000000000 --- a/2022/CVE-2022-41184.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856079, - "name": "CVE-2022-41184", - "full_name": "Live-Hack-CVE\/CVE-2022-41184", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41184", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41184 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:19Z", - "updated_at": "2022-12-24T15:51:19Z", - "pushed_at": "2022-12-24T15:51:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41185.json b/2022/CVE-2022-41185.json deleted file mode 100644 index cf9279c9ff..0000000000 --- a/2022/CVE-2022-41185.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856163, - "name": "CVE-2022-41185", - "full_name": "Live-Hack-CVE\/CVE-2022-41185", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41185", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41185 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:51:37Z", - "updated_at": "2022-12-24T15:51:37Z", - "pushed_at": "2022-12-24T15:51:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41186.json b/2022/CVE-2022-41186.json deleted file mode 100644 index 306c51fa34..0000000000 --- a/2022/CVE-2022-41186.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855971, - "name": "CVE-2022-41186", - "full_name": "Live-Hack-CVE\/CVE-2022-41186", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41186", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41186 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:53Z", - "updated_at": "2022-12-24T15:50:53Z", - "pushed_at": "2022-12-24T15:50:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41187.json b/2022/CVE-2022-41187.json deleted file mode 100644 index b85f8a313d..0000000000 --- a/2022/CVE-2022-41187.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855744, - "name": "CVE-2022-41187", - "full_name": "Live-Hack-CVE\/CVE-2022-41187", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41187", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41187 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:53Z", - "updated_at": "2022-12-24T15:49:53Z", - "pushed_at": "2022-12-24T15:49:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41188.json b/2022/CVE-2022-41188.json deleted file mode 100644 index 8c74e1a0f8..0000000000 --- a/2022/CVE-2022-41188.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855750, - "name": "CVE-2022-41188", - "full_name": "Live-Hack-CVE\/CVE-2022-41188", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41188", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41188 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:57Z", - "updated_at": "2022-12-24T15:49:57Z", - "pushed_at": "2022-12-24T15:49:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41189.json b/2022/CVE-2022-41189.json deleted file mode 100644 index 9f131cbe2f..0000000000 --- a/2022/CVE-2022-41189.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855710, - "name": "CVE-2022-41189", - "full_name": "Live-Hack-CVE\/CVE-2022-41189", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41189", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41189 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:47Z", - "updated_at": "2022-12-24T15:49:47Z", - "pushed_at": "2022-12-24T15:49:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41191.json b/2022/CVE-2022-41191.json deleted file mode 100644 index af820d2e7c..0000000000 --- a/2022/CVE-2022-41191.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855764, - "name": "CVE-2022-41191", - "full_name": "Live-Hack-CVE\/CVE-2022-41191", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41191", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41191 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:00Z", - "updated_at": "2022-12-24T15:50:00Z", - "pushed_at": "2022-12-24T15:50:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41192.json b/2022/CVE-2022-41192.json deleted file mode 100644 index 9f3664dd01..0000000000 --- a/2022/CVE-2022-41192.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855720, - "name": "CVE-2022-41192", - "full_name": "Live-Hack-CVE\/CVE-2022-41192", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41192", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41192 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:50Z", - "updated_at": "2022-12-24T15:49:50Z", - "pushed_at": "2022-12-24T15:49:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41193.json b/2022/CVE-2022-41193.json deleted file mode 100644 index ca5da02d05..0000000000 --- a/2022/CVE-2022-41193.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855939, - "name": "CVE-2022-41193", - "full_name": "Live-Hack-CVE\/CVE-2022-41193", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41193", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41193 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:43Z", - "updated_at": "2022-12-24T15:51:52Z", - "pushed_at": "2022-12-24T15:50:45Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41194.json b/2022/CVE-2022-41194.json deleted file mode 100644 index 2de8875ea4..0000000000 --- a/2022/CVE-2022-41194.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855906, - "name": "CVE-2022-41194", - "full_name": "Live-Hack-CVE\/CVE-2022-41194", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41194", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41194 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:37Z", - "updated_at": "2022-12-24T15:50:37Z", - "pushed_at": "2022-12-24T15:50:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41195.json b/2022/CVE-2022-41195.json deleted file mode 100644 index e975295ba7..0000000000 --- a/2022/CVE-2022-41195.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855818, - "name": "CVE-2022-41195", - "full_name": "Live-Hack-CVE\/CVE-2022-41195", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41195", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41195 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:10Z", - "updated_at": "2022-12-24T15:50:10Z", - "pushed_at": "2022-12-24T15:50:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41196.json b/2022/CVE-2022-41196.json deleted file mode 100644 index 919ba63eb5..0000000000 --- a/2022/CVE-2022-41196.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855843, - "name": "CVE-2022-41196", - "full_name": "Live-Hack-CVE\/CVE-2022-41196", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41196", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41196 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:17Z", - "updated_at": "2022-12-24T15:50:17Z", - "pushed_at": "2022-12-24T15:50:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41198.json b/2022/CVE-2022-41198.json deleted file mode 100644 index dd478392fd..0000000000 --- a/2022/CVE-2022-41198.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855833, - "name": "CVE-2022-41198", - "full_name": "Live-Hack-CVE\/CVE-2022-41198", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41198", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41198 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:14Z", - "updated_at": "2022-12-24T15:50:14Z", - "pushed_at": "2022-12-24T15:50:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41199.json b/2022/CVE-2022-41199.json deleted file mode 100644 index 1ab9fc96d8..0000000000 --- a/2022/CVE-2022-41199.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855801, - "name": "CVE-2022-41199", - "full_name": "Live-Hack-CVE\/CVE-2022-41199", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41199", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41199 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:07Z", - "updated_at": "2022-12-24T15:50:07Z", - "pushed_at": "2022-12-24T15:50:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41201.json b/2022/CVE-2022-41201.json deleted file mode 100644 index 4572151fe2..0000000000 --- a/2022/CVE-2022-41201.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855949, - "name": "CVE-2022-41201", - "full_name": "Live-Hack-CVE\/CVE-2022-41201", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41201", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41201 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:47Z", - "updated_at": "2022-12-24T15:51:12Z", - "pushed_at": "2022-12-24T15:50:48Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41202.json b/2022/CVE-2022-41202.json deleted file mode 100644 index e980ef1390..0000000000 --- a/2022/CVE-2022-41202.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855958, - "name": "CVE-2022-41202", - "full_name": "Live-Hack-CVE\/CVE-2022-41202", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41202", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41202 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:50:50Z", - "updated_at": "2022-12-24T15:50:54Z", - "pushed_at": "2022-12-24T15:50:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41204.json b/2022/CVE-2022-41204.json deleted file mode 100644 index 63ef60c2e6..0000000000 --- a/2022/CVE-2022-41204.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855542, - "name": "CVE-2022-41204", - "full_name": "Live-Hack-CVE\/CVE-2022-41204", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41204", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41204 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:08Z", - "updated_at": "2022-12-24T15:49:08Z", - "pushed_at": "2022-12-24T15:49:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41206.json b/2022/CVE-2022-41206.json deleted file mode 100644 index 019e970d3a..0000000000 --- a/2022/CVE-2022-41206.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855561, - "name": "CVE-2022-41206", - "full_name": "Live-Hack-CVE\/CVE-2022-41206", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41206", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41206 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:12Z", - "updated_at": "2022-12-24T15:49:12Z", - "pushed_at": "2022-12-24T15:49:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41209.json b/2022/CVE-2022-41209.json deleted file mode 100644 index 28aa8de09e..0000000000 --- a/2022/CVE-2022-41209.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855579, - "name": "CVE-2022-41209", - "full_name": "Live-Hack-CVE\/CVE-2022-41209", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41209", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41209 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:49:15Z", - "updated_at": "2022-12-24T15:49:15Z", - "pushed_at": "2022-12-24T15:49:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41290.json b/2022/CVE-2022-41290.json new file mode 100644 index 0000000000..ced14b9a7b --- /dev/null +++ b/2022/CVE-2022-41290.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023405, + "name": "CVE-2022-41290", + "full_name": "Live-Hack-CVE\/CVE-2022-41290", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41290", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41290 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:47Z", + "updated_at": "2022-12-25T10:52:47Z", + "pushed_at": "2022-12-25T10:52:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41294.json b/2022/CVE-2022-41294.json deleted file mode 100644 index 7f9b965a25..0000000000 --- a/2022/CVE-2022-41294.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829619, - "name": "CVE-2022-41294", - "full_name": "Live-Hack-CVE\/CVE-2022-41294", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41294", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41294 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:52:15Z", - "updated_at": "2022-12-24T13:52:15Z", - "pushed_at": "2022-12-24T13:52:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41348.json b/2022/CVE-2022-41348.json deleted file mode 100644 index 77a5b62233..0000000000 --- a/2022/CVE-2022-41348.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847109, - "name": "CVE-2022-41348", - "full_name": "Live-Hack-CVE\/CVE-2022-41348", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41348", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41348 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:09:55Z", - "updated_at": "2022-12-24T15:09:55Z", - "pushed_at": "2022-12-24T15:09:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41349.json b/2022/CVE-2022-41349.json deleted file mode 100644 index 75ed7840a0..0000000000 --- a/2022/CVE-2022-41349.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847126, - "name": "CVE-2022-41349", - "full_name": "Live-Hack-CVE\/CVE-2022-41349", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41349", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41349 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:09:58Z", - "updated_at": "2022-12-24T15:09:58Z", - "pushed_at": "2022-12-24T15:10:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41350.json b/2022/CVE-2022-41350.json deleted file mode 100644 index b92c05e1ce..0000000000 --- a/2022/CVE-2022-41350.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581839054, - "name": "CVE-2022-41350", - "full_name": "Live-Hack-CVE\/CVE-2022-41350", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41350", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41350 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:33:52Z", - "updated_at": "2022-12-24T14:33:52Z", - "pushed_at": "2022-12-24T14:33:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41351.json b/2022/CVE-2022-41351.json deleted file mode 100644 index 10b5f96fc6..0000000000 --- a/2022/CVE-2022-41351.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581839067, - "name": "CVE-2022-41351", - "full_name": "Live-Hack-CVE\/CVE-2022-41351", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41351", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41351 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:33:55Z", - "updated_at": "2022-12-24T14:33:55Z", - "pushed_at": "2022-12-24T14:33:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41381.json b/2022/CVE-2022-41381.json deleted file mode 100644 index 26195649d2..0000000000 --- a/2022/CVE-2022-41381.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856623, - "name": "CVE-2022-41381", - "full_name": "Live-Hack-CVE\/CVE-2022-41381", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41381", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41381 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:40Z", - "updated_at": "2022-12-24T15:53:40Z", - "pushed_at": "2022-12-24T15:53:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41382.json b/2022/CVE-2022-41382.json deleted file mode 100644 index e50506ef9e..0000000000 --- a/2022/CVE-2022-41382.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856552, - "name": "CVE-2022-41382", - "full_name": "Live-Hack-CVE\/CVE-2022-41382", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41382", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41382 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:18Z", - "updated_at": "2022-12-24T15:53:18Z", - "pushed_at": "2022-12-24T15:53:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41383.json b/2022/CVE-2022-41383.json deleted file mode 100644 index ffaa6066da..0000000000 --- a/2022/CVE-2022-41383.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856616, - "name": "CVE-2022-41383", - "full_name": "Live-Hack-CVE\/CVE-2022-41383", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41383", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41383 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:36Z", - "updated_at": "2022-12-24T15:53:36Z", - "pushed_at": "2022-12-24T15:53:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41384.json b/2022/CVE-2022-41384.json deleted file mode 100644 index b0c62c66ac..0000000000 --- a/2022/CVE-2022-41384.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856532, - "name": "CVE-2022-41384", - "full_name": "Live-Hack-CVE\/CVE-2022-41384", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41384", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41384 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:12Z", - "updated_at": "2022-12-24T15:53:12Z", - "pushed_at": "2022-12-24T15:53:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41385.json b/2022/CVE-2022-41385.json deleted file mode 100644 index 25b173dde2..0000000000 --- a/2022/CVE-2022-41385.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581856541, - "name": "CVE-2022-41385", - "full_name": "Live-Hack-CVE\/CVE-2022-41385", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41385", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41385 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:53:15Z", - "updated_at": "2022-12-24T15:53:15Z", - "pushed_at": "2022-12-24T15:53:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41403.json b/2022/CVE-2022-41403.json deleted file mode 100644 index 16158e652e..0000000000 --- a/2022/CVE-2022-41403.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829732, - "name": "CVE-2022-41403", - "full_name": "Live-Hack-CVE\/CVE-2022-41403", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41403", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41403 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:52:42Z", - "updated_at": "2022-12-24T13:52:42Z", - "pushed_at": "2022-12-24T13:52:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41406.json b/2022/CVE-2022-41406.json deleted file mode 100644 index a106f034ba..0000000000 --- a/2022/CVE-2022-41406.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848406, - "name": "CVE-2022-41406", - "full_name": "Live-Hack-CVE\/CVE-2022-41406", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41406", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41406 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:33Z", - "updated_at": "2022-12-24T15:15:33Z", - "pushed_at": "2022-12-24T15:15:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41407.json b/2022/CVE-2022-41407.json deleted file mode 100644 index 8b84470b53..0000000000 --- a/2022/CVE-2022-41407.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848439, - "name": "CVE-2022-41407", - "full_name": "Live-Hack-CVE\/CVE-2022-41407", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41407", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41407 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:43Z", - "updated_at": "2022-12-24T15:15:43Z", - "pushed_at": "2022-12-24T15:15:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41408.json b/2022/CVE-2022-41408.json deleted file mode 100644 index e7524c740b..0000000000 --- a/2022/CVE-2022-41408.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848446, - "name": "CVE-2022-41408", - "full_name": "Live-Hack-CVE\/CVE-2022-41408", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41408", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41408 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:46Z", - "updated_at": "2022-12-24T15:15:46Z", - "pushed_at": "2022-12-24T15:15:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41473.json b/2022/CVE-2022-41473.json deleted file mode 100644 index d649271fc5..0000000000 --- a/2022/CVE-2022-41473.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837076, - "name": "CVE-2022-41473", - "full_name": "Live-Hack-CVE\/CVE-2022-41473", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41473", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41473 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:25:21Z", - "updated_at": "2022-12-24T14:25:21Z", - "pushed_at": "2022-12-24T14:25:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41474.json b/2022/CVE-2022-41474.json deleted file mode 100644 index ffb24264b0..0000000000 --- a/2022/CVE-2022-41474.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838071, - "name": "CVE-2022-41474", - "full_name": "Live-Hack-CVE\/CVE-2022-41474", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41474", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41474 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:35Z", - "updated_at": "2022-12-24T14:29:35Z", - "pushed_at": "2022-12-24T14:29:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41475.json b/2022/CVE-2022-41475.json deleted file mode 100644 index 343fe34671..0000000000 --- a/2022/CVE-2022-41475.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838079, - "name": "CVE-2022-41475", - "full_name": "Live-Hack-CVE\/CVE-2022-41475", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41475", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41475 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:38Z", - "updated_at": "2022-12-24T14:29:38Z", - "pushed_at": "2022-12-24T14:29:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41489.json b/2022/CVE-2022-41489.json deleted file mode 100644 index 967953c260..0000000000 --- a/2022/CVE-2022-41489.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838055, - "name": "CVE-2022-41489", - "full_name": "Live-Hack-CVE\/CVE-2022-41489", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41489", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41489 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:31Z", - "updated_at": "2022-12-24T14:29:31Z", - "pushed_at": "2022-12-24T14:29:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41495.json b/2022/CVE-2022-41495.json deleted file mode 100644 index 74b9cf5e0f..0000000000 --- a/2022/CVE-2022-41495.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838922, - "name": "CVE-2022-41495", - "full_name": "Live-Hack-CVE\/CVE-2022-41495", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41495", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41495 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:33:17Z", - "updated_at": "2022-12-24T14:33:17Z", - "pushed_at": "2022-12-24T14:33:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41517.json b/2022/CVE-2022-41517.json deleted file mode 100644 index b6f4332c59..0000000000 --- a/2022/CVE-2022-41517.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865312, - "name": "CVE-2022-41517", - "full_name": "Live-Hack-CVE\/CVE-2022-41517", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41517", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41517 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:11Z", - "updated_at": "2022-12-24T16:34:11Z", - "pushed_at": "2022-12-24T16:34:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41518.json b/2022/CVE-2022-41518.json deleted file mode 100644 index aab03085b7..0000000000 --- a/2022/CVE-2022-41518.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865305, - "name": "CVE-2022-41518", - "full_name": "Live-Hack-CVE\/CVE-2022-41518", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41518", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41518 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:08Z", - "updated_at": "2022-12-24T16:34:08Z", - "pushed_at": "2022-12-24T16:34:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41520.json b/2022/CVE-2022-41520.json deleted file mode 100644 index d1337c1a47..0000000000 --- a/2022/CVE-2022-41520.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865293, - "name": "CVE-2022-41520", - "full_name": "Live-Hack-CVE\/CVE-2022-41520", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41520", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41520 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:04Z", - "updated_at": "2022-12-24T16:34:04Z", - "pushed_at": "2022-12-24T16:34:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41521.json b/2022/CVE-2022-41521.json deleted file mode 100644 index 0d9a7eec81..0000000000 --- a/2022/CVE-2022-41521.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865284, - "name": "CVE-2022-41521", - "full_name": "Live-Hack-CVE\/CVE-2022-41521", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41521", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41521 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:34:01Z", - "updated_at": "2022-12-24T16:34:01Z", - "pushed_at": "2022-12-24T16:34:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41522.json b/2022/CVE-2022-41522.json deleted file mode 100644 index 22d6e0b634..0000000000 --- a/2022/CVE-2022-41522.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865246, - "name": "CVE-2022-41522", - "full_name": "Live-Hack-CVE\/CVE-2022-41522", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41522", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41522 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:33:52Z", - "updated_at": "2022-12-24T16:33:52Z", - "pushed_at": "2022-12-24T16:33:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41524.json b/2022/CVE-2022-41524.json deleted file mode 100644 index e1c14f2732..0000000000 --- a/2022/CVE-2022-41524.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865163, - "name": "CVE-2022-41524", - "full_name": "Live-Hack-CVE\/CVE-2022-41524", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41524", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41524 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:33:24Z", - "updated_at": "2022-12-24T16:33:24Z", - "pushed_at": "2022-12-24T16:33:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41525.json b/2022/CVE-2022-41525.json deleted file mode 100644 index 351241f064..0000000000 --- a/2022/CVE-2022-41525.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865269, - "name": "CVE-2022-41525", - "full_name": "Live-Hack-CVE\/CVE-2022-41525", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41525", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41525 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:33:58Z", - "updated_at": "2022-12-24T16:33:58Z", - "pushed_at": "2022-12-24T16:34:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41526.json b/2022/CVE-2022-41526.json deleted file mode 100644 index 7a5cd80418..0000000000 --- a/2022/CVE-2022-41526.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865147, - "name": "CVE-2022-41526", - "full_name": "Live-Hack-CVE\/CVE-2022-41526", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41526", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41526 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:33:17Z", - "updated_at": "2022-12-24T16:33:17Z", - "pushed_at": "2022-12-24T16:33:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41527.json b/2022/CVE-2022-41527.json deleted file mode 100644 index 1ed61820d2..0000000000 --- a/2022/CVE-2022-41527.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865156, - "name": "CVE-2022-41527", - "full_name": "Live-Hack-CVE\/CVE-2022-41527", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41527", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41527 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:33:20Z", - "updated_at": "2022-12-24T16:33:20Z", - "pushed_at": "2022-12-24T16:33:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41528.json b/2022/CVE-2022-41528.json deleted file mode 100644 index 6ecffea142..0000000000 --- a/2022/CVE-2022-41528.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865133, - "name": "CVE-2022-41528", - "full_name": "Live-Hack-CVE\/CVE-2022-41528", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41528", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41528 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:33:13Z", - "updated_at": "2022-12-24T16:33:13Z", - "pushed_at": "2022-12-24T16:33:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41530.json b/2022/CVE-2022-41530.json deleted file mode 100644 index 3e547e8cff..0000000000 --- a/2022/CVE-2022-41530.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848417, - "name": "CVE-2022-41530", - "full_name": "Live-Hack-CVE\/CVE-2022-41530", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41530", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41530 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:36Z", - "updated_at": "2022-12-24T15:15:36Z", - "pushed_at": "2022-12-24T15:15:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41532.json b/2022/CVE-2022-41532.json deleted file mode 100644 index d58d87e07f..0000000000 --- a/2022/CVE-2022-41532.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848395, - "name": "CVE-2022-41532", - "full_name": "Live-Hack-CVE\/CVE-2022-41532", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41532", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41532 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:30Z", - "updated_at": "2022-12-24T15:15:30Z", - "pushed_at": "2022-12-24T15:15:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41533.json b/2022/CVE-2022-41533.json deleted file mode 100644 index 14dc1d680f..0000000000 --- a/2022/CVE-2022-41533.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838320, - "name": "CVE-2022-41533", - "full_name": "Live-Hack-CVE\/CVE-2022-41533", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41533", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41533 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:30:39Z", - "updated_at": "2022-12-24T14:30:39Z", - "pushed_at": "2022-12-24T14:30:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41534.json b/2022/CVE-2022-41534.json deleted file mode 100644 index 3cd3a47a0f..0000000000 --- a/2022/CVE-2022-41534.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581838340, - "name": "CVE-2022-41534", - "full_name": "Live-Hack-CVE\/CVE-2022-41534", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41534", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41534 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:30:43Z", - "updated_at": "2022-12-24T14:30:43Z", - "pushed_at": "2022-12-24T14:30:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41550.json b/2022/CVE-2022-41550.json deleted file mode 100644 index cd9dfd9fc6..0000000000 --- a/2022/CVE-2022-41550.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847770, - "name": "CVE-2022-41550", - "full_name": "Live-Hack-CVE\/CVE-2022-41550", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41550", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41550 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:47Z", - "updated_at": "2022-12-24T15:12:47Z", - "pushed_at": "2022-12-24T15:12:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41576.json b/2022/CVE-2022-41576.json deleted file mode 100644 index 80c97ca833..0000000000 --- a/2022/CVE-2022-41576.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829519, - "name": "CVE-2022-41576", - "full_name": "Live-Hack-CVE\/CVE-2022-41576", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41576", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41576 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:51:48Z", - "updated_at": "2022-12-24T13:51:48Z", - "pushed_at": "2022-12-24T13:51:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41592.json b/2022/CVE-2022-41592.json deleted file mode 100644 index b3c39c0690..0000000000 --- a/2022/CVE-2022-41592.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829347, - "name": "CVE-2022-41592", - "full_name": "Live-Hack-CVE\/CVE-2022-41592", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41592", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41592 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:51:07Z", - "updated_at": "2022-12-24T13:51:08Z", - "pushed_at": "2022-12-24T13:51:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41593.json b/2022/CVE-2022-41593.json deleted file mode 100644 index 287b05a5ba..0000000000 --- a/2022/CVE-2022-41593.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829364, - "name": "CVE-2022-41593", - "full_name": "Live-Hack-CVE\/CVE-2022-41593", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41593", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41593 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:51:11Z", - "updated_at": "2022-12-24T13:51:11Z", - "pushed_at": "2022-12-24T13:51:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41594.json b/2022/CVE-2022-41594.json deleted file mode 100644 index faf6d96ef0..0000000000 --- a/2022/CVE-2022-41594.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829319, - "name": "CVE-2022-41594", - "full_name": "Live-Hack-CVE\/CVE-2022-41594", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41594", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41594 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:51:01Z", - "updated_at": "2022-12-24T13:51:01Z", - "pushed_at": "2022-12-24T13:51:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41597.json b/2022/CVE-2022-41597.json deleted file mode 100644 index 67f3583637..0000000000 --- a/2022/CVE-2022-41597.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829309, - "name": "CVE-2022-41597", - "full_name": "Live-Hack-CVE\/CVE-2022-41597", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41597", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41597 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:58Z", - "updated_at": "2022-12-24T13:50:58Z", - "pushed_at": "2022-12-24T13:51:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41598.json b/2022/CVE-2022-41598.json deleted file mode 100644 index 2bdf84d00f..0000000000 --- a/2022/CVE-2022-41598.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829284, - "name": "CVE-2022-41598", - "full_name": "Live-Hack-CVE\/CVE-2022-41598", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41598", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41598 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:52Z", - "updated_at": "2022-12-24T13:50:52Z", - "pushed_at": "2022-12-24T13:50:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41600.json b/2022/CVE-2022-41600.json deleted file mode 100644 index 53bbcd0d25..0000000000 --- a/2022/CVE-2022-41600.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829294, - "name": "CVE-2022-41600", - "full_name": "Live-Hack-CVE\/CVE-2022-41600", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41600", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41600 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:55Z", - "updated_at": "2022-12-24T13:50:55Z", - "pushed_at": "2022-12-24T13:50:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41601.json b/2022/CVE-2022-41601.json deleted file mode 100644 index 379486e62f..0000000000 --- a/2022/CVE-2022-41601.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829255, - "name": "CVE-2022-41601", - "full_name": "Live-Hack-CVE\/CVE-2022-41601", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41601", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41601 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:45Z", - "updated_at": "2022-12-24T13:50:45Z", - "pushed_at": "2022-12-24T13:50:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41602.json b/2022/CVE-2022-41602.json deleted file mode 100644 index 02958a4978..0000000000 --- a/2022/CVE-2022-41602.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829270, - "name": "CVE-2022-41602", - "full_name": "Live-Hack-CVE\/CVE-2022-41602", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41602", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41602 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:48Z", - "updated_at": "2022-12-24T13:50:48Z", - "pushed_at": "2022-12-24T13:50:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41603.json b/2022/CVE-2022-41603.json deleted file mode 100644 index 6a8d89c330..0000000000 --- a/2022/CVE-2022-41603.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581829240, - "name": "CVE-2022-41603", - "full_name": "Live-Hack-CVE\/CVE-2022-41603", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41603", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41603 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T13:50:42Z", - "updated_at": "2022-12-24T13:50:42Z", - "pushed_at": "2022-12-24T13:50:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41606.json b/2022/CVE-2022-41606.json deleted file mode 100644 index c35ca30063..0000000000 --- a/2022/CVE-2022-41606.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847760, - "name": "CVE-2022-41606", - "full_name": "Live-Hack-CVE\/CVE-2022-41606", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41606", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41606 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:44Z", - "updated_at": "2022-12-24T15:12:44Z", - "pushed_at": "2022-12-24T15:12:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41639.json b/2022/CVE-2022-41639.json new file mode 100644 index 0000000000..3c02600fc0 --- /dev/null +++ b/2022/CVE-2022-41639.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030823, + "name": "CVE-2022-41639", + "full_name": "Live-Hack-CVE\/CVE-2022-41639", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41639", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41639 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:24Z", + "updated_at": "2022-12-25T11:33:24Z", + "pushed_at": "2022-12-25T11:33:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41649.json b/2022/CVE-2022-41649.json new file mode 100644 index 0000000000..71864d76da --- /dev/null +++ b/2022/CVE-2022-41649.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030543, + "name": "CVE-2022-41649", + "full_name": "Live-Hack-CVE\/CVE-2022-41649", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41649", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41649 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:31:58Z", + "updated_at": "2022-12-25T11:31:58Z", + "pushed_at": "2022-12-25T11:32:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41684.json b/2022/CVE-2022-41684.json new file mode 100644 index 0000000000..991a6be68e --- /dev/null +++ b/2022/CVE-2022-41684.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030843, + "name": "CVE-2022-41684", + "full_name": "Live-Hack-CVE\/CVE-2022-41684", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41684", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41684 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:31Z", + "updated_at": "2022-12-25T11:33:31Z", + "pushed_at": "2022-12-25T11:33:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41794.json b/2022/CVE-2022-41794.json new file mode 100644 index 0000000000..26745215e9 --- /dev/null +++ b/2022/CVE-2022-41794.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030553, + "name": "CVE-2022-41794", + "full_name": "Live-Hack-CVE\/CVE-2022-41794", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41794", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41794 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:01Z", + "updated_at": "2022-12-25T11:32:01Z", + "pushed_at": "2022-12-25T11:32:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41837.json b/2022/CVE-2022-41837.json new file mode 100644 index 0000000000..accb1b1a68 --- /dev/null +++ b/2022/CVE-2022-41837.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030567, + "name": "CVE-2022-41837", + "full_name": "Live-Hack-CVE\/CVE-2022-41837", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41837", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41837 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:05Z", + "updated_at": "2022-12-25T11:32:05Z", + "pushed_at": "2022-12-25T11:32:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41838.json b/2022/CVE-2022-41838.json new file mode 100644 index 0000000000..0407442c13 --- /dev/null +++ b/2022/CVE-2022-41838.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030581, + "name": "CVE-2022-41838", + "full_name": "Live-Hack-CVE\/CVE-2022-41838", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41838", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41838 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:08Z", + "updated_at": "2022-12-25T11:32:08Z", + "pushed_at": "2022-12-25T11:32:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39288.json b/2022/CVE-2022-41849.json similarity index 77% rename from 2022/CVE-2022-39288.json rename to 2022/CVE-2022-41849.json index 2cc8307c5c..8ace7c7e24 100644 --- a/2022/CVE-2022-39288.json +++ b/2022/CVE-2022-41849.json @@ -1,20 +1,20 @@ [ { - "id": 581856731, - "name": "CVE-2022-39288", - "full_name": "Live-Hack-CVE\/CVE-2022-39288", + "id": 582023708, + "name": "CVE-2022-41849", + "full_name": "Live-Hack-CVE\/CVE-2022-41849", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39288", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39288 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41849", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41849 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:54:10Z", - "updated_at": "2022-12-24T15:54:10Z", - "pushed_at": "2022-12-24T15:54:12Z", + "created_at": "2022-12-25T10:54:37Z", + "updated_at": "2022-12-25T10:54:37Z", + "pushed_at": "2022-12-25T10:54:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-41850.json b/2022/CVE-2022-41850.json new file mode 100644 index 0000000000..7e71cca5be --- /dev/null +++ b/2022/CVE-2022-41850.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023716, + "name": "CVE-2022-41850", + "full_name": "Live-Hack-CVE\/CVE-2022-41850", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41850", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41850 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:54:41Z", + "updated_at": "2022-12-25T10:54:41Z", + "pushed_at": "2022-12-25T10:54:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41851.json b/2022/CVE-2022-41851.json deleted file mode 100644 index f222ee5b0e..0000000000 --- a/2022/CVE-2022-41851.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581864696, - "name": "CVE-2022-41851", - "full_name": "Live-Hack-CVE\/CVE-2022-41851", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41851", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41851 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:31:04Z", - "updated_at": "2022-12-24T16:31:04Z", - "pushed_at": "2022-12-24T16:31:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41977.json b/2022/CVE-2022-41977.json new file mode 100644 index 0000000000..73101f638a --- /dev/null +++ b/2022/CVE-2022-41977.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030599, + "name": "CVE-2022-41977", + "full_name": "Live-Hack-CVE\/CVE-2022-41977", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41977", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41977 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:14Z", + "updated_at": "2022-12-25T11:32:14Z", + "pushed_at": "2022-12-25T11:32:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41981.json b/2022/CVE-2022-41981.json new file mode 100644 index 0000000000..2fd6469d2c --- /dev/null +++ b/2022/CVE-2022-41981.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030620, + "name": "CVE-2022-41981", + "full_name": "Live-Hack-CVE\/CVE-2022-41981", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41981", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41981 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:21Z", + "updated_at": "2022-12-25T11:32:21Z", + "pushed_at": "2022-12-25T11:32:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41988.json b/2022/CVE-2022-41988.json new file mode 100644 index 0000000000..6e1eef9b2f --- /dev/null +++ b/2022/CVE-2022-41988.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030645, + "name": "CVE-2022-41988", + "full_name": "Live-Hack-CVE\/CVE-2022-41988", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41988", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41988 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:27Z", + "updated_at": "2022-12-25T11:32:27Z", + "pushed_at": "2022-12-25T11:32:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41999.json b/2022/CVE-2022-41999.json new file mode 100644 index 0000000000..c41bc2ae02 --- /dev/null +++ b/2022/CVE-2022-41999.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030669, + "name": "CVE-2022-41999", + "full_name": "Live-Hack-CVE\/CVE-2022-41999", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41999", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41999 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:34Z", + "updated_at": "2022-12-25T11:32:34Z", + "pushed_at": "2022-12-25T11:32:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42034.json b/2022/CVE-2022-42034.json deleted file mode 100644 index f469435490..0000000000 --- a/2022/CVE-2022-42034.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865706, - "name": "CVE-2022-42034", - "full_name": "Live-Hack-CVE\/CVE-2022-42034", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42034", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42034 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:57Z", - "updated_at": "2022-12-24T16:35:57Z", - "pushed_at": "2022-12-24T16:35:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42036.json b/2022/CVE-2022-42036.json deleted file mode 100644 index 5d26ad88ee..0000000000 --- a/2022/CVE-2022-42036.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855469, - "name": "CVE-2022-42036", - "full_name": "Live-Hack-CVE\/CVE-2022-42036", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42036", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42036 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:49Z", - "updated_at": "2022-12-24T15:48:49Z", - "pushed_at": "2022-12-24T15:48:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42037.json b/2022/CVE-2022-42037.json deleted file mode 100644 index 05f2055222..0000000000 --- a/2022/CVE-2022-42037.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855456, - "name": "CVE-2022-42037", - "full_name": "Live-Hack-CVE\/CVE-2022-42037", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42037", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42037 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:46Z", - "updated_at": "2022-12-24T15:48:46Z", - "pushed_at": "2022-12-24T15:48:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42038.json b/2022/CVE-2022-42038.json deleted file mode 100644 index 4c179b7b8f..0000000000 --- a/2022/CVE-2022-42038.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855359, - "name": "CVE-2022-42038", - "full_name": "Live-Hack-CVE\/CVE-2022-42038", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42038", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42038 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:18Z", - "updated_at": "2022-12-24T15:48:18Z", - "pushed_at": "2022-12-24T15:48:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42040.json b/2022/CVE-2022-42040.json deleted file mode 100644 index 58c6d9516b..0000000000 --- a/2022/CVE-2022-42040.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855409, - "name": "CVE-2022-42040", - "full_name": "Live-Hack-CVE\/CVE-2022-42040", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42040", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42040 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:32Z", - "updated_at": "2022-12-24T15:48:32Z", - "pushed_at": "2022-12-24T15:48:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42041.json b/2022/CVE-2022-42041.json deleted file mode 100644 index 66e53f68d2..0000000000 --- a/2022/CVE-2022-42041.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855399, - "name": "CVE-2022-42041", - "full_name": "Live-Hack-CVE\/CVE-2022-42041", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42041", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42041 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:29Z", - "updated_at": "2022-12-24T15:48:29Z", - "pushed_at": "2022-12-24T15:48:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42042.json b/2022/CVE-2022-42042.json deleted file mode 100644 index f6d42104ce..0000000000 --- a/2022/CVE-2022-42042.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855374, - "name": "CVE-2022-42042", - "full_name": "Live-Hack-CVE\/CVE-2022-42042", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42042", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42042 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:22Z", - "updated_at": "2022-12-24T15:48:22Z", - "pushed_at": "2022-12-24T15:48:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42043.json b/2022/CVE-2022-42043.json deleted file mode 100644 index 5edd1c81a5..0000000000 --- a/2022/CVE-2022-42043.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855384, - "name": "CVE-2022-42043", - "full_name": "Live-Hack-CVE\/CVE-2022-42043", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42043", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42043 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:26Z", - "updated_at": "2022-12-24T15:48:26Z", - "pushed_at": "2022-12-24T15:48:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42044.json b/2022/CVE-2022-42044.json deleted file mode 100644 index b647f2a30c..0000000000 --- a/2022/CVE-2022-42044.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581855338, - "name": "CVE-2022-42044", - "full_name": "Live-Hack-CVE\/CVE-2022-42044", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42044", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42044 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:48:12Z", - "updated_at": "2022-12-24T15:48:12Z", - "pushed_at": "2022-12-24T15:48:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42077.json b/2022/CVE-2022-42077.json deleted file mode 100644 index 88eba4906f..0000000000 --- a/2022/CVE-2022-42077.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837775, - "name": "CVE-2022-42077", - "full_name": "Live-Hack-CVE\/CVE-2022-42077", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42077", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42077 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:28:09Z", - "updated_at": "2022-12-24T14:28:09Z", - "pushed_at": "2022-12-24T14:28:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42079.json b/2022/CVE-2022-42079.json deleted file mode 100644 index cfe351a835..0000000000 --- a/2022/CVE-2022-42079.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837911, - "name": "CVE-2022-42079", - "full_name": "Live-Hack-CVE\/CVE-2022-42079", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42079", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42079 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:28:48Z", - "updated_at": "2022-12-24T14:28:48Z", - "pushed_at": "2022-12-24T14:28:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42080.json b/2022/CVE-2022-42080.json deleted file mode 100644 index 46bd3fc325..0000000000 --- a/2022/CVE-2022-42080.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837935, - "name": "CVE-2022-42080", - "full_name": "Live-Hack-CVE\/CVE-2022-42080", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42080", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42080 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:28:55Z", - "updated_at": "2022-12-24T14:28:55Z", - "pushed_at": "2022-12-24T14:28:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42081.json b/2022/CVE-2022-42081.json deleted file mode 100644 index 3aa94bbed0..0000000000 --- a/2022/CVE-2022-42081.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837946, - "name": "CVE-2022-42081", - "full_name": "Live-Hack-CVE\/CVE-2022-42081", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42081", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42081 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:28:58Z", - "updated_at": "2022-12-24T14:28:58Z", - "pushed_at": "2022-12-24T14:29:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42086.json b/2022/CVE-2022-42086.json deleted file mode 100644 index d7abcfb420..0000000000 --- a/2022/CVE-2022-42086.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837925, - "name": "CVE-2022-42086", - "full_name": "Live-Hack-CVE\/CVE-2022-42086", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42086", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42086 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:28:52Z", - "updated_at": "2022-12-24T14:28:52Z", - "pushed_at": "2022-12-24T14:28:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42087.json b/2022/CVE-2022-42087.json deleted file mode 100644 index 30707d0538..0000000000 --- a/2022/CVE-2022-42087.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837953, - "name": "CVE-2022-42087", - "full_name": "Live-Hack-CVE\/CVE-2022-42087", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42087", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42087 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:29:01Z", - "updated_at": "2022-12-24T14:29:01Z", - "pushed_at": "2022-12-24T14:29:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42229.json b/2022/CVE-2022-42229.json deleted file mode 100644 index 7b93117e79..0000000000 --- a/2022/CVE-2022-42229.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865722, - "name": "CVE-2022-42229", - "full_name": "Live-Hack-CVE\/CVE-2022-42229", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42229", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42229 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:36:00Z", - "updated_at": "2022-12-24T16:36:00Z", - "pushed_at": "2022-12-24T16:36:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42230.json b/2022/CVE-2022-42230.json deleted file mode 100644 index 6268ea5659..0000000000 --- a/2022/CVE-2022-42230.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865563, - "name": "CVE-2022-42230", - "full_name": "Live-Hack-CVE\/CVE-2022-42230", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42230", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42230 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:24Z", - "updated_at": "2022-12-24T16:35:24Z", - "pushed_at": "2022-12-24T16:35:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42235.json b/2022/CVE-2022-42235.json deleted file mode 100644 index ed104bef92..0000000000 --- a/2022/CVE-2022-42235.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865586, - "name": "CVE-2022-42235", - "full_name": "Live-Hack-CVE\/CVE-2022-42235", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42235", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42235 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:30Z", - "updated_at": "2022-12-24T16:35:31Z", - "pushed_at": "2022-12-24T16:35:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42236.json b/2022/CVE-2022-42236.json deleted file mode 100644 index c624c3c7e9..0000000000 --- a/2022/CVE-2022-42236.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865574, - "name": "CVE-2022-42236", - "full_name": "Live-Hack-CVE\/CVE-2022-42236", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42236", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42236 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:27Z", - "updated_at": "2022-12-24T16:35:27Z", - "pushed_at": "2022-12-24T16:35:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42238.json b/2022/CVE-2022-42238.json deleted file mode 100644 index 54cbea9564..0000000000 --- a/2022/CVE-2022-42238.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581865599, - "name": "CVE-2022-42238", - "full_name": "Live-Hack-CVE\/CVE-2022-42238", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42238", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42238 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T16:35:34Z", - "updated_at": "2022-12-24T16:35:34Z", - "pushed_at": "2022-12-24T16:35:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42328.json b/2022/CVE-2022-42328.json new file mode 100644 index 0000000000..fe328c9060 --- /dev/null +++ b/2022/CVE-2022-42328.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023763, + "name": "CVE-2022-42328", + "full_name": "Live-Hack-CVE\/CVE-2022-42328", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42328", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42328 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:54:52Z", + "updated_at": "2022-12-25T10:54:52Z", + "pushed_at": "2022-12-25T10:54:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42329.json b/2022/CVE-2022-42329.json new file mode 100644 index 0000000000..b4fff53c36 --- /dev/null +++ b/2022/CVE-2022-42329.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023772, + "name": "CVE-2022-42329", + "full_name": "Live-Hack-CVE\/CVE-2022-42329", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42329", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42329 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:54:55Z", + "updated_at": "2022-12-25T10:54:55Z", + "pushed_at": "2022-12-25T10:54:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42711.json b/2022/CVE-2022-42711.json deleted file mode 100644 index a6f8e19406..0000000000 --- a/2022/CVE-2022-42711.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581848352, - "name": "CVE-2022-42711", - "full_name": "Live-Hack-CVE\/CVE-2022-42711", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42711", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42711 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:15:17Z", - "updated_at": "2022-12-24T15:15:18Z", - "pushed_at": "2022-12-24T15:15:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42715.json b/2022/CVE-2022-42715.json deleted file mode 100644 index 0d7460a783..0000000000 --- a/2022/CVE-2022-42715.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581837512, - "name": "CVE-2022-42715", - "full_name": "Live-Hack-CVE\/CVE-2022-42715", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42715", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42715 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T14:27:05Z", - "updated_at": "2022-12-24T14:27:05Z", - "pushed_at": "2022-12-24T14:27:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42818.json b/2022/CVE-2022-42818.json new file mode 100644 index 0000000000..fb4b460c19 --- /dev/null +++ b/2022/CVE-2022-42818.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024935, + "name": "CVE-2022-42818", + "full_name": "Live-Hack-CVE\/CVE-2022-42818", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42818", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42818 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:12Z", + "updated_at": "2022-12-25T11:01:12Z", + "pushed_at": "2022-12-25T11:01:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42897.json b/2022/CVE-2022-42897.json deleted file mode 100644 index 9221979a0e..0000000000 --- a/2022/CVE-2022-42897.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847741, - "name": "CVE-2022-42897", - "full_name": "Live-Hack-CVE\/CVE-2022-42897", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42897", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42897 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:12:41Z", - "updated_at": "2022-12-24T15:12:41Z", - "pushed_at": "2022-12-24T15:12:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42899.json b/2022/CVE-2022-42899.json deleted file mode 100644 index e1906d92d1..0000000000 --- a/2022/CVE-2022-42899.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847161, - "name": "CVE-2022-42899", - "full_name": "Live-Hack-CVE\/CVE-2022-42899", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42899", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42899 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:08Z", - "updated_at": "2022-12-24T15:10:08Z", - "pushed_at": "2022-12-24T15:10:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42900.json b/2022/CVE-2022-42900.json deleted file mode 100644 index 1c1c7d7177..0000000000 --- a/2022/CVE-2022-42900.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847151, - "name": "CVE-2022-42900", - "full_name": "Live-Hack-CVE\/CVE-2022-42900", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42900", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42900 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:05Z", - "updated_at": "2022-12-24T15:10:05Z", - "pushed_at": "2022-12-24T15:10:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42901.json b/2022/CVE-2022-42901.json deleted file mode 100644 index fcf8d1d265..0000000000 --- a/2022/CVE-2022-42901.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581847137, - "name": "CVE-2022-42901", - "full_name": "Live-Hack-CVE\/CVE-2022-42901", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42901", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42901 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-24T15:10:01Z", - "updated_at": "2022-12-24T15:10:01Z", - "pushed_at": "2022-12-24T15:10:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42927.json b/2022/CVE-2022-42927.json new file mode 100644 index 0000000000..38bc88441a --- /dev/null +++ b/2022/CVE-2022-42927.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032645, + "name": "CVE-2022-42927", + "full_name": "Live-Hack-CVE\/CVE-2022-42927", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42927", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42927 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:42:22Z", + "updated_at": "2022-12-25T11:42:22Z", + "pushed_at": "2022-12-25T11:42:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42928.json b/2022/CVE-2022-42928.json new file mode 100644 index 0000000000..13578c284a --- /dev/null +++ b/2022/CVE-2022-42928.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032654, + "name": "CVE-2022-42928", + "full_name": "Live-Hack-CVE\/CVE-2022-42928", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42928", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42928 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:42:26Z", + "updated_at": "2022-12-25T11:42:26Z", + "pushed_at": "2022-12-25T11:42:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42929.json b/2022/CVE-2022-42929.json new file mode 100644 index 0000000000..0a142e3f4a --- /dev/null +++ b/2022/CVE-2022-42929.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032666, + "name": "CVE-2022-42929", + "full_name": "Live-Hack-CVE\/CVE-2022-42929", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42929", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42929 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:42:31Z", + "updated_at": "2022-12-25T11:42:31Z", + "pushed_at": "2022-12-25T11:42:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42930.json b/2022/CVE-2022-42930.json new file mode 100644 index 0000000000..fad9a42018 --- /dev/null +++ b/2022/CVE-2022-42930.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032676, + "name": "CVE-2022-42930", + "full_name": "Live-Hack-CVE\/CVE-2022-42930", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42930", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42930 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:42:34Z", + "updated_at": "2022-12-25T11:42:35Z", + "pushed_at": "2022-12-25T11:42:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42931.json b/2022/CVE-2022-42931.json new file mode 100644 index 0000000000..b0766085ce --- /dev/null +++ b/2022/CVE-2022-42931.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032690, + "name": "CVE-2022-42931", + "full_name": "Live-Hack-CVE\/CVE-2022-42931", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42931", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42931 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:42:38Z", + "updated_at": "2022-12-25T11:42:38Z", + "pushed_at": "2022-12-25T11:42:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41386.json b/2022/CVE-2022-42932.json similarity index 75% rename from 2022/CVE-2022-41386.json rename to 2022/CVE-2022-42932.json index 8a5b0dfb97..8642ec3aa3 100644 --- a/2022/CVE-2022-41386.json +++ b/2022/CVE-2022-42932.json @@ -1,20 +1,20 @@ [ { - "id": 581856509, - "name": "CVE-2022-41386", - "full_name": "Live-Hack-CVE\/CVE-2022-41386", + "id": 582032702, + "name": "CVE-2022-42932", + "full_name": "Live-Hack-CVE\/CVE-2022-42932", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41386", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41386 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42932", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42932 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:53:05Z", - "updated_at": "2022-12-24T15:53:05Z", - "pushed_at": "2022-12-24T15:53:07Z", + "created_at": "2022-12-25T11:42:41Z", + "updated_at": "2022-12-25T11:42:41Z", + "pushed_at": "2022-12-25T11:42:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-37983.json b/2022/CVE-2022-42953.json similarity index 74% rename from 2022/CVE-2022-37983.json rename to 2022/CVE-2022-42953.json index 181facbde0..73bbed9af4 100644 --- a/2022/CVE-2022-37983.json +++ b/2022/CVE-2022-42953.json @@ -1,20 +1,20 @@ [ { - "id": 581856953, - "name": "CVE-2022-37983", - "full_name": "Live-Hack-CVE\/CVE-2022-37983", + "id": 582021671, + "name": "CVE-2022-42953", + "full_name": "Live-Hack-CVE\/CVE-2022-42953", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37983", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37983 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42953", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42953 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:55:07Z", - "updated_at": "2022-12-24T16:00:29Z", - "pushed_at": "2022-12-24T15:55:09Z", + "created_at": "2022-12-25T10:43:18Z", + "updated_at": "2022-12-25T10:43:32Z", + "pushed_at": "2022-12-25T10:43:20Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2022/CVE-2022-43380.json b/2022/CVE-2022-43380.json new file mode 100644 index 0000000000..5e09000280 --- /dev/null +++ b/2022/CVE-2022-43380.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024003, + "name": "CVE-2022-43380", + "full_name": "Live-Hack-CVE\/CVE-2022-43380", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43380", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43380 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:04Z", + "updated_at": "2022-12-25T10:56:04Z", + "pushed_at": "2022-12-25T10:56:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43381.json b/2022/CVE-2022-43381.json new file mode 100644 index 0000000000..c744c80540 --- /dev/null +++ b/2022/CVE-2022-43381.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024020, + "name": "CVE-2022-43381", + "full_name": "Live-Hack-CVE\/CVE-2022-43381", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43381", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43381 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:07Z", + "updated_at": "2022-12-25T10:56:07Z", + "pushed_at": "2022-12-25T10:56:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43551.json b/2022/CVE-2022-43551.json new file mode 100644 index 0000000000..2d7eabbf2e --- /dev/null +++ b/2022/CVE-2022-43551.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024563, + "name": "CVE-2022-43551", + "full_name": "Live-Hack-CVE\/CVE-2022-43551", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43551", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43551 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:18Z", + "updated_at": "2022-12-25T10:59:18Z", + "pushed_at": "2022-12-25T10:59:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43592.json b/2022/CVE-2022-43592.json new file mode 100644 index 0000000000..a62f31d144 --- /dev/null +++ b/2022/CVE-2022-43592.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030678, + "name": "CVE-2022-43592", + "full_name": "Live-Hack-CVE\/CVE-2022-43592", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43592", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43592 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:32:37Z", + "updated_at": "2022-12-25T11:32:37Z", + "pushed_at": "2022-12-25T11:32:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43593.json b/2022/CVE-2022-43593.json new file mode 100644 index 0000000000..d47b185fc4 --- /dev/null +++ b/2022/CVE-2022-43593.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030769, + "name": "CVE-2022-43593", + "full_name": "Live-Hack-CVE\/CVE-2022-43593", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43593", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43593 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:11Z", + "updated_at": "2022-12-25T11:33:11Z", + "pushed_at": "2022-12-25T11:33:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43594.json b/2022/CVE-2022-43594.json new file mode 100644 index 0000000000..7f850c6e11 --- /dev/null +++ b/2022/CVE-2022-43594.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030775, + "name": "CVE-2022-43594", + "full_name": "Live-Hack-CVE\/CVE-2022-43594", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43594", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43594 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:14Z", + "updated_at": "2022-12-25T11:33:14Z", + "pushed_at": "2022-12-25T11:33:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43595.json b/2022/CVE-2022-43595.json new file mode 100644 index 0000000000..f3574993b1 --- /dev/null +++ b/2022/CVE-2022-43595.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030808, + "name": "CVE-2022-43595", + "full_name": "Live-Hack-CVE\/CVE-2022-43595", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43595", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43595 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:21Z", + "updated_at": "2022-12-25T11:33:21Z", + "pushed_at": "2022-12-25T11:33:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42078.json b/2022/CVE-2022-43596.json similarity index 77% rename from 2022/CVE-2022-42078.json rename to 2022/CVE-2022-43596.json index a84119737d..2773b19442 100644 --- a/2022/CVE-2022-42078.json +++ b/2022/CVE-2022-43596.json @@ -1,20 +1,20 @@ [ { - "id": 581837902, - "name": "CVE-2022-42078", - "full_name": "Live-Hack-CVE\/CVE-2022-42078", + "id": 582030833, + "name": "CVE-2022-43596", + "full_name": "Live-Hack-CVE\/CVE-2022-43596", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42078", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42078 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43596", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43596 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:28:45Z", - "updated_at": "2022-12-24T14:28:45Z", - "pushed_at": "2022-12-24T14:28:47Z", + "created_at": "2022-12-25T11:33:28Z", + "updated_at": "2022-12-25T11:33:28Z", + "pushed_at": "2022-12-25T11:33:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-43597.json b/2022/CVE-2022-43597.json new file mode 100644 index 0000000000..20dcc7e53d --- /dev/null +++ b/2022/CVE-2022-43597.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030854, + "name": "CVE-2022-43597", + "full_name": "Live-Hack-CVE\/CVE-2022-43597", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43597", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43597 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:34Z", + "updated_at": "2022-12-25T11:33:34Z", + "pushed_at": "2022-12-25T11:33:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3471.json b/2022/CVE-2022-43598.json similarity index 77% rename from 2022/CVE-2022-3471.json rename to 2022/CVE-2022-43598.json index 99aa39eb21..fa5e2eba4b 100644 --- a/2022/CVE-2022-3471.json +++ b/2022/CVE-2022-43598.json @@ -1,20 +1,20 @@ [ { - "id": 581847700, - "name": "CVE-2022-3471", - "full_name": "Live-Hack-CVE\/CVE-2022-3471", + "id": 582030864, + "name": "CVE-2022-43598", + "full_name": "Live-Hack-CVE\/CVE-2022-43598", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3471", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3471 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43598", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43598 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:12:24Z", - "updated_at": "2022-12-24T15:12:24Z", - "pushed_at": "2022-12-24T15:12:26Z", + "created_at": "2022-12-25T11:33:37Z", + "updated_at": "2022-12-25T11:33:37Z", + "pushed_at": "2022-12-25T11:33:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-43599.json b/2022/CVE-2022-43599.json new file mode 100644 index 0000000000..ed4acb9158 --- /dev/null +++ b/2022/CVE-2022-43599.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030869, + "name": "CVE-2022-43599", + "full_name": "Live-Hack-CVE\/CVE-2022-43599", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43599", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43599 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:40Z", + "updated_at": "2022-12-25T11:33:41Z", + "pushed_at": "2022-12-25T11:33:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1328.json b/2022/CVE-2022-43600.json similarity index 77% rename from 2022/CVE-2022-1328.json rename to 2022/CVE-2022-43600.json index fc34ff9bf4..018622a932 100644 --- a/2022/CVE-2022-1328.json +++ b/2022/CVE-2022-43600.json @@ -1,20 +1,20 @@ [ { - "id": 581838417, - "name": "CVE-2022-1328", - "full_name": "Live-Hack-CVE\/CVE-2022-1328", + "id": 582030881, + "name": "CVE-2022-43600", + "full_name": "Live-Hack-CVE\/CVE-2022-43600", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1328", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1328 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43600", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43600 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:31:08Z", - "updated_at": "2022-12-24T14:31:08Z", - "pushed_at": "2022-12-24T14:31:11Z", + "created_at": "2022-12-25T11:33:44Z", + "updated_at": "2022-12-25T11:33:44Z", + "pushed_at": "2022-12-25T11:33:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-43601.json b/2022/CVE-2022-43601.json new file mode 100644 index 0000000000..b56bc1635a --- /dev/null +++ b/2022/CVE-2022-43601.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030892, + "name": "CVE-2022-43601", + "full_name": "Live-Hack-CVE\/CVE-2022-43601", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43601", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43601 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:47Z", + "updated_at": "2022-12-25T11:33:47Z", + "pushed_at": "2022-12-25T11:33:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43602.json b/2022/CVE-2022-43602.json new file mode 100644 index 0000000000..c5847bc28f --- /dev/null +++ b/2022/CVE-2022-43602.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030901, + "name": "CVE-2022-43602", + "full_name": "Live-Hack-CVE\/CVE-2022-43602", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43602", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43602 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:50Z", + "updated_at": "2022-12-25T11:33:50Z", + "pushed_at": "2022-12-25T11:33:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43603.json b/2022/CVE-2022-43603.json new file mode 100644 index 0000000000..4dfecf7d02 --- /dev/null +++ b/2022/CVE-2022-43603.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030912, + "name": "CVE-2022-43603", + "full_name": "Live-Hack-CVE\/CVE-2022-43603", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43603", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43603 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:53Z", + "updated_at": "2022-12-25T11:33:53Z", + "pushed_at": "2022-12-25T11:33:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43848.json b/2022/CVE-2022-43848.json new file mode 100644 index 0000000000..570985235d --- /dev/null +++ b/2022/CVE-2022-43848.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023417, + "name": "CVE-2022-43848", + "full_name": "Live-Hack-CVE\/CVE-2022-43848", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43848", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43848 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:50Z", + "updated_at": "2022-12-25T10:52:50Z", + "pushed_at": "2022-12-25T10:52:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43849.json b/2022/CVE-2022-43849.json new file mode 100644 index 0000000000..154f25e381 --- /dev/null +++ b/2022/CVE-2022-43849.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023430, + "name": "CVE-2022-43849", + "full_name": "Live-Hack-CVE\/CVE-2022-43849", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43849", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43849 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:53Z", + "updated_at": "2022-12-25T10:52:53Z", + "pushed_at": "2022-12-25T10:52:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43857.json b/2022/CVE-2022-43857.json new file mode 100644 index 0000000000..d1539c8ffd --- /dev/null +++ b/2022/CVE-2022-43857.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031209, + "name": "CVE-2022-43857", + "full_name": "Live-Hack-CVE\/CVE-2022-43857", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43857", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43857 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:17Z", + "updated_at": "2022-12-25T11:35:17Z", + "pushed_at": "2022-12-25T11:35:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43858.json b/2022/CVE-2022-43858.json new file mode 100644 index 0000000000..2b1a723261 --- /dev/null +++ b/2022/CVE-2022-43858.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031225, + "name": "CVE-2022-43858", + "full_name": "Live-Hack-CVE\/CVE-2022-43858", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43858", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43858 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:21Z", + "updated_at": "2022-12-25T11:35:21Z", + "pushed_at": "2022-12-25T11:35:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43859.json b/2022/CVE-2022-43859.json new file mode 100644 index 0000000000..b11b200f89 --- /dev/null +++ b/2022/CVE-2022-43859.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031233, + "name": "CVE-2022-43859", + "full_name": "Live-Hack-CVE\/CVE-2022-43859", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43859", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43859 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:35:25Z", + "updated_at": "2022-12-25T11:35:25Z", + "pushed_at": "2022-12-25T11:35:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43860.json b/2022/CVE-2022-43860.json new file mode 100644 index 0000000000..93c2625d01 --- /dev/null +++ b/2022/CVE-2022-43860.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023301, + "name": "CVE-2022-43860", + "full_name": "Live-Hack-CVE\/CVE-2022-43860", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43860", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43860 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:13Z", + "updated_at": "2022-12-25T10:52:13Z", + "pushed_at": "2022-12-25T10:52:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38001.json b/2022/CVE-2022-44012.json similarity index 76% rename from 2022/CVE-2022-38001.json rename to 2022/CVE-2022-44012.json index e35d2e41d1..a88c9710de 100644 --- a/2022/CVE-2022-38001.json +++ b/2022/CVE-2022-44012.json @@ -1,20 +1,20 @@ [ { - "id": 581857085, - "name": "CVE-2022-38001", - "full_name": "Live-Hack-CVE\/CVE-2022-38001", + "id": 582022137, + "name": "CVE-2022-44012", + "full_name": "Live-Hack-CVE\/CVE-2022-44012", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38001", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38001 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44012", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44012 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:55:42Z", - "updated_at": "2022-12-24T15:55:42Z", - "pushed_at": "2022-12-24T15:55:44Z", + "created_at": "2022-12-25T10:45:54Z", + "updated_at": "2022-12-25T10:45:54Z", + "pushed_at": "2022-12-25T10:45:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-40468.json b/2022/CVE-2022-44013.json similarity index 78% rename from 2022/CVE-2022-40468.json rename to 2022/CVE-2022-44013.json index f5608e732a..ef52a24cec 100644 --- a/2022/CVE-2022-40468.json +++ b/2022/CVE-2022-44013.json @@ -1,20 +1,20 @@ [ { - "id": 581865436, - "name": "CVE-2022-40468", - "full_name": "Live-Hack-CVE\/CVE-2022-40468", + "id": 582022146, + "name": "CVE-2022-44013", + "full_name": "Live-Hack-CVE\/CVE-2022-44013", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40468", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40468 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44013", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44013 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:34:45Z", - "updated_at": "2022-12-24T16:34:45Z", - "pushed_at": "2022-12-24T16:34:46Z", + "created_at": "2022-12-25T10:45:58Z", + "updated_at": "2022-12-25T10:45:58Z", + "pushed_at": "2022-12-25T10:46:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-26121.json b/2022/CVE-2022-44014.json similarity index 78% rename from 2022/CVE-2022-26121.json rename to 2022/CVE-2022-44014.json index e7c311a5b9..9caba2eabf 100644 --- a/2022/CVE-2022-26121.json +++ b/2022/CVE-2022-44014.json @@ -1,20 +1,20 @@ [ { - "id": 581856675, - "name": "CVE-2022-26121", - "full_name": "Live-Hack-CVE\/CVE-2022-26121", + "id": 582022160, + "name": "CVE-2022-44014", + "full_name": "Live-Hack-CVE\/CVE-2022-44014", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26121", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26121 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44014", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44014 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:53:53Z", - "updated_at": "2022-12-24T15:53:53Z", - "pushed_at": "2022-12-24T15:53:55Z", + "created_at": "2022-12-25T10:46:01Z", + "updated_at": "2022-12-25T10:46:01Z", + "pushed_at": "2022-12-25T10:46:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-44015.json b/2022/CVE-2022-44015.json new file mode 100644 index 0000000000..7241d35580 --- /dev/null +++ b/2022/CVE-2022-44015.json @@ -0,0 +1,31 @@ +[ + { + "id": 582022950, + "name": "CVE-2022-44015", + "full_name": "Live-Hack-CVE\/CVE-2022-44015", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44015", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44015 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:27Z", + "updated_at": "2022-12-25T10:50:27Z", + "pushed_at": "2022-12-25T10:50:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44016.json b/2022/CVE-2022-44016.json new file mode 100644 index 0000000000..95664dd69d --- /dev/null +++ b/2022/CVE-2022-44016.json @@ -0,0 +1,31 @@ +[ + { + "id": 582022955, + "name": "CVE-2022-44016", + "full_name": "Live-Hack-CVE\/CVE-2022-44016", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44016", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44016 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:31Z", + "updated_at": "2022-12-25T10:50:31Z", + "pushed_at": "2022-12-25T10:50:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44017.json b/2022/CVE-2022-44017.json new file mode 100644 index 0000000000..01b70e53a4 --- /dev/null +++ b/2022/CVE-2022-44017.json @@ -0,0 +1,31 @@ +[ + { + "id": 582022963, + "name": "CVE-2022-44017", + "full_name": "Live-Hack-CVE\/CVE-2022-44017", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44017", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44017 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:34Z", + "updated_at": "2022-12-25T10:50:34Z", + "pushed_at": "2022-12-25T10:50:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44380.json b/2022/CVE-2022-44380.json new file mode 100644 index 0000000000..10c4860e76 --- /dev/null +++ b/2022/CVE-2022-44380.json @@ -0,0 +1,31 @@ +[ + { + "id": 582022976, + "name": "CVE-2022-44380", + "full_name": "Live-Hack-CVE\/CVE-2022-44380", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44380", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44380 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:37Z", + "updated_at": "2022-12-25T10:50:37Z", + "pushed_at": "2022-12-25T10:50:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44381.json b/2022/CVE-2022-44381.json new file mode 100644 index 0000000000..121a1d60cb --- /dev/null +++ b/2022/CVE-2022-44381.json @@ -0,0 +1,31 @@ +[ + { + "id": 582022985, + "name": "CVE-2022-44381", + "full_name": "Live-Hack-CVE\/CVE-2022-44381", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44381", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44381 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:40Z", + "updated_at": "2022-12-25T10:50:40Z", + "pushed_at": "2022-12-25T10:50:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44510.json b/2022/CVE-2022-44510.json new file mode 100644 index 0000000000..45e4651517 --- /dev/null +++ b/2022/CVE-2022-44510.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039548, + "name": "CVE-2022-44510", + "full_name": "Live-Hack-CVE\/CVE-2022-44510", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44510", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44510 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:31Z", + "updated_at": "2022-12-25T12:18:31Z", + "pushed_at": "2022-12-25T12:18:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28887.json b/2022/CVE-2022-44542.json similarity index 76% rename from 2022/CVE-2022-28887.json rename to 2022/CVE-2022-44542.json index d911c43133..b085adbdbd 100644 --- a/2022/CVE-2022-28887.json +++ b/2022/CVE-2022-44542.json @@ -1,20 +1,20 @@ [ { - "id": 581829652, - "name": "CVE-2022-28887", - "full_name": "Live-Hack-CVE\/CVE-2022-28887", + "id": 582039680, + "name": "CVE-2022-44542", + "full_name": "Live-Hack-CVE\/CVE-2022-44542", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28887", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28887 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44542", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44542 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T13:52:25Z", - "updated_at": "2022-12-24T13:52:25Z", - "pushed_at": "2022-12-24T13:52:26Z", + "created_at": "2022-12-25T12:19:20Z", + "updated_at": "2022-12-25T12:19:20Z", + "pushed_at": "2022-12-25T12:19:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-44565.json b/2022/CVE-2022-44565.json new file mode 100644 index 0000000000..6ffddf978a --- /dev/null +++ b/2022/CVE-2022-44565.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024568, + "name": "CVE-2022-44565", + "full_name": "Live-Hack-CVE\/CVE-2022-44565", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44565", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44565 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:21Z", + "updated_at": "2022-12-25T10:59:21Z", + "pushed_at": "2022-12-25T10:59:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44567.json b/2022/CVE-2022-44567.json new file mode 100644 index 0000000000..7f0c742eb7 --- /dev/null +++ b/2022/CVE-2022-44567.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024576, + "name": "CVE-2022-44567", + "full_name": "Live-Hack-CVE\/CVE-2022-44567", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44567", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44567 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:24Z", + "updated_at": "2022-12-25T10:59:24Z", + "pushed_at": "2022-12-25T10:59:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44640.json b/2022/CVE-2022-44640.json new file mode 100644 index 0000000000..6ecf21fbdf --- /dev/null +++ b/2022/CVE-2022-44640.json @@ -0,0 +1,31 @@ +[ + { + "id": 582022998, + "name": "CVE-2022-44640", + "full_name": "Live-Hack-CVE\/CVE-2022-44640", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44640", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44640 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:43Z", + "updated_at": "2022-12-25T10:50:43Z", + "pushed_at": "2022-12-25T10:50:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45197.json b/2022/CVE-2022-45197.json new file mode 100644 index 0000000000..2b140bb6fb --- /dev/null +++ b/2022/CVE-2022-45197.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023008, + "name": "CVE-2022-45197", + "full_name": "Live-Hack-CVE\/CVE-2022-45197", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45197", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45197 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:47Z", + "updated_at": "2022-12-25T10:50:47Z", + "pushed_at": "2022-12-25T10:50:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45403.json b/2022/CVE-2022-45403.json new file mode 100644 index 0000000000..e053960b3c --- /dev/null +++ b/2022/CVE-2022-45403.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032719, + "name": "CVE-2022-45403", + "full_name": "Live-Hack-CVE\/CVE-2022-45403", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45403", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45403 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:42:44Z", + "updated_at": "2022-12-25T11:42:44Z", + "pushed_at": "2022-12-25T11:42:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20837.json b/2022/CVE-2022-45405.json similarity index 78% rename from 2022/CVE-2022-20837.json rename to 2022/CVE-2022-45405.json index 4d3867981e..60aeabf892 100644 --- a/2022/CVE-2022-20837.json +++ b/2022/CVE-2022-45405.json @@ -1,20 +1,20 @@ [ { - "id": 581847188, - "name": "CVE-2022-20837", - "full_name": "Live-Hack-CVE\/CVE-2022-20837", + "id": 582038409, + "name": "CVE-2022-45405", + "full_name": "Live-Hack-CVE\/CVE-2022-45405", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20837", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20837 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45405", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45405 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:10:14Z", - "updated_at": "2022-12-24T15:10:15Z", - "pushed_at": "2022-12-24T15:10:16Z", + "created_at": "2022-12-25T12:12:49Z", + "updated_at": "2022-12-25T12:12:49Z", + "pushed_at": "2022-12-25T12:12:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-41497.json b/2022/CVE-2022-45406.json similarity index 75% rename from 2022/CVE-2022-41497.json rename to 2022/CVE-2022-45406.json index 8baea92d9c..610ba2d2e9 100644 --- a/2022/CVE-2022-41497.json +++ b/2022/CVE-2022-45406.json @@ -1,20 +1,20 @@ [ { - "id": 581837767, - "name": "CVE-2022-41497", - "full_name": "Live-Hack-CVE\/CVE-2022-41497", + "id": 582038418, + "name": "CVE-2022-45406", + "full_name": "Live-Hack-CVE\/CVE-2022-45406", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41497", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41497 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45406", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45406 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:28:06Z", - "updated_at": "2022-12-24T14:28:06Z", - "pushed_at": "2022-12-24T14:28:08Z", + "created_at": "2022-12-25T12:12:52Z", + "updated_at": "2022-12-25T12:12:52Z", + "pushed_at": "2022-12-25T12:12:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-45407.json b/2022/CVE-2022-45407.json new file mode 100644 index 0000000000..01edce62ba --- /dev/null +++ b/2022/CVE-2022-45407.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038434, + "name": "CVE-2022-45407", + "full_name": "Live-Hack-CVE\/CVE-2022-45407", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45407", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45407 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:12:55Z", + "updated_at": "2022-12-25T12:12:55Z", + "pushed_at": "2022-12-25T12:12:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45408.json b/2022/CVE-2022-45408.json new file mode 100644 index 0000000000..ab44b61ecd --- /dev/null +++ b/2022/CVE-2022-45408.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031635, + "name": "CVE-2022-45408", + "full_name": "Live-Hack-CVE\/CVE-2022-45408", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45408", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45408 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:17Z", + "updated_at": "2022-12-25T11:37:17Z", + "pushed_at": "2022-12-25T11:37:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35080.json b/2022/CVE-2022-45409.json similarity index 78% rename from 2022/CVE-2022-35080.json rename to 2022/CVE-2022-45409.json index 707d76703b..e444a19890 100644 --- a/2022/CVE-2022-35080.json +++ b/2022/CVE-2022-45409.json @@ -1,20 +1,20 @@ [ { - "id": 581838381, - "name": "CVE-2022-35080", - "full_name": "Live-Hack-CVE\/CVE-2022-35080", + "id": 582031654, + "name": "CVE-2022-45409", + "full_name": "Live-Hack-CVE\/CVE-2022-45409", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35080", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35080 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45409", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45409 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:30:55Z", - "updated_at": "2022-12-24T14:30:55Z", - "pushed_at": "2022-12-24T14:30:57Z", + "created_at": "2022-12-25T11:37:23Z", + "updated_at": "2022-12-25T11:37:23Z", + "pushed_at": "2022-12-25T11:37:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-45410.json b/2022/CVE-2022-45410.json new file mode 100644 index 0000000000..16dcfe6afc --- /dev/null +++ b/2022/CVE-2022-45410.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038442, + "name": "CVE-2022-45410", + "full_name": "Live-Hack-CVE\/CVE-2022-45410", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45410", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45410 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:12:58Z", + "updated_at": "2022-12-25T12:12:58Z", + "pushed_at": "2022-12-25T12:13:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45411.json b/2022/CVE-2022-45411.json new file mode 100644 index 0000000000..62ee70ad11 --- /dev/null +++ b/2022/CVE-2022-45411.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038453, + "name": "CVE-2022-45411", + "full_name": "Live-Hack-CVE\/CVE-2022-45411", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45411", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45411 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:01Z", + "updated_at": "2022-12-25T12:13:01Z", + "pushed_at": "2022-12-25T12:13:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37980.json b/2022/CVE-2022-45412.json similarity index 75% rename from 2022/CVE-2022-37980.json rename to 2022/CVE-2022-45412.json index 3dd2d1f0db..644eda3b21 100644 --- a/2022/CVE-2022-37980.json +++ b/2022/CVE-2022-45412.json @@ -1,20 +1,20 @@ [ { - "id": 581848431, - "name": "CVE-2022-37980", - "full_name": "Live-Hack-CVE\/CVE-2022-37980", + "id": 582031684, + "name": "CVE-2022-45412", + "full_name": "Live-Hack-CVE\/CVE-2022-45412", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37980", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37980 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45412", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45412 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:15:40Z", - "updated_at": "2022-12-24T15:15:40Z", - "pushed_at": "2022-12-24T15:15:41Z", + "created_at": "2022-12-25T11:37:33Z", + "updated_at": "2022-12-25T11:37:33Z", + "pushed_at": "2022-12-25T11:37:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-45413.json b/2022/CVE-2022-45413.json new file mode 100644 index 0000000000..c16c925427 --- /dev/null +++ b/2022/CVE-2022-45413.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038460, + "name": "CVE-2022-45413", + "full_name": "Live-Hack-CVE\/CVE-2022-45413", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45413", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45413 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:04Z", + "updated_at": "2022-12-25T12:13:04Z", + "pushed_at": "2022-12-25T12:13:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45414.json b/2022/CVE-2022-45414.json new file mode 100644 index 0000000000..ab8a0f51f8 --- /dev/null +++ b/2022/CVE-2022-45414.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038467, + "name": "CVE-2022-45414", + "full_name": "Live-Hack-CVE\/CVE-2022-45414", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45414", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45414 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:08Z", + "updated_at": "2022-12-25T12:13:08Z", + "pushed_at": "2022-12-25T12:13:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45415.json b/2022/CVE-2022-45415.json new file mode 100644 index 0000000000..fc47f5559c --- /dev/null +++ b/2022/CVE-2022-45415.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038475, + "name": "CVE-2022-45415", + "full_name": "Live-Hack-CVE\/CVE-2022-45415", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45415", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45415 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:11Z", + "updated_at": "2022-12-25T12:13:11Z", + "pushed_at": "2022-12-25T12:13:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45416.json b/2022/CVE-2022-45416.json new file mode 100644 index 0000000000..1db439ad46 --- /dev/null +++ b/2022/CVE-2022-45416.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038490, + "name": "CVE-2022-45416", + "full_name": "Live-Hack-CVE\/CVE-2022-45416", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45416", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45416 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:15Z", + "updated_at": "2022-12-25T12:13:15Z", + "pushed_at": "2022-12-25T12:13:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45417.json b/2022/CVE-2022-45417.json new file mode 100644 index 0000000000..9b6e11e229 --- /dev/null +++ b/2022/CVE-2022-45417.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038498, + "name": "CVE-2022-45417", + "full_name": "Live-Hack-CVE\/CVE-2022-45417", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45417", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45417 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:18Z", + "updated_at": "2022-12-25T12:13:18Z", + "pushed_at": "2022-12-25T12:13:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45418.json b/2022/CVE-2022-45418.json new file mode 100644 index 0000000000..392d68d11b --- /dev/null +++ b/2022/CVE-2022-45418.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038513, + "name": "CVE-2022-45418", + "full_name": "Live-Hack-CVE\/CVE-2022-45418", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45418", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45418 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:21Z", + "updated_at": "2022-12-25T12:13:21Z", + "pushed_at": "2022-12-25T12:13:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45419.json b/2022/CVE-2022-45419.json new file mode 100644 index 0000000000..dfdfe55845 --- /dev/null +++ b/2022/CVE-2022-45419.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031754, + "name": "CVE-2022-45419", + "full_name": "Live-Hack-CVE\/CVE-2022-45419", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45419", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45419 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:37:55Z", + "updated_at": "2022-12-25T11:37:55Z", + "pushed_at": "2022-12-25T11:37:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45420.json b/2022/CVE-2022-45420.json new file mode 100644 index 0000000000..3472143ae3 --- /dev/null +++ b/2022/CVE-2022-45420.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038527, + "name": "CVE-2022-45420", + "full_name": "Live-Hack-CVE\/CVE-2022-45420", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45420", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45420 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:25Z", + "updated_at": "2022-12-25T12:13:25Z", + "pushed_at": "2022-12-25T12:13:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45421.json b/2022/CVE-2022-45421.json new file mode 100644 index 0000000000..c823e04abf --- /dev/null +++ b/2022/CVE-2022-45421.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031785, + "name": "CVE-2022-45421", + "full_name": "Live-Hack-CVE\/CVE-2022-45421", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45421", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45421 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:04Z", + "updated_at": "2022-12-25T11:38:04Z", + "pushed_at": "2022-12-25T11:38:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4566.json b/2022/CVE-2022-4566.json new file mode 100644 index 0000000000..e0d59cf52e --- /dev/null +++ b/2022/CVE-2022-4566.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040204, + "name": "CVE-2022-4566", + "full_name": "Live-Hack-CVE\/CVE-2022-4566", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4566", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4566 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:42Z", + "updated_at": "2022-12-25T12:21:42Z", + "pushed_at": "2022-12-25T12:21:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45706.json b/2022/CVE-2022-45706.json new file mode 100644 index 0000000000..5d58d5e0d6 --- /dev/null +++ b/2022/CVE-2022-45706.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023953, + "name": "CVE-2022-45706", + "full_name": "Live-Hack-CVE\/CVE-2022-45706", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45706", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45706 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:55:53Z", + "updated_at": "2022-12-25T10:55:53Z", + "pushed_at": "2022-12-25T10:55:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45707.json b/2022/CVE-2022-45707.json new file mode 100644 index 0000000000..8d4289d6b8 --- /dev/null +++ b/2022/CVE-2022-45707.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024030, + "name": "CVE-2022-45707", + "full_name": "Live-Hack-CVE\/CVE-2022-45707", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45707", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45707 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:10Z", + "updated_at": "2022-12-25T10:56:10Z", + "pushed_at": "2022-12-25T10:56:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45708.json b/2022/CVE-2022-45708.json new file mode 100644 index 0000000000..e1a3796ff2 --- /dev/null +++ b/2022/CVE-2022-45708.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024041, + "name": "CVE-2022-45708", + "full_name": "Live-Hack-CVE\/CVE-2022-45708", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45708", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45708 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:13Z", + "updated_at": "2022-12-25T10:56:13Z", + "pushed_at": "2022-12-25T10:56:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45709.json b/2022/CVE-2022-45709.json new file mode 100644 index 0000000000..3e5be77dca --- /dev/null +++ b/2022/CVE-2022-45709.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024080, + "name": "CVE-2022-45709", + "full_name": "Live-Hack-CVE\/CVE-2022-45709", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45709", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45709 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:29Z", + "updated_at": "2022-12-25T10:56:29Z", + "pushed_at": "2022-12-25T10:56:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45710.json b/2022/CVE-2022-45710.json new file mode 100644 index 0000000000..fdd46fa161 --- /dev/null +++ b/2022/CVE-2022-45710.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024094, + "name": "CVE-2022-45710", + "full_name": "Live-Hack-CVE\/CVE-2022-45710", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45710", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45710 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:32Z", + "updated_at": "2022-12-25T10:56:32Z", + "pushed_at": "2022-12-25T10:56:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45711.json b/2022/CVE-2022-45711.json new file mode 100644 index 0000000000..206f3825dd --- /dev/null +++ b/2022/CVE-2022-45711.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024103, + "name": "CVE-2022-45711", + "full_name": "Live-Hack-CVE\/CVE-2022-45711", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45711", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45711 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:35Z", + "updated_at": "2022-12-25T10:56:36Z", + "pushed_at": "2022-12-25T10:56:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45712.json b/2022/CVE-2022-45712.json new file mode 100644 index 0000000000..6a74109050 --- /dev/null +++ b/2022/CVE-2022-45712.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024113, + "name": "CVE-2022-45712", + "full_name": "Live-Hack-CVE\/CVE-2022-45712", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45712", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45712 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:39Z", + "updated_at": "2022-12-25T10:56:39Z", + "pushed_at": "2022-12-25T10:56:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45714.json b/2022/CVE-2022-45714.json new file mode 100644 index 0000000000..b328c9d363 --- /dev/null +++ b/2022/CVE-2022-45714.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024124, + "name": "CVE-2022-45714", + "full_name": "Live-Hack-CVE\/CVE-2022-45714", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45714", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45714 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:42Z", + "updated_at": "2022-12-25T10:56:42Z", + "pushed_at": "2022-12-25T10:56:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32493.json b/2022/CVE-2022-45715.json similarity index 77% rename from 2022/CVE-2022-32493.json rename to 2022/CVE-2022-45715.json index 049824c402..c313b29f23 100644 --- a/2022/CVE-2022-32493.json +++ b/2022/CVE-2022-45715.json @@ -1,20 +1,20 @@ [ { - "id": 581838022, - "name": "CVE-2022-32493", - "full_name": "Live-Hack-CVE\/CVE-2022-32493", + "id": 582024133, + "name": "CVE-2022-45715", + "full_name": "Live-Hack-CVE\/CVE-2022-45715", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32493", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32493 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45715", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45715 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:29:21Z", - "updated_at": "2022-12-24T14:29:21Z", - "pushed_at": "2022-12-24T14:29:23Z", + "created_at": "2022-12-25T10:56:45Z", + "updated_at": "2022-12-25T10:56:45Z", + "pushed_at": "2022-12-25T10:56:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-45716.json b/2022/CVE-2022-45716.json new file mode 100644 index 0000000000..ccd7214090 --- /dev/null +++ b/2022/CVE-2022-45716.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024144, + "name": "CVE-2022-45716", + "full_name": "Live-Hack-CVE\/CVE-2022-45716", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45716", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45716 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:49Z", + "updated_at": "2022-12-25T10:56:49Z", + "pushed_at": "2022-12-25T10:56:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45717.json b/2022/CVE-2022-45717.json new file mode 100644 index 0000000000..2863a94bc8 --- /dev/null +++ b/2022/CVE-2022-45717.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024157, + "name": "CVE-2022-45717", + "full_name": "Live-Hack-CVE\/CVE-2022-45717", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45717", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45717 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:52Z", + "updated_at": "2022-12-25T10:56:52Z", + "pushed_at": "2022-12-25T10:56:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35226.json b/2022/CVE-2022-45718.json similarity index 75% rename from 2022/CVE-2022-35226.json rename to 2022/CVE-2022-45718.json index e98ffca6e1..9f22afffaf 100644 --- a/2022/CVE-2022-35226.json +++ b/2022/CVE-2022-45718.json @@ -1,20 +1,20 @@ [ { - "id": 581857096, - "name": "CVE-2022-35226", - "full_name": "Live-Hack-CVE\/CVE-2022-35226", + "id": 582024177, + "name": "CVE-2022-45718", + "full_name": "Live-Hack-CVE\/CVE-2022-45718", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35226", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35226 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45718", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45718 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:55:46Z", - "updated_at": "2022-12-24T15:55:46Z", - "pushed_at": "2022-12-24T15:55:47Z", + "created_at": "2022-12-25T10:56:55Z", + "updated_at": "2022-12-25T10:56:55Z", + "pushed_at": "2022-12-25T10:56:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-45719.json b/2022/CVE-2022-45719.json new file mode 100644 index 0000000000..cc8f1bc771 --- /dev/null +++ b/2022/CVE-2022-45719.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024190, + "name": "CVE-2022-45719", + "full_name": "Live-Hack-CVE\/CVE-2022-45719", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45719", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45719 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:58Z", + "updated_at": "2022-12-25T10:56:58Z", + "pushed_at": "2022-12-25T10:57:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4572.json b/2022/CVE-2022-4572.json new file mode 100644 index 0000000000..bfec27002f --- /dev/null +++ b/2022/CVE-2022-4572.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040695, + "name": "CVE-2022-4572", + "full_name": "Live-Hack-CVE\/CVE-2022-4572", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4572", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4572 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:55Z", + "updated_at": "2022-12-25T12:23:55Z", + "pushed_at": "2022-12-25T12:23:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37984.json b/2022/CVE-2022-45720.json similarity index 78% rename from 2022/CVE-2022-37984.json rename to 2022/CVE-2022-45720.json index 0a922f3f5e..34177bbde8 100644 --- a/2022/CVE-2022-37984.json +++ b/2022/CVE-2022-45720.json @@ -1,20 +1,20 @@ [ { - "id": 581856915, - "name": "CVE-2022-37984", - "full_name": "Live-Hack-CVE\/CVE-2022-37984", + "id": 582024200, + "name": "CVE-2022-45720", + "full_name": "Live-Hack-CVE\/CVE-2022-45720", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37984", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37984 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45720", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45720 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:54:57Z", - "updated_at": "2022-12-24T15:54:57Z", - "pushed_at": "2022-12-24T15:54:59Z", + "created_at": "2022-12-25T10:57:02Z", + "updated_at": "2022-12-25T10:57:02Z", + "pushed_at": "2022-12-25T10:57:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-45721.json b/2022/CVE-2022-45721.json new file mode 100644 index 0000000000..0ec04002f4 --- /dev/null +++ b/2022/CVE-2022-45721.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024207, + "name": "CVE-2022-45721", + "full_name": "Live-Hack-CVE\/CVE-2022-45721", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45721", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45721 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:57:05Z", + "updated_at": "2022-12-25T10:57:05Z", + "pushed_at": "2022-12-25T10:57:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45798.json b/2022/CVE-2022-45798.json new file mode 100644 index 0000000000..dfb223e1c1 --- /dev/null +++ b/2022/CVE-2022-45798.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023312, + "name": "CVE-2022-45798", + "full_name": "Live-Hack-CVE\/CVE-2022-45798", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45798", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45798 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:16Z", + "updated_at": "2022-12-25T10:52:16Z", + "pushed_at": "2022-12-25T10:52:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4581.json b/2022/CVE-2022-4581.json new file mode 100644 index 0000000000..f2f2c01720 --- /dev/null +++ b/2022/CVE-2022-4581.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040683, + "name": "CVE-2022-4581", + "full_name": "Live-Hack-CVE\/CVE-2022-4581", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4581", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4581 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:51Z", + "updated_at": "2022-12-25T12:23:51Z", + "pushed_at": "2022-12-25T12:23:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4582.json b/2022/CVE-2022-4582.json new file mode 100644 index 0000000000..82b1467ee2 --- /dev/null +++ b/2022/CVE-2022-4582.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040670, + "name": "CVE-2022-4582", + "full_name": "Live-Hack-CVE\/CVE-2022-4582", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4582", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4582 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:48Z", + "updated_at": "2022-12-25T12:23:48Z", + "pushed_at": "2022-12-25T12:23:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4584.json b/2022/CVE-2022-4584.json new file mode 100644 index 0000000000..092329fadf --- /dev/null +++ b/2022/CVE-2022-4584.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040646, + "name": "CVE-2022-4584", + "full_name": "Live-Hack-CVE\/CVE-2022-4584", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4584", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4584 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:40Z", + "updated_at": "2022-12-25T12:23:40Z", + "pushed_at": "2022-12-25T12:23:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41038.json b/2022/CVE-2022-4585.json similarity index 76% rename from 2022/CVE-2022-41038.json rename to 2022/CVE-2022-4585.json index 9c6d64f7ae..0a3c7be959 100644 --- a/2022/CVE-2022-41038.json +++ b/2022/CVE-2022-4585.json @@ -1,20 +1,20 @@ [ { - "id": 581863979, - "name": "CVE-2022-41038", - "full_name": "Live-Hack-CVE\/CVE-2022-41038", + "id": 582040639, + "name": "CVE-2022-4585", + "full_name": "Live-Hack-CVE\/CVE-2022-4585", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41038", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41038 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4585", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4585 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:27:51Z", - "updated_at": "2022-12-24T16:27:51Z", - "pushed_at": "2022-12-24T16:27:53Z", + "created_at": "2022-12-25T12:23:37Z", + "updated_at": "2022-12-25T12:23:37Z", + "pushed_at": "2022-12-25T12:23:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-4586.json b/2022/CVE-2022-4586.json new file mode 100644 index 0000000000..5f7804521e --- /dev/null +++ b/2022/CVE-2022-4586.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040629, + "name": "CVE-2022-4586", + "full_name": "Live-Hack-CVE\/CVE-2022-4586", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4586", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4586 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:33Z", + "updated_at": "2022-12-25T12:23:33Z", + "pushed_at": "2022-12-25T12:23:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4587.json b/2022/CVE-2022-4587.json new file mode 100644 index 0000000000..b8675ab265 --- /dev/null +++ b/2022/CVE-2022-4587.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040615, + "name": "CVE-2022-4587", + "full_name": "Live-Hack-CVE\/CVE-2022-4587", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4587", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4587 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:23:30Z", + "updated_at": "2022-12-25T12:23:30Z", + "pushed_at": "2022-12-25T12:23:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4588.json b/2022/CVE-2022-4588.json new file mode 100644 index 0000000000..60c3b20c63 --- /dev/null +++ b/2022/CVE-2022-4588.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023526, + "name": "CVE-2022-4588", + "full_name": "Live-Hack-CVE\/CVE-2022-4588", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4588", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4588 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:53:23Z", + "updated_at": "2022-12-25T10:53:23Z", + "pushed_at": "2022-12-25T10:53:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45889.json b/2022/CVE-2022-45889.json new file mode 100644 index 0000000000..8311751612 --- /dev/null +++ b/2022/CVE-2022-45889.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023068, + "name": "CVE-2022-45889", + "full_name": "Live-Hack-CVE\/CVE-2022-45889", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45889", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45889 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:03Z", + "updated_at": "2022-12-25T10:51:03Z", + "pushed_at": "2022-12-25T10:51:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4589.json b/2022/CVE-2022-4589.json new file mode 100644 index 0000000000..bee114b769 --- /dev/null +++ b/2022/CVE-2022-4589.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023535, + "name": "CVE-2022-4589", + "full_name": "Live-Hack-CVE\/CVE-2022-4589", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4589", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4589 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:53:27Z", + "updated_at": "2022-12-25T10:53:27Z", + "pushed_at": "2022-12-25T10:53:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45890.json b/2022/CVE-2022-45890.json new file mode 100644 index 0000000000..32730dadd2 --- /dev/null +++ b/2022/CVE-2022-45890.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023078, + "name": "CVE-2022-45890", + "full_name": "Live-Hack-CVE\/CVE-2022-45890", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45890", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45890 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:06Z", + "updated_at": "2022-12-25T10:51:06Z", + "pushed_at": "2022-12-25T10:51:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45891.json b/2022/CVE-2022-45891.json new file mode 100644 index 0000000000..fe6f1a8eb8 --- /dev/null +++ b/2022/CVE-2022-45891.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023086, + "name": "CVE-2022-45891", + "full_name": "Live-Hack-CVE\/CVE-2022-45891", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45891", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45891 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:10Z", + "updated_at": "2022-12-25T10:51:10Z", + "pushed_at": "2022-12-25T10:51:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-27625.json b/2022/CVE-2022-45892.json similarity index 76% rename from 2021/CVE-2021-27625.json rename to 2022/CVE-2022-45892.json index 0b3051e5da..d83fbc45d4 100644 --- a/2021/CVE-2021-27625.json +++ b/2022/CVE-2022-45892.json @@ -1,20 +1,20 @@ [ { - "id": 581705946, - "name": "CVE-2021-27625", - "full_name": "Live-Hack-CVE\/CVE-2021-27625", + "id": 582023102, + "name": "CVE-2022-45892", + "full_name": "Live-Hack-CVE\/CVE-2022-45892", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27625", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27625 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45892", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45892 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T02:42:02Z", - "updated_at": "2022-12-24T02:42:02Z", - "pushed_at": "2022-12-24T02:42:03Z", + "created_at": "2022-12-25T10:51:13Z", + "updated_at": "2022-12-25T10:51:13Z", + "pushed_at": "2022-12-25T10:51:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-45893.json b/2022/CVE-2022-45893.json new file mode 100644 index 0000000000..ded2668d24 --- /dev/null +++ b/2022/CVE-2022-45893.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023020, + "name": "CVE-2022-45893", + "full_name": "Live-Hack-CVE\/CVE-2022-45893", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45893", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45893 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:50Z", + "updated_at": "2022-12-25T10:50:50Z", + "pushed_at": "2022-12-25T10:50:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45894.json b/2022/CVE-2022-45894.json new file mode 100644 index 0000000000..90952edc9f --- /dev/null +++ b/2022/CVE-2022-45894.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023031, + "name": "CVE-2022-45894", + "full_name": "Live-Hack-CVE\/CVE-2022-45894", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45894", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45894 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:53Z", + "updated_at": "2022-12-25T10:50:53Z", + "pushed_at": "2022-12-25T10:50:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45895.json b/2022/CVE-2022-45895.json new file mode 100644 index 0000000000..9c7c9540c5 --- /dev/null +++ b/2022/CVE-2022-45895.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023043, + "name": "CVE-2022-45895", + "full_name": "Live-Hack-CVE\/CVE-2022-45895", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45895", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45895 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:50:57Z", + "updated_at": "2022-12-25T10:50:57Z", + "pushed_at": "2022-12-25T10:50:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45896.json b/2022/CVE-2022-45896.json new file mode 100644 index 0000000000..65f9b177a2 --- /dev/null +++ b/2022/CVE-2022-45896.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023060, + "name": "CVE-2022-45896", + "full_name": "Live-Hack-CVE\/CVE-2022-45896", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45896", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45896 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:00Z", + "updated_at": "2022-12-25T10:51:00Z", + "pushed_at": "2022-12-25T10:51:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4590.json b/2022/CVE-2022-4590.json new file mode 100644 index 0000000000..44b9d4664e --- /dev/null +++ b/2022/CVE-2022-4590.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040119, + "name": "CVE-2022-4590", + "full_name": "Live-Hack-CVE\/CVE-2022-4590", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4590", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4590 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:22Z", + "updated_at": "2022-12-25T12:21:23Z", + "pushed_at": "2022-12-25T12:21:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4591.json b/2022/CVE-2022-4591.json new file mode 100644 index 0000000000..3fda56f73a --- /dev/null +++ b/2022/CVE-2022-4591.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040379, + "name": "CVE-2022-4591", + "full_name": "Live-Hack-CVE\/CVE-2022-4591", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4591", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4591 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:26Z", + "updated_at": "2022-12-25T12:22:26Z", + "pushed_at": "2022-12-25T12:22:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4592.json b/2022/CVE-2022-4592.json new file mode 100644 index 0000000000..db6790fa36 --- /dev/null +++ b/2022/CVE-2022-4592.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040367, + "name": "CVE-2022-4592", + "full_name": "Live-Hack-CVE\/CVE-2022-4592", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4592", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4592 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:22Z", + "updated_at": "2022-12-25T12:22:22Z", + "pushed_at": "2022-12-25T12:22:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4593.json b/2022/CVE-2022-4593.json new file mode 100644 index 0000000000..144ed92c30 --- /dev/null +++ b/2022/CVE-2022-4593.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040354, + "name": "CVE-2022-4593", + "full_name": "Live-Hack-CVE\/CVE-2022-4593", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4593", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4593 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:19Z", + "updated_at": "2022-12-25T12:22:19Z", + "pushed_at": "2022-12-25T12:22:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4594.json b/2022/CVE-2022-4594.json new file mode 100644 index 0000000000..f05593bdee --- /dev/null +++ b/2022/CVE-2022-4594.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040047, + "name": "CVE-2022-4594", + "full_name": "Live-Hack-CVE\/CVE-2022-4594", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4594", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4594 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:05Z", + "updated_at": "2022-12-25T12:21:05Z", + "pushed_at": "2022-12-25T12:21:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4595.json b/2022/CVE-2022-4595.json new file mode 100644 index 0000000000..84b81e8b69 --- /dev/null +++ b/2022/CVE-2022-4595.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040241, + "name": "CVE-2022-4595", + "full_name": "Live-Hack-CVE\/CVE-2022-4595", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4595", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4595 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:52Z", + "updated_at": "2022-12-25T12:21:52Z", + "pushed_at": "2022-12-25T12:21:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4596.json b/2022/CVE-2022-4596.json new file mode 100644 index 0000000000..fbd8d6e3e4 --- /dev/null +++ b/2022/CVE-2022-4596.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040014, + "name": "CVE-2022-4596", + "full_name": "Live-Hack-CVE\/CVE-2022-4596", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4596", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4596 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:20:57Z", + "updated_at": "2022-12-25T12:20:57Z", + "pushed_at": "2022-12-25T12:20:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45966.json b/2022/CVE-2022-45966.json new file mode 100644 index 0000000000..4bf4b0282e --- /dev/null +++ b/2022/CVE-2022-45966.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039597, + "name": "CVE-2022-45966", + "full_name": "Live-Hack-CVE\/CVE-2022-45966", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45966", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45966 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:48Z", + "updated_at": "2022-12-25T12:18:48Z", + "pushed_at": "2022-12-25T12:18:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4597.json b/2022/CVE-2022-4597.json new file mode 100644 index 0000000000..7b8d0d0906 --- /dev/null +++ b/2022/CVE-2022-4597.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040058, + "name": "CVE-2022-4597", + "full_name": "Live-Hack-CVE\/CVE-2022-4597", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4597", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4597 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:09Z", + "updated_at": "2022-12-25T12:21:09Z", + "pushed_at": "2022-12-25T12:21:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4598.json b/2022/CVE-2022-4598.json new file mode 100644 index 0000000000..1e2402ec1c --- /dev/null +++ b/2022/CVE-2022-4598.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040302, + "name": "CVE-2022-4598", + "full_name": "Live-Hack-CVE\/CVE-2022-4598", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4598", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4598 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:08Z", + "updated_at": "2022-12-25T12:22:09Z", + "pushed_at": "2022-12-25T12:22:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4599.json b/2022/CVE-2022-4599.json new file mode 100644 index 0000000000..58689dc4c5 --- /dev/null +++ b/2022/CVE-2022-4599.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040321, + "name": "CVE-2022-4599", + "full_name": "Live-Hack-CVE\/CVE-2022-4599", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4599", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4599 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:12Z", + "updated_at": "2022-12-25T12:22:12Z", + "pushed_at": "2022-12-25T12:22:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4600.json b/2022/CVE-2022-4600.json new file mode 100644 index 0000000000..059db2f886 --- /dev/null +++ b/2022/CVE-2022-4600.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040226, + "name": "CVE-2022-4600", + "full_name": "Live-Hack-CVE\/CVE-2022-4600", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4600", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4600 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:49Z", + "updated_at": "2022-12-25T12:21:49Z", + "pushed_at": "2022-12-25T12:21:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41210.json b/2022/CVE-2022-4601.json similarity index 75% rename from 2022/CVE-2022-41210.json rename to 2022/CVE-2022-4601.json index 62311884a4..c522948da1 100644 --- a/2022/CVE-2022-41210.json +++ b/2022/CVE-2022-4601.json @@ -1,20 +1,20 @@ [ { - "id": 581855601, - "name": "CVE-2022-41210", - "full_name": "Live-Hack-CVE\/CVE-2022-41210", + "id": 582040253, + "name": "CVE-2022-4601", + "full_name": "Live-Hack-CVE\/CVE-2022-4601", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41210", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41210 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4601", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4601 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:49:21Z", - "updated_at": "2022-12-24T15:49:21Z", - "pushed_at": "2022-12-24T15:49:23Z", + "created_at": "2022-12-25T12:21:55Z", + "updated_at": "2022-12-25T12:21:55Z", + "pushed_at": "2022-12-25T12:21:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-4602.json b/2022/CVE-2022-4602.json new file mode 100644 index 0000000000..cd08635c85 --- /dev/null +++ b/2022/CVE-2022-4602.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040290, + "name": "CVE-2022-4602", + "full_name": "Live-Hack-CVE\/CVE-2022-4602", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4602", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4602 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:05Z", + "updated_at": "2022-12-25T12:22:05Z", + "pushed_at": "2022-12-25T12:22:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28327.json b/2022/CVE-2022-4603.json similarity index 77% rename from 2022/CVE-2022-28327.json rename to 2022/CVE-2022-4603.json index 29b863600e..b85de609dd 100644 --- a/2022/CVE-2022-28327.json +++ b/2022/CVE-2022-4603.json @@ -1,20 +1,20 @@ [ { - "id": 581838754, - "name": "CVE-2022-28327", - "full_name": "Live-Hack-CVE\/CVE-2022-28327", + "id": 582039996, + "name": "CVE-2022-4603", + "full_name": "Live-Hack-CVE\/CVE-2022-4603", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28327", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28327 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4603", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4603 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:32:32Z", - "updated_at": "2022-12-24T14:32:32Z", - "pushed_at": "2022-12-24T14:32:34Z", + "created_at": "2022-12-25T12:20:50Z", + "updated_at": "2022-12-25T12:20:50Z", + "pushed_at": "2022-12-25T12:20:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-4604.json b/2022/CVE-2022-4604.json new file mode 100644 index 0000000000..b561636e87 --- /dev/null +++ b/2022/CVE-2022-4604.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023513, + "name": "CVE-2022-4604", + "full_name": "Live-Hack-CVE\/CVE-2022-4604", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4604", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4604 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:53:20Z", + "updated_at": "2022-12-25T10:53:20Z", + "pushed_at": "2022-12-25T10:53:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4605.json b/2022/CVE-2022-4605.json new file mode 100644 index 0000000000..8d65dac20d --- /dev/null +++ b/2022/CVE-2022-4605.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039971, + "name": "CVE-2022-4605", + "full_name": "Live-Hack-CVE\/CVE-2022-4605", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4605", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4605 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:20:44Z", + "updated_at": "2022-12-25T12:20:44Z", + "pushed_at": "2022-12-25T12:20:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4606.json b/2022/CVE-2022-4606.json new file mode 100644 index 0000000000..4fbee7de7e --- /dev/null +++ b/2022/CVE-2022-4606.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039986, + "name": "CVE-2022-4606", + "full_name": "Live-Hack-CVE\/CVE-2022-4606", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4606", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4606 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:20:47Z", + "updated_at": "2022-12-25T12:20:47Z", + "pushed_at": "2022-12-25T12:20:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46101.json b/2022/CVE-2022-46101.json new file mode 100644 index 0000000000..774cd145b9 --- /dev/null +++ b/2022/CVE-2022-46101.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039567, + "name": "CVE-2022-46101", + "full_name": "Live-Hack-CVE\/CVE-2022-46101", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46101", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46101 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:38Z", + "updated_at": "2022-12-25T12:18:38Z", + "pushed_at": "2022-12-25T12:18:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46102.json b/2022/CVE-2022-46102.json new file mode 100644 index 0000000000..c17684aabd --- /dev/null +++ b/2022/CVE-2022-46102.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039576, + "name": "CVE-2022-46102", + "full_name": "Live-Hack-CVE\/CVE-2022-46102", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46102", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46102 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:41Z", + "updated_at": "2022-12-25T12:18:41Z", + "pushed_at": "2022-12-25T12:18:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46170.json b/2022/CVE-2022-46170.json new file mode 100644 index 0000000000..d543d45d30 --- /dev/null +++ b/2022/CVE-2022-46170.json @@ -0,0 +1,31 @@ +[ + { + "id": 582038610, + "name": "CVE-2022-46170", + "full_name": "Live-Hack-CVE\/CVE-2022-46170", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46170", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46170 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:13:51Z", + "updated_at": "2022-12-25T12:13:51Z", + "pushed_at": "2022-12-25T12:13:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46171.json b/2022/CVE-2022-46171.json new file mode 100644 index 0000000000..6c203feb37 --- /dev/null +++ b/2022/CVE-2022-46171.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024627, + "name": "CVE-2022-46171", + "full_name": "Live-Hack-CVE\/CVE-2022-46171", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46171", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46171 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:43Z", + "updated_at": "2022-12-25T10:59:43Z", + "pushed_at": "2022-12-25T10:59:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46175.json b/2022/CVE-2022-46175.json new file mode 100644 index 0000000000..2cb0c040b1 --- /dev/null +++ b/2022/CVE-2022-46175.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023188, + "name": "CVE-2022-46175", + "full_name": "Live-Hack-CVE\/CVE-2022-46175", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46175", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46175 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:36Z", + "updated_at": "2022-12-25T10:51:36Z", + "pushed_at": "2022-12-25T10:51:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46491.json b/2022/CVE-2022-46491.json new file mode 100644 index 0000000000..12ab67b053 --- /dev/null +++ b/2022/CVE-2022-46491.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024981, + "name": "CVE-2022-46491", + "full_name": "Live-Hack-CVE\/CVE-2022-46491", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46491", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46491 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:31Z", + "updated_at": "2022-12-25T11:01:31Z", + "pushed_at": "2022-12-25T11:01:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46492.json b/2022/CVE-2022-46492.json new file mode 100644 index 0000000000..c7c86c4b58 --- /dev/null +++ b/2022/CVE-2022-46492.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024943, + "name": "CVE-2022-46492", + "full_name": "Live-Hack-CVE\/CVE-2022-46492", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46492", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46492 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:15Z", + "updated_at": "2022-12-25T11:01:15Z", + "pushed_at": "2022-12-25T11:01:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46493.json b/2022/CVE-2022-46493.json new file mode 100644 index 0000000000..13d20ce346 --- /dev/null +++ b/2022/CVE-2022-46493.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024993, + "name": "CVE-2022-46493", + "full_name": "Live-Hack-CVE\/CVE-2022-46493", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46493", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46493 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:35Z", + "updated_at": "2022-12-25T11:01:35Z", + "pushed_at": "2022-12-25T11:01:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46560.json b/2022/CVE-2022-46560.json new file mode 100644 index 0000000000..2ee8703430 --- /dev/null +++ b/2022/CVE-2022-46560.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024216, + "name": "CVE-2022-46560", + "full_name": "Live-Hack-CVE\/CVE-2022-46560", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46560", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46560 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:57:08Z", + "updated_at": "2022-12-25T10:57:08Z", + "pushed_at": "2022-12-25T10:57:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46561.json b/2022/CVE-2022-46561.json new file mode 100644 index 0000000000..7f46d0fa19 --- /dev/null +++ b/2022/CVE-2022-46561.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024229, + "name": "CVE-2022-46561", + "full_name": "Live-Hack-CVE\/CVE-2022-46561", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46561", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46561 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:57:11Z", + "updated_at": "2022-12-25T10:57:11Z", + "pushed_at": "2022-12-25T10:57:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46562.json b/2022/CVE-2022-46562.json new file mode 100644 index 0000000000..2e4b184ff4 --- /dev/null +++ b/2022/CVE-2022-46562.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024284, + "name": "CVE-2022-46562", + "full_name": "Live-Hack-CVE\/CVE-2022-46562", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46562", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46562 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:57:30Z", + "updated_at": "2022-12-25T10:57:30Z", + "pushed_at": "2022-12-25T10:57:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46563.json b/2022/CVE-2022-46563.json new file mode 100644 index 0000000000..d3b6f53e3a --- /dev/null +++ b/2022/CVE-2022-46563.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024293, + "name": "CVE-2022-46563", + "full_name": "Live-Hack-CVE\/CVE-2022-46563", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46563", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46563 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:57:33Z", + "updated_at": "2022-12-25T10:57:34Z", + "pushed_at": "2022-12-25T10:57:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46566.json b/2022/CVE-2022-46566.json new file mode 100644 index 0000000000..0e4bcea7e3 --- /dev/null +++ b/2022/CVE-2022-46566.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024299, + "name": "CVE-2022-46566", + "full_name": "Live-Hack-CVE\/CVE-2022-46566", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46566", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46566 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:57:37Z", + "updated_at": "2022-12-25T10:57:37Z", + "pushed_at": "2022-12-25T10:57:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41167.json b/2022/CVE-2022-46568.json similarity index 78% rename from 2022/CVE-2022-41167.json rename to 2022/CVE-2022-46568.json index 125303afa4..73f07af788 100644 --- a/2022/CVE-2022-41167.json +++ b/2022/CVE-2022-46568.json @@ -1,20 +1,20 @@ [ { - "id": 581856184, - "name": "CVE-2022-41167", - "full_name": "Live-Hack-CVE\/CVE-2022-41167", + "id": 582024312, + "name": "CVE-2022-46568", + "full_name": "Live-Hack-CVE\/CVE-2022-46568", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41167", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41167 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46568", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46568 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:51:43Z", - "updated_at": "2022-12-24T15:51:43Z", - "pushed_at": "2022-12-24T15:51:45Z", + "created_at": "2022-12-25T10:57:40Z", + "updated_at": "2022-12-25T10:57:40Z", + "pushed_at": "2022-12-25T10:57:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-41197.json b/2022/CVE-2022-46569.json similarity index 78% rename from 2022/CVE-2022-41197.json rename to 2022/CVE-2022-46569.json index 705d895063..1f512d36f1 100644 --- a/2022/CVE-2022-41197.json +++ b/2022/CVE-2022-46569.json @@ -1,20 +1,20 @@ [ { - "id": 581855896, - "name": "CVE-2022-41197", - "full_name": "Live-Hack-CVE\/CVE-2022-41197", + "id": 582024326, + "name": "CVE-2022-46569", + "full_name": "Live-Hack-CVE\/CVE-2022-46569", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41197", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41197 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46569", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46569 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T15:50:34Z", - "updated_at": "2022-12-24T15:50:34Z", - "pushed_at": "2022-12-24T15:50:36Z", + "created_at": "2022-12-25T10:57:43Z", + "updated_at": "2022-12-25T10:57:43Z", + "pushed_at": "2022-12-25T10:57:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-46570.json b/2022/CVE-2022-46570.json new file mode 100644 index 0000000000..58a2e73cbd --- /dev/null +++ b/2022/CVE-2022-46570.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024336, + "name": "CVE-2022-46570", + "full_name": "Live-Hack-CVE\/CVE-2022-46570", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46570", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46570 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:57:46Z", + "updated_at": "2022-12-25T10:57:46Z", + "pushed_at": "2022-12-25T10:57:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4662.json b/2022/CVE-2022-4662.json new file mode 100644 index 0000000000..be9d8fb814 --- /dev/null +++ b/2022/CVE-2022-4662.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030925, + "name": "CVE-2022-4662", + "full_name": "Live-Hack-CVE\/CVE-2022-4662", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4662", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4662 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:33:56Z", + "updated_at": "2022-12-25T11:33:56Z", + "pushed_at": "2022-12-25T11:33:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46641.json b/2022/CVE-2022-46641.json new file mode 100644 index 0000000000..9fd073b189 --- /dev/null +++ b/2022/CVE-2022-46641.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024579, + "name": "CVE-2022-46641", + "full_name": "Live-Hack-CVE\/CVE-2022-46641", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46641", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46641 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:27Z", + "updated_at": "2022-12-25T10:59:27Z", + "pushed_at": "2022-12-25T10:59:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34434.json b/2022/CVE-2022-46642.json similarity index 76% rename from 2022/CVE-2022-34434.json rename to 2022/CVE-2022-46642.json index 421ce48034..4167af6f2a 100644 --- a/2022/CVE-2022-34434.json +++ b/2022/CVE-2022-46642.json @@ -1,20 +1,20 @@ [ { - "id": 581839244, - "name": "CVE-2022-34434", - "full_name": "Live-Hack-CVE\/CVE-2022-34434", + "id": 582024588, + "name": "CVE-2022-46642", + "full_name": "Live-Hack-CVE\/CVE-2022-46642", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34434", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34434 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46642", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46642 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T14:34:40Z", - "updated_at": "2022-12-24T14:34:40Z", - "pushed_at": "2022-12-24T14:34:42Z", + "created_at": "2022-12-25T10:59:31Z", + "updated_at": "2022-12-25T10:59:31Z", + "pushed_at": "2022-12-25T10:59:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-4665.json b/2022/CVE-2022-4665.json new file mode 100644 index 0000000000..18065a6aa4 --- /dev/null +++ b/2022/CVE-2022-4665.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024957, + "name": "CVE-2022-4665", + "full_name": "Live-Hack-CVE\/CVE-2022-4665", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4665", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4665 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:21Z", + "updated_at": "2022-12-25T11:01:21Z", + "pushed_at": "2022-12-25T11:01:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46670.json b/2022/CVE-2022-46670.json new file mode 100644 index 0000000000..94e1f6ca2f --- /dev/null +++ b/2022/CVE-2022-46670.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040032, + "name": "CVE-2022-46670", + "full_name": "Live-Hack-CVE\/CVE-2022-46670", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46670", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46670 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:01Z", + "updated_at": "2022-12-25T12:21:01Z", + "pushed_at": "2022-12-25T12:21:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4683.json b/2022/CVE-2022-4683.json new file mode 100644 index 0000000000..08091cfd0b --- /dev/null +++ b/2022/CVE-2022-4683.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024781, + "name": "CVE-2022-4683", + "full_name": "Live-Hack-CVE\/CVE-2022-4683", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4683", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4683 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:30Z", + "updated_at": "2022-12-25T11:00:30Z", + "pushed_at": "2022-12-25T11:00:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4684.json b/2022/CVE-2022-4684.json new file mode 100644 index 0000000000..ca95a7430c --- /dev/null +++ b/2022/CVE-2022-4684.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024797, + "name": "CVE-2022-4684", + "full_name": "Live-Hack-CVE\/CVE-2022-4684", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4684", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4684 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:33Z", + "updated_at": "2022-12-25T11:00:33Z", + "pushed_at": "2022-12-25T11:00:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4685.json b/2022/CVE-2022-4685.json new file mode 100644 index 0000000000..d0bb85687e --- /dev/null +++ b/2022/CVE-2022-4685.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024810, + "name": "CVE-2022-4685", + "full_name": "Live-Hack-CVE\/CVE-2022-4685", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4685", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4685 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:37Z", + "updated_at": "2022-12-25T11:00:37Z", + "pushed_at": "2022-12-25T11:00:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4686.json b/2022/CVE-2022-4686.json new file mode 100644 index 0000000000..d6815c152f --- /dev/null +++ b/2022/CVE-2022-4686.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024828, + "name": "CVE-2022-4686", + "full_name": "Live-Hack-CVE\/CVE-2022-4686", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4686", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4686 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:40Z", + "updated_at": "2022-12-25T11:00:40Z", + "pushed_at": "2022-12-25T11:00:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4687.json b/2022/CVE-2022-4687.json new file mode 100644 index 0000000000..5ec88cf975 --- /dev/null +++ b/2022/CVE-2022-4687.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024847, + "name": "CVE-2022-4687", + "full_name": "Live-Hack-CVE\/CVE-2022-4687", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4687", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4687 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:43Z", + "updated_at": "2022-12-25T11:00:43Z", + "pushed_at": "2022-12-25T11:00:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46871.json b/2022/CVE-2022-46871.json new file mode 100644 index 0000000000..a379a209ee --- /dev/null +++ b/2022/CVE-2022-46871.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031809, + "name": "CVE-2022-46871", + "full_name": "Live-Hack-CVE\/CVE-2022-46871", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46871", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46871 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:12Z", + "updated_at": "2022-12-25T11:38:12Z", + "pushed_at": "2022-12-25T11:38:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46872.json b/2022/CVE-2022-46872.json new file mode 100644 index 0000000000..00b007074c --- /dev/null +++ b/2022/CVE-2022-46872.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031837, + "name": "CVE-2022-46872", + "full_name": "Live-Hack-CVE\/CVE-2022-46872", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46872", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46872 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:18Z", + "updated_at": "2022-12-25T11:38:18Z", + "pushed_at": "2022-12-25T11:38:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46873.json b/2022/CVE-2022-46873.json new file mode 100644 index 0000000000..d6df4e3cb5 --- /dev/null +++ b/2022/CVE-2022-46873.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031874, + "name": "CVE-2022-46873", + "full_name": "Live-Hack-CVE\/CVE-2022-46873", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46873", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46873 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:29Z", + "updated_at": "2022-12-25T11:38:29Z", + "pushed_at": "2022-12-25T11:38:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46874.json b/2022/CVE-2022-46874.json new file mode 100644 index 0000000000..1d234915dc --- /dev/null +++ b/2022/CVE-2022-46874.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031901, + "name": "CVE-2022-46874", + "full_name": "Live-Hack-CVE\/CVE-2022-46874", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46874", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46874 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:38:38Z", + "updated_at": "2022-12-25T11:38:38Z", + "pushed_at": "2022-12-25T11:38:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46875.json b/2022/CVE-2022-46875.json new file mode 100644 index 0000000000..6398d657d2 --- /dev/null +++ b/2022/CVE-2022-46875.json @@ -0,0 +1,31 @@ +[ + { + "id": 582031998, + "name": "CVE-2022-46875", + "full_name": "Live-Hack-CVE\/CVE-2022-46875", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46875", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46875 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:07Z", + "updated_at": "2022-12-25T11:39:07Z", + "pushed_at": "2022-12-25T11:39:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46877.json b/2022/CVE-2022-46877.json new file mode 100644 index 0000000000..43d89c56b0 --- /dev/null +++ b/2022/CVE-2022-46877.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032017, + "name": "CVE-2022-46877", + "full_name": "Live-Hack-CVE\/CVE-2022-46877", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46877", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46877 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:14Z", + "updated_at": "2022-12-25T11:39:14Z", + "pushed_at": "2022-12-25T11:39:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46878.json b/2022/CVE-2022-46878.json new file mode 100644 index 0000000000..b3272a9196 --- /dev/null +++ b/2022/CVE-2022-46878.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032050, + "name": "CVE-2022-46878", + "full_name": "Live-Hack-CVE\/CVE-2022-46878", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46878", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46878 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:24Z", + "updated_at": "2022-12-25T11:39:24Z", + "pushed_at": "2022-12-25T11:39:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46879.json b/2022/CVE-2022-46879.json new file mode 100644 index 0000000000..eecd8aa2a0 --- /dev/null +++ b/2022/CVE-2022-46879.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032082, + "name": "CVE-2022-46879", + "full_name": "Live-Hack-CVE\/CVE-2022-46879", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46879", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46879 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:37Z", + "updated_at": "2022-12-25T11:39:37Z", + "pushed_at": "2022-12-25T11:39:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4688.json b/2022/CVE-2022-4688.json new file mode 100644 index 0000000000..d2289b7b31 --- /dev/null +++ b/2022/CVE-2022-4688.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024856, + "name": "CVE-2022-4688", + "full_name": "Live-Hack-CVE\/CVE-2022-4688", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4688", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4688 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:46Z", + "updated_at": "2022-12-25T11:00:46Z", + "pushed_at": "2022-12-25T11:00:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46880.json b/2022/CVE-2022-46880.json new file mode 100644 index 0000000000..ad16086122 --- /dev/null +++ b/2022/CVE-2022-46880.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032109, + "name": "CVE-2022-46880", + "full_name": "Live-Hack-CVE\/CVE-2022-46880", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46880", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46880 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:47Z", + "updated_at": "2022-12-25T11:39:47Z", + "pushed_at": "2022-12-25T11:39:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46881.json b/2022/CVE-2022-46881.json new file mode 100644 index 0000000000..2c2aae7f12 --- /dev/null +++ b/2022/CVE-2022-46881.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032120, + "name": "CVE-2022-46881", + "full_name": "Live-Hack-CVE\/CVE-2022-46881", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46881", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46881 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:50Z", + "updated_at": "2022-12-25T11:39:50Z", + "pushed_at": "2022-12-25T11:39:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46882.json b/2022/CVE-2022-46882.json new file mode 100644 index 0000000000..658f130698 --- /dev/null +++ b/2022/CVE-2022-46882.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032135, + "name": "CVE-2022-46882", + "full_name": "Live-Hack-CVE\/CVE-2022-46882", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46882", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46882 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:39:56Z", + "updated_at": "2022-12-25T11:39:56Z", + "pushed_at": "2022-12-25T11:39:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46883.json b/2022/CVE-2022-46883.json new file mode 100644 index 0000000000..0fe475e86b --- /dev/null +++ b/2022/CVE-2022-46883.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032187, + "name": "CVE-2022-46883", + "full_name": "Live-Hack-CVE\/CVE-2022-46883", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46883", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46883 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:06Z", + "updated_at": "2022-12-25T11:40:06Z", + "pushed_at": "2022-12-25T11:40:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-46885.json b/2022/CVE-2022-46885.json new file mode 100644 index 0000000000..63bb327995 --- /dev/null +++ b/2022/CVE-2022-46885.json @@ -0,0 +1,31 @@ +[ + { + "id": 582032247, + "name": "CVE-2022-46885", + "full_name": "Live-Hack-CVE\/CVE-2022-46885", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46885", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46885 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:40:26Z", + "updated_at": "2022-12-25T11:40:26Z", + "pushed_at": "2022-12-25T11:40:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4689.json b/2022/CVE-2022-4689.json new file mode 100644 index 0000000000..fab5a97e82 --- /dev/null +++ b/2022/CVE-2022-4689.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024868, + "name": "CVE-2022-4689", + "full_name": "Live-Hack-CVE\/CVE-2022-4689", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4689", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4689 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:50Z", + "updated_at": "2022-12-25T11:00:50Z", + "pushed_at": "2022-12-25T11:00:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4690.json b/2022/CVE-2022-4690.json new file mode 100644 index 0000000000..dd81bb4a8a --- /dev/null +++ b/2022/CVE-2022-4690.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024878, + "name": "CVE-2022-4690", + "full_name": "Live-Hack-CVE\/CVE-2022-4690", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4690", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4690 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:00:53Z", + "updated_at": "2022-12-25T11:00:53Z", + "pushed_at": "2022-12-25T11:00:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35046.json b/2022/CVE-2022-4692.json similarity index 77% rename from 2022/CVE-2022-35046.json rename to 2022/CVE-2022-4692.json index c56d3f819b..0aed473132 100644 --- a/2022/CVE-2022-35046.json +++ b/2022/CVE-2022-4692.json @@ -1,20 +1,20 @@ [ { - "id": 581829167, - "name": "CVE-2022-35046", - "full_name": "Live-Hack-CVE\/CVE-2022-35046", + "id": 582023448, + "name": "CVE-2022-4692", + "full_name": "Live-Hack-CVE\/CVE-2022-4692", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35046", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35046 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4692", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4692 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T13:50:22Z", - "updated_at": "2022-12-24T13:50:22Z", - "pushed_at": "2022-12-24T13:50:24Z", + "created_at": "2022-12-25T10:52:57Z", + "updated_at": "2022-12-25T10:52:57Z", + "pushed_at": "2022-12-25T10:52:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-4697.json b/2022/CVE-2022-4697.json new file mode 100644 index 0000000000..fd92c13bac --- /dev/null +++ b/2022/CVE-2022-4697.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024612, + "name": "CVE-2022-4697", + "full_name": "Live-Hack-CVE\/CVE-2022-4697", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4697", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4697 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:37Z", + "updated_at": "2022-12-25T10:59:37Z", + "pushed_at": "2022-12-25T10:59:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4698.json b/2022/CVE-2022-4698.json new file mode 100644 index 0000000000..122a9511a7 --- /dev/null +++ b/2022/CVE-2022-4698.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024620, + "name": "CVE-2022-4698", + "full_name": "Live-Hack-CVE\/CVE-2022-4698", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4698", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4698 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:59:40Z", + "updated_at": "2022-12-25T10:59:40Z", + "pushed_at": "2022-12-25T10:59:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47514.json b/2022/CVE-2022-47514.json new file mode 100644 index 0000000000..1c9306b4e6 --- /dev/null +++ b/2022/CVE-2022-47514.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040107, + "name": "CVE-2022-47514", + "full_name": "Live-Hack-CVE\/CVE-2022-47514", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47514", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47514 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:19Z", + "updated_at": "2022-12-25T12:21:19Z", + "pushed_at": "2022-12-25T12:21:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47515.json b/2022/CVE-2022-47515.json new file mode 100644 index 0000000000..3971f11eac --- /dev/null +++ b/2022/CVE-2022-47515.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040086, + "name": "CVE-2022-47515", + "full_name": "Live-Hack-CVE\/CVE-2022-47515", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47515", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47515 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:21:15Z", + "updated_at": "2022-12-25T12:21:15Z", + "pushed_at": "2022-12-25T12:21:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47518.json b/2022/CVE-2022-47518.json new file mode 100644 index 0000000000..bf79258cda --- /dev/null +++ b/2022/CVE-2022-47518.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040430, + "name": "CVE-2022-47518", + "full_name": "Live-Hack-CVE\/CVE-2022-47518", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47518", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47518 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:39Z", + "updated_at": "2022-12-25T12:22:39Z", + "pushed_at": "2022-12-25T12:22:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47519.json b/2022/CVE-2022-47519.json new file mode 100644 index 0000000000..ce1475126f --- /dev/null +++ b/2022/CVE-2022-47519.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040442, + "name": "CVE-2022-47519", + "full_name": "Live-Hack-CVE\/CVE-2022-47519", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47519", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47519 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:42Z", + "updated_at": "2022-12-25T12:22:42Z", + "pushed_at": "2022-12-25T12:22:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47520.json b/2022/CVE-2022-47520.json new file mode 100644 index 0000000000..236002b191 --- /dev/null +++ b/2022/CVE-2022-47520.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040466, + "name": "CVE-2022-47520", + "full_name": "Live-Hack-CVE\/CVE-2022-47520", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47520", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47520 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:46Z", + "updated_at": "2022-12-25T12:22:46Z", + "pushed_at": "2022-12-25T12:22:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47521.json b/2022/CVE-2022-47521.json new file mode 100644 index 0000000000..9374f4593e --- /dev/null +++ b/2022/CVE-2022-47521.json @@ -0,0 +1,31 @@ +[ + { + "id": 582040478, + "name": "CVE-2022-47521", + "full_name": "Live-Hack-CVE\/CVE-2022-47521", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47521", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47521 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:22:49Z", + "updated_at": "2022-12-25T12:22:49Z", + "pushed_at": "2022-12-25T12:22:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39860.json b/2022/CVE-2022-47524.json similarity index 78% rename from 2022/CVE-2022-39860.json rename to 2022/CVE-2022-47524.json index 8a22196ab7..8842c1fa38 100644 --- a/2022/CVE-2022-39860.json +++ b/2022/CVE-2022-47524.json @@ -1,20 +1,20 @@ [ { - "id": 581865423, - "name": "CVE-2022-39860", - "full_name": "Live-Hack-CVE\/CVE-2022-39860", + "id": 582024636, + "name": "CVE-2022-47524", + "full_name": "Live-Hack-CVE\/CVE-2022-47524", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39860", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39860 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47524", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47524 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T16:34:41Z", - "updated_at": "2022-12-24T16:34:42Z", - "pushed_at": "2022-12-24T16:34:43Z", + "created_at": "2022-12-25T10:59:47Z", + "updated_at": "2022-12-25T10:59:47Z", + "pushed_at": "2022-12-25T10:59:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-47633.json b/2022/CVE-2022-47633.json new file mode 100644 index 0000000000..f5931aad3c --- /dev/null +++ b/2022/CVE-2022-47633.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023262, + "name": "CVE-2022-47633", + "full_name": "Live-Hack-CVE\/CVE-2022-47633", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47633", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47633 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:04Z", + "updated_at": "2022-12-25T10:52:04Z", + "pushed_at": "2022-12-25T10:52:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47926.json b/2022/CVE-2022-47926.json new file mode 100644 index 0000000000..84f1f49875 --- /dev/null +++ b/2022/CVE-2022-47926.json @@ -0,0 +1,31 @@ +[ + { + "id": 582039585, + "name": "CVE-2022-47926", + "full_name": "Live-Hack-CVE\/CVE-2022-47926", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47926", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47926 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T12:18:45Z", + "updated_at": "2022-12-25T12:18:45Z", + "pushed_at": "2022-12-25T12:18:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47928.json b/2022/CVE-2022-47928.json new file mode 100644 index 0000000000..6f0215c94f --- /dev/null +++ b/2022/CVE-2022-47928.json @@ -0,0 +1,31 @@ +[ + { + "id": 582025006, + "name": "CVE-2022-47928", + "full_name": "Live-Hack-CVE\/CVE-2022-47928", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47928", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47928 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:01:38Z", + "updated_at": "2022-12-25T11:01:38Z", + "pushed_at": "2022-12-25T11:01:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47931.json b/2022/CVE-2022-47931.json new file mode 100644 index 0000000000..457a2ac6d2 --- /dev/null +++ b/2022/CVE-2022-47931.json @@ -0,0 +1,31 @@ +[ + { + "id": 582030532, + "name": "CVE-2022-47931", + "full_name": "Live-Hack-CVE\/CVE-2022-47931", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47931", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47931 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T11:31:55Z", + "updated_at": "2022-12-25T11:31:55Z", + "pushed_at": "2022-12-25T11:31:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47932.json b/2022/CVE-2022-47932.json new file mode 100644 index 0000000000..77a8690d1d --- /dev/null +++ b/2022/CVE-2022-47932.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023152, + "name": "CVE-2022-47932", + "full_name": "Live-Hack-CVE\/CVE-2022-47932", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47932", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47932 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:26Z", + "updated_at": "2022-12-25T10:51:26Z", + "pushed_at": "2022-12-25T10:51:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47933.json b/2022/CVE-2022-47933.json new file mode 100644 index 0000000000..27d3c818f4 --- /dev/null +++ b/2022/CVE-2022-47933.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023163, + "name": "CVE-2022-47933", + "full_name": "Live-Hack-CVE\/CVE-2022-47933", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47933", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47933 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:30Z", + "updated_at": "2022-12-25T10:51:30Z", + "pushed_at": "2022-12-25T10:51:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47934.json b/2022/CVE-2022-47934.json new file mode 100644 index 0000000000..7efb464ae8 --- /dev/null +++ b/2022/CVE-2022-47934.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023176, + "name": "CVE-2022-47934", + "full_name": "Live-Hack-CVE\/CVE-2022-47934", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47934", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47934 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:33Z", + "updated_at": "2022-12-25T10:51:33Z", + "pushed_at": "2022-12-25T10:51:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3467.json b/2022/CVE-2022-47938.json similarity index 75% rename from 2022/CVE-2022-3467.json rename to 2022/CVE-2022-47938.json index ede7f748cd..0fb836c6a1 100644 --- a/2022/CVE-2022-3467.json +++ b/2022/CVE-2022-47938.json @@ -1,20 +1,20 @@ [ { - "id": 581829742, - "name": "CVE-2022-3467", - "full_name": "Live-Hack-CVE\/CVE-2022-3467", + "id": 582024365, + "name": "CVE-2022-47938", + "full_name": "Live-Hack-CVE\/CVE-2022-47938", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3467", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3467 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47938", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47938 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T13:52:45Z", - "updated_at": "2022-12-24T13:52:45Z", - "pushed_at": "2022-12-24T13:52:47Z", + "created_at": "2022-12-25T10:58:01Z", + "updated_at": "2022-12-25T10:58:01Z", + "pushed_at": "2022-12-25T10:58:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-47939.json b/2022/CVE-2022-47939.json new file mode 100644 index 0000000000..efa9664db4 --- /dev/null +++ b/2022/CVE-2022-47939.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024373, + "name": "CVE-2022-47939", + "full_name": "Live-Hack-CVE\/CVE-2022-47939", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47939", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47939 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:58:05Z", + "updated_at": "2022-12-25T10:58:05Z", + "pushed_at": "2022-12-25T10:58:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47940.json b/2022/CVE-2022-47940.json new file mode 100644 index 0000000000..a54f09bf68 --- /dev/null +++ b/2022/CVE-2022-47940.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024375, + "name": "CVE-2022-47940", + "full_name": "Live-Hack-CVE\/CVE-2022-47940", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47940", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47940 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:58:08Z", + "updated_at": "2022-12-25T10:58:08Z", + "pushed_at": "2022-12-25T10:58:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41577.json b/2022/CVE-2022-47941.json similarity index 78% rename from 2022/CVE-2022-41577.json rename to 2022/CVE-2022-47941.json index 0d4b38b7cf..55ecee4550 100644 --- a/2022/CVE-2022-41577.json +++ b/2022/CVE-2022-47941.json @@ -1,20 +1,20 @@ [ { - "id": 581829501, - "name": "CVE-2022-41577", - "full_name": "Live-Hack-CVE\/CVE-2022-41577", + "id": 582024388, + "name": "CVE-2022-47941", + "full_name": "Live-Hack-CVE\/CVE-2022-47941", "owner": { "login": "Live-Hack-CVE", "id": 121191732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41577", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41577 Made by Sn0wAlice. ❤️", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47941", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47941 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2022-12-24T13:51:43Z", - "updated_at": "2022-12-24T13:51:43Z", - "pushed_at": "2022-12-24T13:51:46Z", + "created_at": "2022-12-25T10:58:11Z", + "updated_at": "2022-12-25T10:58:11Z", + "pushed_at": "2022-12-25T10:58:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-47942.json b/2022/CVE-2022-47942.json new file mode 100644 index 0000000000..3a906fb9aa --- /dev/null +++ b/2022/CVE-2022-47942.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024394, + "name": "CVE-2022-47942", + "full_name": "Live-Hack-CVE\/CVE-2022-47942", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47942", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47942 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:58:14Z", + "updated_at": "2022-12-25T10:58:14Z", + "pushed_at": "2022-12-25T10:58:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47943.json b/2022/CVE-2022-47943.json new file mode 100644 index 0000000000..04894f6dc9 --- /dev/null +++ b/2022/CVE-2022-47943.json @@ -0,0 +1,31 @@ +[ + { + "id": 582024067, + "name": "CVE-2022-47943", + "full_name": "Live-Hack-CVE\/CVE-2022-47943", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47943", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47943 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:56:25Z", + "updated_at": "2022-12-25T10:56:25Z", + "pushed_at": "2022-12-25T10:56:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47945.json b/2022/CVE-2022-47945.json new file mode 100644 index 0000000000..0d15175abc --- /dev/null +++ b/2022/CVE-2022-47945.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023349, + "name": "CVE-2022-47945", + "full_name": "Live-Hack-CVE\/CVE-2022-47945", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47945", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47945 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:31Z", + "updated_at": "2022-12-25T10:52:31Z", + "pushed_at": "2022-12-25T10:52:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47946.json b/2022/CVE-2022-47946.json new file mode 100644 index 0000000000..b89cf779ec --- /dev/null +++ b/2022/CVE-2022-47946.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023384, + "name": "CVE-2022-47946", + "full_name": "Live-Hack-CVE\/CVE-2022-47946", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47946", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47946 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:52:40Z", + "updated_at": "2022-12-25T10:52:40Z", + "pushed_at": "2022-12-25T10:52:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-47949.json b/2022/CVE-2022-47949.json new file mode 100644 index 0000000000..1bc275bbfc --- /dev/null +++ b/2022/CVE-2022-47949.json @@ -0,0 +1,31 @@ +[ + { + "id": 582023139, + "name": "CVE-2022-47949", + "full_name": "Live-Hack-CVE\/CVE-2022-47949", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-47949", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-47949 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-25T10:51:22Z", + "updated_at": "2022-12-25T10:51:22Z", + "pushed_at": "2022-12-25T10:51:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index ebf8914441..05b3a16921 100644 --- a/README.md +++ b/README.md @@ -1,14 +1,6 @@ # PoC in GitHub ## 2022 -### CVE-2022-0030 (2022-10-12) - - -An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions. - - -- [Live-Hack-CVE/CVE-2022-0030](https://github.com/Live-Hack-CVE/CVE-2022-0030) - ### CVE-2022-0185 (2022-02-11) @@ -103,6 +95,22 @@ A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in - [chenaotian/CVE-2022-0492](https://github.com/chenaotian/CVE-2022-0492) - [Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492](https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2022-0492) +### CVE-2022-0511 (2022-12-22) + + +Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97. + + +- [Live-Hack-CVE/CVE-2022-0511](https://github.com/Live-Hack-CVE/CVE-2022-0511) + +### CVE-2022-0517 (2022-12-22) + + +Mozilla VPN can load an OpenSSL configuration file from an unsecured directory. A user or attacker with limited privileges could leverage this to launch arbitrary code with SYSTEM privilege. This vulnerability affects Mozilla VPN < 2.7.1. + + +- [Live-Hack-CVE/CVE-2022-0517](https://github.com/Live-Hack-CVE/CVE-2022-0517) + ### CVE-2022-0529 (2022-02-09) @@ -128,6 +136,14 @@ It was discovered, that redis, a persistent key-value database, due to a packagi - [aodsec/CVE-2022-0543](https://github.com/aodsec/CVE-2022-0543) +### CVE-2022-0566 (2022-12-22) + + +It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message. This vulnerability affects Thunderbird < 91.6.1. + + +- [Live-Hack-CVE/CVE-2022-0566](https://github.com/Live-Hack-CVE/CVE-2022-0566) + ### CVE-2022-0619 (2022-03-28) @@ -236,13 +252,13 @@ Improper Access Control to Remote Code Execution in GitHub repository webmin/web - [faisalfs10x/Webmin-CVE-2022-0824-revshell](https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell) - [honypot/CVE-2022-0824](https://github.com/honypot/CVE-2022-0824) -### CVE-2022-0836 (2022-05-09) +### CVE-2022-0843 (2022-12-22) -The SEMA API WordPress plugin before 4.02 does not properly sanitise and escape some parameters before using them in SQL statements via an AJAX action, leading to SQL Injections exploitable by unauthenticated users +Mozilla developers Kershaw Chang, Ryan VanderMeulen, and Randell Jesup reported memory safety bugs present in Firefox 97. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 98. -- [Live-Hack-CVE/CVE-2022-0836](https://github.com/Live-Hack-CVE/CVE-2022-0836) +- [Live-Hack-CVE/CVE-2022-0843](https://github.com/Live-Hack-CVE/CVE-2022-0843) ### CVE-2022-0847 (2022-03-07) @@ -331,14 +347,6 @@ A flaw was found in JBoss-client. The vulnerability occurs due to a memory leak - [ByteHackr/CVE-2022-0853](https://github.com/ByteHackr/CVE-2022-0853) -### CVE-2022-0854 (2022-03-23) - - -A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space. - - -- [Live-Hack-CVE/CVE-2022-0854](https://github.com/Live-Hack-CVE/CVE-2022-0854) - ### CVE-2022-0918 (2022-03-16) @@ -371,14 +379,6 @@ An integer overflow flaw was found in the Linux kernel’s virtio device driver - [Live-Hack-CVE/CVE-2022-0998](https://github.com/Live-Hack-CVE/CVE-2022-0998) -### CVE-2022-1011 (2022-03-18) - - -A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. - - -- [Live-Hack-CVE/CVE-2022-1011](https://github.com/Live-Hack-CVE/CVE-2022-1011) - ### CVE-2022-1015 (2022-04-29) @@ -420,6 +420,14 @@ Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote att - [Mav3r1ck0x1/Chrome-and-Edge-Version-Dumper](https://github.com/Mav3r1ck0x1/Chrome-and-Edge-Version-Dumper) +### CVE-2022-1097 (2022-12-22) + + +<code>NSSToken</code> objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. + + +- [Live-Hack-CVE/CVE-2022-1097](https://github.com/Live-Hack-CVE/CVE-2022-1097) + ### CVE-2022-1162 (2022-04-04) @@ -452,6 +460,22 @@ The Turn off all comments WordPress plugin through 1.0 does not sanitise and esc - [Mouhamedtec/CVE-2022-1192](https://github.com/Mouhamedtec/CVE-2022-1192) +### CVE-2022-1196 (2022-12-22) + + +After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8 and Firefox ESR < 91.8. + + +- [Live-Hack-CVE/CVE-2022-1196](https://github.com/Live-Hack-CVE/CVE-2022-1196) + +### CVE-2022-1197 (2022-12-22) + + +When importing a revoked key that specified key compromise as the revocation reason, Thunderbird did not update the existing copy of the key that was not yet revoked, and the existing key was kept as non-revoked. Revocation statements that used another revocation reason, or that didn't specify a revocation reason, were unaffected. This vulnerability affects Thunderbird < 91.8. + + +- [Live-Hack-CVE/CVE-2022-1197](https://github.com/Live-Hack-CVE/CVE-2022-1197) + ### CVE-2022-1271 (2022-08-31) @@ -471,14 +495,6 @@ The c_rehash script does not properly sanitise shell metacharacters to prevent c - [alcaparra/CVE-2022-1292](https://github.com/alcaparra/CVE-2022-1292) - [rama291041610/CVE-2022-1292](https://github.com/rama291041610/CVE-2022-1292) -### CVE-2022-1328 (2022-04-14) - - -Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line - - -- [Live-Hack-CVE/CVE-2022-1328](https://github.com/Live-Hack-CVE/CVE-2022-1328) - ### CVE-2022-1329 (2022-04-19) @@ -549,13 +565,21 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5. - [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388) - [vaelwolf/CVE-2022-1388](https://github.com/vaelwolf/CVE-2022-1388) -### CVE-2022-1560 (2022-05-16) +### CVE-2022-1520 (2022-12-22) -The Amministrazione Aperta WordPress plugin before 3.8 does not validate the open parameter before using it in an include statement, leading to a Local File Inclusion issue. The original advisory mentions that unauthenticated users can exploit this, however the affected file generates a fatal error when accessed directly and the affected code is not reached. The issue can be exploited via the dashboard when logged in as an admin, or by making a logged in admin open a malicious link +When viewing an email message A, which contains an attached message B, where B is encrypted or digitally signed or both, Thunderbird may show an incorrect encryption or signature status. After opening and viewing the attached message B, when returning to the display of message A, the message A might be shown with the security status of message B. This vulnerability affects Thunderbird < 91.9. -- [Live-Hack-CVE/CVE-2022-1560](https://github.com/Live-Hack-CVE/CVE-2022-1560) +- [Live-Hack-CVE/CVE-2022-1520](https://github.com/Live-Hack-CVE/CVE-2022-1520) + +### CVE-2022-1529 (2022-12-22) + + +An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. + + +- [Live-Hack-CVE/CVE-2022-1529](https://github.com/Live-Hack-CVE/CVE-2022-1529) ### CVE-2022-1593 (2022-06-27) @@ -594,30 +618,6 @@ The Restricted Site Access WordPress plugin before 7.3.2 prioritizes getting a v - [Live-Hack-CVE/CVE-2022-1613](https://github.com/Live-Hack-CVE/CVE-2022-1613) -### CVE-2022-1701 (2022-05-13) - - -SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions uses a shared and hard-coded encryption key to store data. - - -- [Live-Hack-CVE/CVE-2022-1701](https://github.com/Live-Hack-CVE/CVE-2022-1701) - -### CVE-2022-1702 (2022-05-13) - - -SonicWall SMA1000 series firmware 12.4.0, 12.4.1-02965 and earlier versions accept a user-controlled input that specifies a link to an external site and uses that link in a redirect which leads to Open redirection vulnerability. - - -- [Live-Hack-CVE/CVE-2022-1702](https://github.com/Live-Hack-CVE/CVE-2022-1702) - -### CVE-2022-1706 (2022-05-17) - - -A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config. - - -- [Live-Hack-CVE/CVE-2022-1706](https://github.com/Live-Hack-CVE/CVE-2022-1706) - ### CVE-2022-1718 (2022-05-16) @@ -634,14 +634,6 @@ Reflected XSS on ticket filter function in GitHub repository polonel/trudesk pri - [Live-Hack-CVE/CVE-2022-1719](https://github.com/Live-Hack-CVE/CVE-2022-1719) -### CVE-2022-1734 (2022-05-18) - - -A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine. - - -- [Live-Hack-CVE/CVE-2022-1734](https://github.com/Live-Hack-CVE/CVE-2022-1734) - ### CVE-2022-1755 (2022-09-26) @@ -658,13 +650,29 @@ Improper Input Validation vulnerability in Hitachi Energy MicroSCADA X SYS600 wh - [Live-Hack-CVE/CVE-2022-1778](https://github.com/Live-Hack-CVE/CVE-2022-1778) -### CVE-2022-1886 (2022-05-26) +### CVE-2022-1802 (2022-12-22) -Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. +If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. -- [Live-Hack-CVE/CVE-2022-1886](https://github.com/Live-Hack-CVE/CVE-2022-1886) +- [Live-Hack-CVE/CVE-2022-1802](https://github.com/Live-Hack-CVE/CVE-2022-1802) + +### CVE-2022-1834 (2022-12-22) + + +When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird < 91.10. + + +- [Live-Hack-CVE/CVE-2022-1834](https://github.com/Live-Hack-CVE/CVE-2022-1834) + +### CVE-2022-1887 (2022-12-22) + + +The search term could have been specified externally to trigger SQL injection. This vulnerability affects Firefox for iOS < 101. + + +- [Live-Hack-CVE/CVE-2022-1887](https://github.com/Live-Hack-CVE/CVE-2022-1887) ### CVE-2022-1903 (2022-06-27) @@ -712,13 +720,21 @@ DOS / potential heap overwrite in qtdemux using zlib decompression. Integer over - [Live-Hack-CVE/CVE-2022-2122](https://github.com/Live-Hack-CVE/CVE-2022-2122) -### CVE-2022-2249 (2022-10-12) +### CVE-2022-2200 (2022-12-22) -Privilege escalation related vulnerabilities were discovered in Avaya Aura Communication Manager that may allow local administrative users to escalate their privileges. This issue affects Communication Manager versions 8.0.0.0 through 8.1.3.3 and 10.1.0.0. +If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. -- [Live-Hack-CVE/CVE-2022-2249](https://github.com/Live-Hack-CVE/CVE-2022-2249) +- [Live-Hack-CVE/CVE-2022-2200](https://github.com/Live-Hack-CVE/CVE-2022-2200) + +### CVE-2022-2226 (2022-12-22) + + +An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird < 102 and Thunderbird < 91.11. + + +- [Live-Hack-CVE/CVE-2022-2226](https://github.com/Live-Hack-CVE/CVE-2022-2226) ### CVE-2022-2277 (2022-09-14) @@ -792,6 +808,14 @@ The reSmush.it WordPress plugin before 0.4.6 does not sanitise and escape some o - [Live-Hack-CVE/CVE-2022-2448](https://github.com/Live-Hack-CVE/CVE-2022-2448) +### CVE-2022-2505 (2022-12-22) + + +Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1. + + +- [Live-Hack-CVE/CVE-2022-2505](https://github.com/Live-Hack-CVE/CVE-2022-2505) + ### CVE-2022-2554 (2022-10-10) @@ -832,14 +856,6 @@ Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/b - [Live-Hack-CVE/CVE-2022-2651](https://github.com/Live-Hack-CVE/CVE-2022-2651) -### CVE-2022-2720 (2022-10-12) - - -In affected versions of Octopus Server it was identified that when a sensitive value is a substring of another value, sensitive value masking will only partially work. - - -- [Live-Hack-CVE/CVE-2022-2720](https://github.com/Live-Hack-CVE/CVE-2022-2720) - ### CVE-2022-2738 (2022-09-01) @@ -880,14 +896,6 @@ The Slider, Gallery, and Carousel by MetaSlider WordPress plugin before 3.27.9 d - [Live-Hack-CVE/CVE-2022-2823](https://github.com/Live-Hack-CVE/CVE-2022-2823) -### CVE-2022-2828 (2022-10-13) - - -In affected versions of Octopus Server it is possible to reveal information about teams via the API due to an Insecure Direct Object Reference (IDOR) vulnerability - - -- [Live-Hack-CVE/CVE-2022-2828](https://github.com/Live-Hack-CVE/CVE-2022-2828) - ### CVE-2022-2846 (2022-08-16) @@ -920,13 +928,21 @@ The Download Manager WordPress plugin before 3.2.55 does not validate one of its - [Live-Hack-CVE/CVE-2022-2926](https://github.com/Live-Hack-CVE/CVE-2022-2926) -### CVE-2022-2981 (2022-10-10) +### CVE-2022-2938 (2022-08-23) -The Download Monitor WordPress plugin before 4.5.98 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup. +A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects. -- [Live-Hack-CVE/CVE-2022-2981](https://github.com/Live-Hack-CVE/CVE-2022-2981) +- [Live-Hack-CVE/CVE-2022-2938](https://github.com/Live-Hack-CVE/CVE-2022-2938) + +### CVE-2022-2978 (2022-08-24) + + +A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. + + +- [Live-Hack-CVE/CVE-2022-2978](https://github.com/Live-Hack-CVE/CVE-2022-2978) ### CVE-2022-2987 (2022-09-26) @@ -952,6 +968,30 @@ The Bitcoin / Altcoin Faucet WordPress plugin through 1.6.0 does not have any CS - [Live-Hack-CVE/CVE-2022-3025](https://github.com/Live-Hack-CVE/CVE-2022-3025) +### CVE-2022-3032 (2022-12-22) + + +When receiving an HTML email that contained an <code>iframe</code> element, which used a <code>srcdoc</code> attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1. + + +- [Live-Hack-CVE/CVE-2022-3032](https://github.com/Live-Hack-CVE/CVE-2022-3032) + +### CVE-2022-3033 (2022-12-22) + + +If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn't affect users who have changed the default Message Body display setting to 'simple html' or 'plain text'. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1. + + +- [Live-Hack-CVE/CVE-2022-3033](https://github.com/Live-Hack-CVE/CVE-2022-3033) + +### CVE-2022-3034 (2022-12-22) + + +When receiving an HTML email that specified to load an <code>iframe</code> element from a remote location, a request to the remote document was sent. However, Thunderbird didn't display the document. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1. + + +- [Live-Hack-CVE/CVE-2022-3034](https://github.com/Live-Hack-CVE/CVE-2022-3034) + ### CVE-2022-3062 (2022-09-26) @@ -1040,29 +1080,29 @@ The SEO Smart Links WordPress plugin through 3.0.1 does not sanitise and escape - [Live-Hack-CVE/CVE-2022-3135](https://github.com/Live-Hack-CVE/CVE-2022-3135) -### CVE-2022-3136 (2022-10-10) +### CVE-2022-3155 (2022-12-22) -The Social Rocket WordPress plugin before 1.3.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) +When saving or opening an email attachment on macOS, Thunderbird did not set attribute com.apple.quarantine on the received file. If the received file was an application and the user attempted to open it, then the application was started immediately without asking the user to confirm. This vulnerability affects Thunderbird < 102.3. -- [Live-Hack-CVE/CVE-2022-3136](https://github.com/Live-Hack-CVE/CVE-2022-3136) +- [Live-Hack-CVE/CVE-2022-3155](https://github.com/Live-Hack-CVE/CVE-2022-3155) -### CVE-2022-3137 (2022-10-10) +### CVE-2022-3165 (2022-10-17) -The Taskbuilder WordPress plugin before 1.0.8 does not validate and sanitise task's attachments, which could allow any authenticated user (such as subscriber) creating a task to perform Stored Cross-Site Scripting by attaching a malicious SVG file +An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service. -- [Live-Hack-CVE/CVE-2022-3137](https://github.com/Live-Hack-CVE/CVE-2022-3137) +- [Live-Hack-CVE/CVE-2022-3165](https://github.com/Live-Hack-CVE/CVE-2022-3165) -### CVE-2022-3154 (2022-10-10) +### CVE-2022-3169 (2022-09-09) -The Woo Billingo Plus WordPress plugin before 4.4.5.4, Integration for Billingo & Gravity Forms WordPress plugin before 1.0.4, Integration for Szamlazz.hu & Gravity Forms WordPress plugin before 1.2.7 are lacking CSRF checks in various AJAX actions, which could allow attackers to make logged in Shop Managers and above perform unwanted actions, such as deactivate the plugin's license +A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect. -- [Live-Hack-CVE/CVE-2022-3154](https://github.com/Live-Hack-CVE/CVE-2022-3154) +- [Live-Hack-CVE/CVE-2022-3169](https://github.com/Live-Hack-CVE/CVE-2022-3169) ### CVE-2022-3193 (2022-09-28) @@ -1072,30 +1112,6 @@ An HTML injection/reflected Cross-site scripting (XSS) vulnerability was found i - [Live-Hack-CVE/CVE-2022-3193](https://github.com/Live-Hack-CVE/CVE-2022-3193) -### CVE-2022-3207 (2022-10-10) - - -The Simple File List WordPress plugin before 4.4.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) - - -- [Live-Hack-CVE/CVE-2022-3207](https://github.com/Live-Hack-CVE/CVE-2022-3207) - -### CVE-2022-3208 (2022-10-10) - - -The Simple File List WordPress plugin before 4.4.12 does not implement nonce checks, which could allow attackers to make a logged in admin create new page and change it's content via a CSRF attack. - - -- [Live-Hack-CVE/CVE-2022-3208](https://github.com/Live-Hack-CVE/CVE-2022-3208) - -### CVE-2022-3209 (2022-10-10) - - -The soledad WordPress theme before 8.2.5 does not sanitise the {id,datafilter[type],...} parameters in its penci_more_slist_post_ajax AJAX action, leading to a Reflected Cross-Site Scripting (XSS) vulnerability. - - -- [Live-Hack-CVE/CVE-2022-3209](https://github.com/Live-Hack-CVE/CVE-2022-3209) - ### CVE-2022-3215 (2022-09-28) @@ -1104,14 +1120,6 @@ NIOHTTP1 and projects using it for generating HTTP responses can be subject to a - [Live-Hack-CVE/CVE-2022-3215](https://github.com/Live-Hack-CVE/CVE-2022-3215) -### CVE-2022-3220 (2022-10-10) - - -The Advanced Comment Form WordPress plugin before 1.2.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. - - -- [Live-Hack-CVE/CVE-2022-3220](https://github.com/Live-Hack-CVE/CVE-2022-3220) - ### CVE-2022-3236 (2022-09-23) @@ -1128,6 +1136,14 @@ The security descriptor of Measuresoft ScadaPro Server version 6.7 has inconsist - [Live-Hack-CVE/CVE-2022-3263](https://github.com/Live-Hack-CVE/CVE-2022-3263) +### CVE-2022-3266 (2022-12-22) + + +An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. + + +- [Live-Hack-CVE/CVE-2022-3266](https://github.com/Live-Hack-CVE/CVE-2022-3266) + ### CVE-2022-3272 (2022-09-26) @@ -1272,14 +1288,6 @@ Allocation of Resources Without Limits or Throttling in GitHub repository ikus06 - [Live-Hack-CVE/CVE-2022-3364](https://github.com/Live-Hack-CVE/CVE-2022-3364) -### CVE-2022-3376 (2022-10-06) - - -Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. - - -- [Live-Hack-CVE/CVE-2022-3376](https://github.com/Live-Hack-CVE/CVE-2022-3376) - ### CVE-2022-3389 (2022-10-06) @@ -1384,121 +1392,409 @@ A vulnerability was found in Crealogix EBICS 7.0. It has been rated as problemat - [Live-Hack-CVE/CVE-2022-3442](https://github.com/Live-Hack-CVE/CVE-2022-3442) -### CVE-2022-3452 (2022-10-11) +### CVE-2022-3521 (2022-10-16) -A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /category.php. The manipulation of the argument category_name leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-210436. +A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3452](https://github.com/Live-Hack-CVE/CVE-2022-3452) +- [Live-Hack-CVE/CVE-2022-3521](https://github.com/Live-Hack-CVE/CVE-2022-3521) -### CVE-2022-3453 (2022-10-11) +### CVE-2022-3524 (2022-10-16) -A vulnerability was found in SourceCodester Book Store Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /transcation.php. The manipulation of the argument buyer_name leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-210437 was assigned to this vulnerability. +A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3453](https://github.com/Live-Hack-CVE/CVE-2022-3453) +- [Live-Hack-CVE/CVE-2022-3524](https://github.com/Live-Hack-CVE/CVE-2022-3524) -### CVE-2022-3456 (2022-10-13) +### CVE-2022-3545 (2022-10-17) -Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0. +A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3456](https://github.com/Live-Hack-CVE/CVE-2022-3456) +- [Live-Hack-CVE/CVE-2022-3545](https://github.com/Live-Hack-CVE/CVE-2022-3545) -### CVE-2022-3457 (2022-10-13) +### CVE-2022-3564 (2022-10-17) -Origin Validation Error in GitHub repository ikus060/rdiffweb prior to 2.5.0a5. +A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087. -- [Live-Hack-CVE/CVE-2022-3457](https://github.com/Live-Hack-CVE/CVE-2022-3457) +- [Live-Hack-CVE/CVE-2022-3564](https://github.com/Live-Hack-CVE/CVE-2022-3564) -### CVE-2022-3458 (2022-10-12) +### CVE-2022-3565 (2022-10-17) -A vulnerability has been found in SourceCodester Human Resource Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /employeeview.php of the component Image File Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-210559. +A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088. -- [Live-Hack-CVE/CVE-2022-3458](https://github.com/Live-Hack-CVE/CVE-2022-3458) +- [Live-Hack-CVE/CVE-2022-3565](https://github.com/Live-Hack-CVE/CVE-2022-3565) -### CVE-2022-3464 (2022-10-12) +### CVE-2022-3594 (2022-10-18) -A vulnerability classified as problematic has been found in puppyCMS up to 5.1. This affects an unknown part of the file /admin/settings.php. The manipulation of the argument site_name leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-210699. +A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363. -- [Live-Hack-CVE/CVE-2022-3464](https://github.com/Live-Hack-CVE/CVE-2022-3464) +- [Live-Hack-CVE/CVE-2022-3594](https://github.com/Live-Hack-CVE/CVE-2022-3594) -### CVE-2022-3465 (2022-10-12) +### CVE-2022-3640 (2022-10-21) -A vulnerability classified as critical was found in Mediabridge Medialink. This vulnerability affects unknown code of the file /index.asp. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210700. +A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944. -- [Live-Hack-CVE/CVE-2022-3465](https://github.com/Live-Hack-CVE/CVE-2022-3465) +- [Live-Hack-CVE/CVE-2022-3640](https://github.com/Live-Hack-CVE/CVE-2022-3640) -### CVE-2022-3467 (2022-10-12) +### CVE-2022-3643 (2022-12-06) -A vulnerability classified as critical was found in Jiusi OA. Affected by this vulnerability is an unknown functionality of the file /jsoa/hntdCustomDesktopActionContent. The manipulation of the argument inforid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-210709 was assigned to this vulnerability. +Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior. -- [Live-Hack-CVE/CVE-2022-3467](https://github.com/Live-Hack-CVE/CVE-2022-3467) - -### CVE-2022-3470 (2022-10-12) - - -A vulnerability was found in SourceCodester Human Resource Management System. It has been classified as critical. Affected is an unknown function of the file getstatecity.php. The manipulation of the argument sc leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-210714 is the identifier assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-3470](https://github.com/Live-Hack-CVE/CVE-2022-3470) - -### CVE-2022-3471 (2022-10-12) - - -A vulnerability was found in SourceCodester Human Resource Management System. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file city.php. The manipulation of the argument searccity leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-210715. - - -- [Live-Hack-CVE/CVE-2022-3471](https://github.com/Live-Hack-CVE/CVE-2022-3471) - -### CVE-2022-3472 (2022-10-12) - - -A vulnerability was found in SourceCodester Human Resource Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file city.php. The manipulation of the argument cityedit leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210716. - - -- [Live-Hack-CVE/CVE-2022-3472](https://github.com/Live-Hack-CVE/CVE-2022-3472) - -### CVE-2022-3473 (2022-10-12) - - -A vulnerability classified as critical has been found in SourceCodester Human Resource Management System. This affects an unknown part of the file getstatecity.php. The manipulation of the argument ci leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-210717 was assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-3473](https://github.com/Live-Hack-CVE/CVE-2022-3473) - -### CVE-2022-3492 (2022-10-13) - - -A vulnerability classified as critical was found in SourceCodester Human Resource Management System 1.0. This vulnerability affects unknown code of the component Profile Photo Handler. The manipulation of the argument parameter leads to os command injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-210772. - - -- [Live-Hack-CVE/CVE-2022-3492](https://github.com/Live-Hack-CVE/CVE-2022-3492) - -### CVE-2022-3493 (2022-10-13) - - -A vulnerability, which was classified as problematic, has been found in SourceCodester Human Resource Management System 1.0. This issue affects some unknown processing of the component Add Employee Handler. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-210773 was assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-3493](https://github.com/Live-Hack-CVE/CVE-2022-3493) +- [Live-Hack-CVE/CVE-2022-3643](https://github.com/Live-Hack-CVE/CVE-2022-3643) ### CVE-2022-3699 - [estimated1337/lenovo_exec](https://github.com/estimated1337/lenovo_exec) +### CVE-2022-3794 (2022-12-22) + + +The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various AJAX actions in versions up to, and including, 2.5.6. Authenticated users can use an easily available nonce value to create header templates and make additional changes to the site, as the plugin does not use capability checks for this purpose. + + +- [Live-Hack-CVE/CVE-2022-3794](https://github.com/Live-Hack-CVE/CVE-2022-3794) + +### CVE-2022-3805 (2022-12-22) + + +The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements. + + +- [Live-Hack-CVE/CVE-2022-3805](https://github.com/Live-Hack-CVE/CVE-2022-3805) + +### CVE-2022-4566 (2022-12-16) + + +A vulnerability, which was classified as critical, has been found in y_project RuoYi 4.7.5. This issue affects some unknown processing of the file com/ruoyi/generator/controller/GenController. The manipulation leads to sql injection. The name of the patch is 167970e5c4da7bb46217f576dc50622b83f32b40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215975. + + +- [Live-Hack-CVE/CVE-2022-4566](https://github.com/Live-Hack-CVE/CVE-2022-4566) + +### CVE-2022-4572 (2022-12-16) + + +A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation leads to path traversal. The attack may be launched remotely. Upgrading to version 0.8.5 is able to address this issue. The name of the patch is d5d68e6b1b9f7070c29df5f67fc060f579ae9139. It is recommended to upgrade the affected component. VDB-216146 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4572](https://github.com/Live-Hack-CVE/CVE-2022-4572) + +### CVE-2022-4581 (2022-12-17) + + +A vulnerability was found in 1j01 mind-map and classified as problematic. This issue affects some unknown processing of the file app.coffee. The manipulation of the argument html leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 9617e6084dfeccd92079ab4d7f439300a4b24394. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216167. + + +- [Live-Hack-CVE/CVE-2022-4581](https://github.com/Live-Hack-CVE/CVE-2022-4581) + +### CVE-2022-4582 (2022-12-17) + + +A vulnerability was found in starter-public-edition-4 up to 4.6.10. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.6.11 is able to address this issue. The name of the patch is 2606983c20f6ea3430ac4b36b3d2e88aafef45da. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216168. + + +- [Live-Hack-CVE/CVE-2022-4582](https://github.com/Live-Hack-CVE/CVE-2022-4582) + +### CVE-2022-4584 (2022-12-17) + + +A vulnerability was found in Axiomatic Bento4. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4584](https://github.com/Live-Hack-CVE/CVE-2022-4584) + +### CVE-2022-4585 (2022-12-17) + + +A vulnerability classified as problematic has been found in Opencaching Deutschland oc-server3. This affects an unknown part of the file htdocs/templates2/ocstyle/start.tpl of the component Cookie Handler. The manipulation of the argument usercountryCode leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is c720f2777a452186c67ef30db3679dd409556544. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216171. + + +- [Live-Hack-CVE/CVE-2022-4585](https://github.com/Live-Hack-CVE/CVE-2022-4585) + +### CVE-2022-4586 (2022-12-17) + + +A vulnerability classified as problematic was found in Opencaching Deutschland oc-server3. This vulnerability affects unknown code of the file htdocs/templates2/ocstyle/cachelists.tpl of the component Cachelist Handler. The manipulation of the argument name_filter/by_filter leads to cross site scripting. The attack can be initiated remotely. The name of the patch is a9f79c7da78cd24a7ef1d298e6bc86006972ea73. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216172. + + +- [Live-Hack-CVE/CVE-2022-4586](https://github.com/Live-Hack-CVE/CVE-2022-4586) + +### CVE-2022-4587 (2022-12-17) + + +A vulnerability, which was classified as problematic, has been found in Opencaching Deutschland oc-server3. This issue affects some unknown processing of the file htdocs/templates2/ocstyle/login.tpl of the component Login Page. The manipulation of the argument username leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 3296ebd61e7fe49e93b5755d5d7766d6e94a7667. It is recommended to apply a patch to fix this issue. The identifier VDB-216173 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4587](https://github.com/Live-Hack-CVE/CVE-2022-4587) + +### CVE-2022-4588 (2022-12-17) + + +Es wurde eine Schwachstelle in Boston Sleep slice bis 84.1.x gefunden. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Komponente Layout Handler. Mit der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Ein Aktualisieren auf die Version 84.2.0 vermag dieses Problem zu lösen. Der Patch wird als 6523bb17d889e2ab13d767f38afefdb37083f1d0 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen. + + +- [Live-Hack-CVE/CVE-2022-4588](https://github.com/Live-Hack-CVE/CVE-2022-4588) + +### CVE-2022-4589 (2022-12-17) + + +In cyface Terms and Conditions Module bis 2.0.9 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Es geht um die Funktion returnTo der Datei termsandconditions/views.py. Durch die Manipulation mit unbekannten Daten kann eine open redirect-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Ein Aktualisieren auf die Version 2.0.10 vermag dieses Problem zu lösen. Der Patch wird als 03396a1c2e0af95e12a45c5faef7e47a4b513e1a bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen. + + +- [Live-Hack-CVE/CVE-2022-4589](https://github.com/Live-Hack-CVE/CVE-2022-4589) + +### CVE-2022-4590 (2022-12-17) + + +A vulnerability was found in mschaef toto up to 1.4.20. It has been classified as problematic. This affects an unknown part of the component Todo List Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is fdc825ac5249f40683377e8a526a06cdc6870125. It is recommended to upgrade the affected component. The identifier VDB-216177 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4590](https://github.com/Live-Hack-CVE/CVE-2022-4590) + +### CVE-2022-4591 (2022-12-17) + + +A vulnerability was found in mschaef toto up to 1.4.20. It has been declared as problematic. This vulnerability affects unknown code of the component Email Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.21 is able to address this issue. The name of the patch is 1f27f37c1a06f54a76971f70eaa6139dc139bdf9. It is recommended to upgrade the affected component. VDB-216178 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4591](https://github.com/Live-Hack-CVE/CVE-2022-4591) + +### CVE-2022-4592 (2022-12-18) + + +A vulnerability was found in luckyshot CRMx and classified as critical. This issue affects the function get/save/delete/comment/commentdelete of the file index.php. The manipulation leads to sql injection. The attack may be initiated remotely. The name of the patch is 8c62d274986137d6a1d06958a6f75c3553f45f8f. It is recommended to apply a patch to fix this issue. The identifier VDB-216185 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4592](https://github.com/Live-Hack-CVE/CVE-2022-4592) + +### CVE-2022-4593 (2022-12-18) + + +A vulnerability was found in retra-system. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a6d94ab88f4a6f631a14c59b72461140fb57ae1f. It is recommended to apply a patch to fix this issue. VDB-216186 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4593](https://github.com/Live-Hack-CVE/CVE-2022-4593) + +### CVE-2022-4594 (2022-12-18) + + +A vulnerability was found in drogatkin TJWS2. It has been declared as critical. Affected by this vulnerability is the function deployWar of the file 1.x/src/rogatkin/web/WarRoller.java. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 1bac15c496ec54efe21ad7fab4e17633778582fc. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216187. + + +- [Live-Hack-CVE/CVE-2022-4594](https://github.com/Live-Hack-CVE/CVE-2022-4594) + +### CVE-2022-4595 (2022-12-18) + + +A vulnerability classified as problematic has been found in django-openipam. This affects an unknown part of the file openipam/report/templates/report/exposed_hosts.html. The manipulation of the argument description leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is a6223a1150d60cd036106ba6a8e676c1bfc3cc85. It is recommended to apply a patch to fix this issue. The identifier VDB-216189 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4595](https://github.com/Live-Hack-CVE/CVE-2022-4595) + +### CVE-2022-4596 (2022-12-18) + + +A vulnerability, which was classified as problematic, has been found in Shoplazza 1.1. This issue affects some unknown processing of the file /admin/api/admin/articles/ of the component Add Blog Post Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216191. + + +- [Live-Hack-CVE/CVE-2022-4596](https://github.com/Live-Hack-CVE/CVE-2022-4596) + +### CVE-2022-4597 (2022-12-18) + + +A vulnerability, which was classified as problematic, was found in Shoplazza LifeStyle 1.1. Affected is an unknown function of the file /admin/api/admin/v2_products of the component Create Product Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216192. + + +- [Live-Hack-CVE/CVE-2022-4597](https://github.com/Live-Hack-CVE/CVE-2022-4597) + +### CVE-2022-4598 (2022-12-18) + + +A vulnerability has been found in Shoplazza LifeStyle 1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/api/theme-edit/ of the component Announcement Handler. The manipulation of the argument Text/Mobile Text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216193 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4598](https://github.com/Live-Hack-CVE/CVE-2022-4598) + +### CVE-2022-4599 (2022-12-18) + + +A vulnerability was found in Shoplazza LifeStyle 1.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/api/theme-edit/ of the component Product Handler. The manipulation of the argument Subheading/Heading/Text/Button Text/Label leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216194 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4599](https://github.com/Live-Hack-CVE/CVE-2022-4599) + +### CVE-2022-4600 (2022-12-18) + + +A vulnerability was found in Shoplazza LifeStyle 1.1. It has been classified as problematic. This affects an unknown part of the file /admin/api/theme-edit/ of the component Product Carousel Handler. The manipulation of the argument Heading/Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216195. + + +- [Live-Hack-CVE/CVE-2022-4600](https://github.com/Live-Hack-CVE/CVE-2022-4600) + +### CVE-2022-4601 (2022-12-18) + + +A vulnerability was found in Shoplazza LifeStyle 1.1. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/api/theme-edit/ of the component Shipping/Member Discount/Icon. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216196. + + +- [Live-Hack-CVE/CVE-2022-4601](https://github.com/Live-Hack-CVE/CVE-2022-4601) + +### CVE-2022-4602 (2022-12-18) + + +A vulnerability was found in Shoplazza LifeStyle 1.1. It has been rated as problematic. This issue affects some unknown processing of the file /admin/api/theme-edit/ of the component Review Flow Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-216197 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-4602](https://github.com/Live-Hack-CVE/CVE-2022-4602) + +### CVE-2022-4603 (2022-12-18) + + +** DISPUTED ** A vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario. + + +- [Live-Hack-CVE/CVE-2022-4603](https://github.com/Live-Hack-CVE/CVE-2022-4603) + +### CVE-2022-4604 (2022-12-18) + + +In wp-english-wp-admin Plugin bis 1.5.1 wurde eine problematische Schwachstelle entdeckt. Hierbei betrifft es die Funktion register_endpoints der Datei english-wp-admin.php. Mittels dem Manipulieren mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Ein Aktualisieren auf die Version 1.5.2 vermag dieses Problem zu lösen. Der Patch wird als ad4ba171c974c65c3456e7c6228f59f40783b33d bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen. + + +- [Live-Hack-CVE/CVE-2022-4604](https://github.com/Live-Hack-CVE/CVE-2022-4604) + +### CVE-2022-4605 (2022-12-18) + + +Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3. + + +- [Live-Hack-CVE/CVE-2022-4605](https://github.com/Live-Hack-CVE/CVE-2022-4605) + +### CVE-2022-4606 (2022-12-18) + + +PHP Remote File Inclusion in GitHub repository flatpressblog/flatpress prior to 1.3. + + +- [Live-Hack-CVE/CVE-2022-4606](https://github.com/Live-Hack-CVE/CVE-2022-4606) + +### CVE-2022-4662 (2022-12-22) + + +A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system. + + +- [Live-Hack-CVE/CVE-2022-4662](https://github.com/Live-Hack-CVE/CVE-2022-4662) + +### CVE-2022-4665 (2022-12-22) + + +Unrestricted Upload of File with Dangerous Type in GitHub repository ampache/ampache prior to 5.5.6. + + +- [Live-Hack-CVE/CVE-2022-4665](https://github.com/Live-Hack-CVE/CVE-2022-4665) + +### CVE-2022-4683 (2022-12-23) + + +Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4683](https://github.com/Live-Hack-CVE/CVE-2022-4683) + +### CVE-2022-4684 (2022-12-23) + + +Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4684](https://github.com/Live-Hack-CVE/CVE-2022-4684) + +### CVE-2022-4685 (2022-12-23) + + +Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4685](https://github.com/Live-Hack-CVE/CVE-2022-4685) + +### CVE-2022-4686 (2022-12-23) + + +Improper Authentication in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4686](https://github.com/Live-Hack-CVE/CVE-2022-4686) + +### CVE-2022-4687 (2022-12-23) + + +Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4687](https://github.com/Live-Hack-CVE/CVE-2022-4687) + +### CVE-2022-4688 (2022-12-23) + + +Improper Authorization in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4688](https://github.com/Live-Hack-CVE/CVE-2022-4688) + +### CVE-2022-4689 (2022-12-23) + + +Improper Access Control in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4689](https://github.com/Live-Hack-CVE/CVE-2022-4689) + +### CVE-2022-4690 (2022-12-23) + + +Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4690](https://github.com/Live-Hack-CVE/CVE-2022-4690) + +### CVE-2022-4692 (2022-12-23) + + +Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. + + +- [Live-Hack-CVE/CVE-2022-4692](https://github.com/Live-Hack-CVE/CVE-2022-4692) + +### CVE-2022-4697 (2022-12-23) + + +The ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wp_user_cover_default_image_url’ parameter in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. + + +- [Live-Hack-CVE/CVE-2022-4697](https://github.com/Live-Hack-CVE/CVE-2022-4697) + +### CVE-2022-4698 (2022-12-23) + + +The ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several form fields in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. + + +- [Live-Hack-CVE/CVE-2022-4698](https://github.com/Live-Hack-CVE/CVE-2022-4698) + ### CVE-2022-5555 - [huihuo123/CVE-2022-5555](https://github.com/huihuo123/CVE-2022-5555) @@ -1535,205 +1831,13 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther - [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007) -### CVE-2022-20351 (2022-10-11) +### CVE-2022-20369 (2022-08-11) -In queryInternal of CallLogProvider.java, there is a possible access to voicemail information due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224771921 +In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel -- [Live-Hack-CVE/CVE-2022-20351](https://github.com/Live-Hack-CVE/CVE-2022-20351) - -### CVE-2022-20394 (2022-10-11) - - -In getInputMethodWindowVisibleHeight of InputMethodManagerService.java, there is a possible way to determine when another app is showing an IME due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-204906124 - - -- [Live-Hack-CVE/CVE-2022-20394](https://github.com/Live-Hack-CVE/CVE-2022-20394) - -### CVE-2022-20410 (2022-10-11) - - -In avrc_ctrl_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-205570663 - - -- [Live-Hack-CVE/CVE-2022-20410](https://github.com/Live-Hack-CVE/CVE-2022-20410) - -### CVE-2022-20412 (2022-10-11) - - -In fdt_next_tag of fdt.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230794395 - - -- [Live-Hack-CVE/CVE-2022-20412](https://github.com/Live-Hack-CVE/CVE-2022-20412) - -### CVE-2022-20413 (2022-10-11) - - -In start of Threads.cpp, there is a possible way to record audio during a phone call due to a logic error in the code. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235850634 - - -- [Live-Hack-CVE/CVE-2022-20413](https://github.com/Live-Hack-CVE/CVE-2022-20413) - -### CVE-2022-20415 (2022-10-11) - - -In handleFullScreenIntent of StatusBarNotificationActivityStarter.java, there is a possible bypass of the restriction of starting activity from background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-231322873 - - -- [Live-Hack-CVE/CVE-2022-20415](https://github.com/Live-Hack-CVE/CVE-2022-20415) - -### CVE-2022-20416 (2022-10-11) - - -In audioTransportsToHal of HidlUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-237717857 - - -- [Live-Hack-CVE/CVE-2022-20416](https://github.com/Live-Hack-CVE/CVE-2022-20416) - -### CVE-2022-20417 (2022-10-11) - - -In audioTransportsToHal of HidlUtils.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-237288416 - - -- [Live-Hack-CVE/CVE-2022-20417](https://github.com/Live-Hack-CVE/CVE-2022-20417) - -### CVE-2022-20418 (2022-10-11) - - -In pickStartSeq of AAVCAssembler.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-231986464 - - -- [Live-Hack-CVE/CVE-2022-20418](https://github.com/Live-Hack-CVE/CVE-2022-20418) - -### CVE-2022-20419 (2022-10-11) - - -In setOptions of ActivityRecord.java, there is a possible load any arbitrary Java code into launcher process due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12L Android-13Android ID: A-237290578 - - -- [Live-Hack-CVE/CVE-2022-20419](https://github.com/Live-Hack-CVE/CVE-2022-20419) - -### CVE-2022-20420 (2022-10-11) - - -In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238377411 - - -- [Live-Hack-CVE/CVE-2022-20420](https://github.com/Live-Hack-CVE/CVE-2022-20420) - -### CVE-2022-20423 (2022-10-11) - - -In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel - - -- [Live-Hack-CVE/CVE-2022-20423](https://github.com/Live-Hack-CVE/CVE-2022-20423) - -### CVE-2022-20425 (2022-10-11) - - -In addAutomaticZenRule of ZenModeHelper.java, there is a possible permanent degradation of performance due to resource exhaustion. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235823407 - - -- [Live-Hack-CVE/CVE-2022-20425](https://github.com/Live-Hack-CVE/CVE-2022-20425) - -### CVE-2022-20429 (2022-10-11) - - -In CarSettings of app packages, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220741473 - - -- [Live-Hack-CVE/CVE-2022-20429](https://github.com/Live-Hack-CVE/CVE-2022-20429) - -### CVE-2022-20430 (2022-10-11) - - -There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221233 - - -- [Live-Hack-CVE/CVE-2022-20430](https://github.com/Live-Hack-CVE/CVE-2022-20430) - -### CVE-2022-20431 (2022-10-11) - - -There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221238 - - -- [Live-Hack-CVE/CVE-2022-20431](https://github.com/Live-Hack-CVE/CVE-2022-20431) - -### CVE-2022-20432 (2022-10-11) - - -There is an missing authorization issue in the system service. Since the component does not have permission check and permission protection,, resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221899 - - -- [Live-Hack-CVE/CVE-2022-20432](https://github.com/Live-Hack-CVE/CVE-2022-20432) - -### CVE-2022-20433 (2022-10-11) - - -There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242221901 - - -- [Live-Hack-CVE/CVE-2022-20433](https://github.com/Live-Hack-CVE/CVE-2022-20433) - -### CVE-2022-20434 (2022-10-11) - - -There is an missing authorization issue in the system service. Since the component does not have permission check , resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242244028 - - -- [Live-Hack-CVE/CVE-2022-20434](https://github.com/Live-Hack-CVE/CVE-2022-20434) - -### CVE-2022-20435 (2022-10-11) - - -There is a Unauthorized service in the system service, may cause the system reboot. Since the component does not have permission check and permission protection, resulting in EoP problem.Product: AndroidVersions: Android SoCAndroid ID: A-242248367 - - -- [Live-Hack-CVE/CVE-2022-20435](https://github.com/Live-Hack-CVE/CVE-2022-20435) - -### CVE-2022-20436 (2022-10-11) - - -There is an unauthorized service in the system service. Since the component does not have permission check, resulting in Local Elevation of privilege.Product: AndroidVersions: Android SoCAndroid ID: A-242248369 - - -- [Live-Hack-CVE/CVE-2022-20436](https://github.com/Live-Hack-CVE/CVE-2022-20436) - -### CVE-2022-20437 (2022-10-11) - - -In Messaging, There has unauthorized broadcast, this could cause Local Deny of Service.Product: AndroidVersions: Android SoCAndroid ID: A-242258929 - - -- [Live-Hack-CVE/CVE-2022-20437](https://github.com/Live-Hack-CVE/CVE-2022-20437) - -### CVE-2022-20438 (2022-10-11) - - -In Messaging, There has unauthorized broadcast, this could cause Local Deny of Service.Product: AndroidVersions: Android SoCAndroid ID: A-242259920 - - -- [Live-Hack-CVE/CVE-2022-20438](https://github.com/Live-Hack-CVE/CVE-2022-20438) - -### CVE-2022-20439 (2022-10-11) - - -In Messaging, There has unauthorized provider, this could cause Local Deny of Service.Product: AndroidVersions: Android SoCAndroid ID: A-242266172 - - -- [Live-Hack-CVE/CVE-2022-20439](https://github.com/Live-Hack-CVE/CVE-2022-20439) - -### CVE-2022-20440 (2022-10-11) - - -In Messaging, There has unauthorized broadcast, this could cause Local Deny of Service.Product: AndroidVersions: Android SoCAndroid ID: A-242259918 - - -- [Live-Hack-CVE/CVE-2022-20440](https://github.com/Live-Hack-CVE/CVE-2022-20440) +- [Live-Hack-CVE/CVE-2022-20369](https://github.com/Live-Hack-CVE/CVE-2022-20369) ### CVE-2022-20625 (2022-02-23) @@ -1760,22 +1864,6 @@ A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM - [jbaines-r7/theway](https://github.com/jbaines-r7/theway) -### CVE-2022-20830 (2022-10-10) - - -A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses. - - -- [Live-Hack-CVE/CVE-2022-20830](https://github.com/Live-Hack-CVE/CVE-2022-20830) - -### CVE-2022-20837 (2022-10-10) - - -A vulnerability in the DNS application layer gateway (ALG) functionality that is used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to a logic error that occurs when an affected device inspects certain TCP DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through the affected device that is performing NAT for DNS packets. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition on the affected device. Note: This vulnerability can be exploited only by sending IPv4 TCP packets through an affected device. This vulnerability cannot be exploited by sending IPv6 traffic. - - -- [Live-Hack-CVE/CVE-2022-20837](https://github.com/Live-Hack-CVE/CVE-2022-20837) - ### CVE-2022-20844 (2022-09-30) @@ -1800,38 +1888,6 @@ A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco - [Live-Hack-CVE/CVE-2022-20850](https://github.com/Live-Hack-CVE/CVE-2022-20850) -### CVE-2022-20864 (2022-10-10) - - -A vulnerability in the password-recovery disable feature of Cisco IOS XE ROM Monitor (ROMMON) Software for Cisco Catalyst Switches could allow an unauthenticated, local attacker to recover the configuration or reset the enable password. This vulnerability is due to a problem with the file and boot variable permissions in ROMMON. An attacker could exploit this vulnerability by rebooting the switch into ROMMON and entering specific commands through the console. A successful exploit could allow the attacker to read any file or reset the enable password. - - -- [Live-Hack-CVE/CVE-2022-20864](https://github.com/Live-Hack-CVE/CVE-2022-20864) - -### CVE-2022-20870 (2022-10-10) - - -A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation of IPv4 traffic. An attacker could exploit this vulnerability by sending a malformed packet out of an affected MPLS-enabled interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. - - -- [Live-Hack-CVE/CVE-2022-20870](https://github.com/Live-Hack-CVE/CVE-2022-20870) - -### CVE-2022-20915 (2022-10-10) - - -A vulnerability in the implementation of IPv6 VPN over MPLS (6VPE) with Zone-Based Firewall (ZBFW) of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper error handling of an IPv6 packet that is forwarded from an MPLS and ZBFW-enabled interface in a 6VPE deployment. An attacker could exploit this vulnerability by sending a crafted IPv6 packet sourced from a device on the IPv6-enabled virtual routing and forwarding (VRF) interface through the affected device. A successful exploit could allow the attacker to reload the device, resulting in a DoS condition. - - -- [Live-Hack-CVE/CVE-2022-20915](https://github.com/Live-Hack-CVE/CVE-2022-20915) - -### CVE-2022-20920 (2022-10-10) - - -A vulnerability in the SSH implementation of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. This vulnerability is due to improper handling of resources during an exceptional situation. An attacker could exploit this vulnerability by continuously connecting to an affected device and sending specific SSH requests. A successful exploit could allow the attacker to cause the affected device to reload. - - -- [Live-Hack-CVE/CVE-2022-20920](https://github.com/Live-Hack-CVE/CVE-2022-20920) - ### CVE-2022-20930 (2022-09-30) @@ -1840,14 +1896,6 @@ A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated - [Live-Hack-CVE/CVE-2022-20930](https://github.com/Live-Hack-CVE/CVE-2022-20930) -### CVE-2022-20944 (2022-10-10) - - -A vulnerability in the software image verification functionality of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. This vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the boot process of the affected device. To exploit this vulnerability, the attacker needs either unauthenticated physical access to the device or privileged access to the root shell on the device. Note: In Cisco IOS XE Software releases 16.11.1 and later, root shell access is protected by the Consent Token mechanism. However, an attacker with level-15 privileges could easily downgrade the Cisco IOS XE Software running on a device to a release where root shell access is more readily available. - - -- [Live-Hack-CVE/CVE-2022-20944](https://github.com/Live-Hack-CVE/CVE-2022-20944) - ### CVE-2022-20945 (2022-09-30) @@ -2127,14 +2175,6 @@ Windows CSRSS Elevation of Privilege Vulnerability. This CVE ID is unique from C - [Live-Hack-CVE/CVE-2022-22026](https://github.com/Live-Hack-CVE/CVE-2022-22026) -### CVE-2022-22035 (2022-10-11) - - -Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081. - - -- [Live-Hack-CVE/CVE-2022-22035](https://github.com/Live-Hack-CVE/CVE-2022-22035) - ### CVE-2022-22049 (2022-07-12) @@ -2151,6 +2191,14 @@ Memory corruption due to use after free issue in kernel while processing ION han - [Live-Hack-CVE/CVE-2022-22058](https://github.com/Live-Hack-CVE/CVE-2022-22058) +### CVE-2022-22184 (2022-12-22) + + +An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial of Service (DoS). If a BGP update message is received over an established BGP session, and that message contains a specific, optional transitive attribute, this session will be torn down with an update message error. This issue cannot propagate beyond an affected system as the processing error occurs as soon as the update is received. This issue is exploitable remotely as the respective attribute will propagate through unaffected systems and intermediate AS (if any). Continuous receipt of a BGP update containing this attribute will create a sustained Denial of Service (DoS) condition. Since this issue only affects 22.3R1, Juniper strongly encourages customers to move to 22.3R1-S1. Juniper SIRT felt that the need to promptly warn customers about this issue affecting the 22.3R1 versions of Junos OS and Junos OS Evolved warranted an Out of Cycle JSA. This issue affects: Juniper Networks Junos OS version 22.3R1. Juniper Networks Junos OS Evolved version 22.3R1-EVO. This issue does not affect: Juniper Networks Junos OS versions prior to 22.3R1. Juniper Networks Junos OS Evolved versions prior to 22.3R1-EVO. + + +- [Live-Hack-CVE/CVE-2022-22184](https://github.com/Live-Hack-CVE/CVE-2022-22184) + ### CVE-2022-22296 (2022-01-24) @@ -2175,6 +2223,46 @@ IBM Common Cryptographic Architecture (CCA 5.x MTM for 4767 and CCA 7.x MTM for - [Live-Hack-CVE/CVE-2022-22423](https://github.com/Live-Hack-CVE/CVE-2022-22423) +### CVE-2022-22449 (2022-12-23) + + +IBM Security Verify Governance, Identity Manager 10.01 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 224915. + + +- [Live-Hack-CVE/CVE-2022-22449](https://github.com/Live-Hack-CVE/CVE-2022-22449) + +### CVE-2022-22456 (2022-12-22) + + +IBM Security Verify Governance, Identity Manager 10.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 225004. + + +- [Live-Hack-CVE/CVE-2022-22456](https://github.com/Live-Hack-CVE/CVE-2022-22456) + +### CVE-2022-22457 (2022-12-22) + + +IBM Security Verify Governance, Identity Manager 10.0.1 stores sensitive information including user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 225007. + + +- [Live-Hack-CVE/CVE-2022-22457](https://github.com/Live-Hack-CVE/CVE-2022-22457) + +### CVE-2022-22458 (2022-12-22) + + +IBM Security Verify Governance, Identity Manager 10.0.1 stores user credentials in plain clear text which can be read by a remote authenticated user. IBM X-Force ID: 225009. + + +- [Live-Hack-CVE/CVE-2022-22458](https://github.com/Live-Hack-CVE/CVE-2022-22458) + +### CVE-2022-22461 (2022-12-22) + + +IBM Security Verify Governance, Identity Manager 10.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 225007. + + +- [Live-Hack-CVE/CVE-2022-22461](https://github.com/Live-Hack-CVE/CVE-2022-22461) + ### CVE-2022-22480 (2022-10-07) @@ -2308,14 +2396,6 @@ A buffer overflow issue was addressed with improved memory handling. This issue - [Live-Hack-CVE/CVE-2022-22629](https://github.com/Live-Hack-CVE/CVE-2022-22629) -### CVE-2022-22633 (2022-03-18) - - -A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 8.5, iOS 15.4 and iPadOS 15.4, macOS Big Sur 11.6.5, macOS Monterey 12.3. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. - - -- [Live-Hack-CVE/CVE-2022-22633](https://github.com/Live-Hack-CVE/CVE-2022-22633) - ### CVE-2022-22637 (2022-09-23) @@ -2364,6 +2444,238 @@ Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is uniqu - [ahmetfurkans/CVE-2022-22718](https://github.com/ahmetfurkans/CVE-2022-22718) +### CVE-2022-22736 (2022-12-22) + + +If Firefox was installed to a world-writable directory, a local privilege escalation could occur when Firefox searched the current directory for system libraries. However the install directory is not world-writable by default.<br>*This bug only affects Firefox for Windows in a non-default installation. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96. + + +- [Live-Hack-CVE/CVE-2022-22736](https://github.com/Live-Hack-CVE/CVE-2022-22736) + +### CVE-2022-22737 (2022-12-22) + + +Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22737](https://github.com/Live-Hack-CVE/CVE-2022-22737) + +### CVE-2022-22738 (2022-12-22) + + +Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22738](https://github.com/Live-Hack-CVE/CVE-2022-22738) + +### CVE-2022-22739 (2022-12-22) + + +Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22739](https://github.com/Live-Hack-CVE/CVE-2022-22739) + +### CVE-2022-22740 (2022-12-22) + + +Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22740](https://github.com/Live-Hack-CVE/CVE-2022-22740) + +### CVE-2022-22741 (2022-12-22) + + +When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22741](https://github.com/Live-Hack-CVE/CVE-2022-22741) + +### CVE-2022-22742 (2022-12-22) + + +When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22742](https://github.com/Live-Hack-CVE/CVE-2022-22742) + +### CVE-2022-22743 (2022-12-22) + + +When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22743](https://github.com/Live-Hack-CVE/CVE-2022-22743) + +### CVE-2022-22744 (2022-12-22) + + +The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.<br>*This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22744](https://github.com/Live-Hack-CVE/CVE-2022-22744) + +### CVE-2022-22745 (2022-12-22) + + +Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22745](https://github.com/Live-Hack-CVE/CVE-2022-22745) + +### CVE-2022-22746 (2022-12-22) + + +A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.<br>*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22746](https://github.com/Live-Hack-CVE/CVE-2022-22746) + +### CVE-2022-22747 (2022-12-22) + + +After accepting an untrusted certificate, handling an empty pkcs7 sequence as part of the certificate data could have lead to a crash. This crash is believed to be unexploitable. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22747](https://github.com/Live-Hack-CVE/CVE-2022-22747) + +### CVE-2022-22748 (2022-12-22) + + +Malicious websites could have confused Firefox into showing the wrong origin when asking to launch a program and handling an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22748](https://github.com/Live-Hack-CVE/CVE-2022-22748) + +### CVE-2022-22749 (2022-12-22) + + +When scanning QR codes, Firefox for Android would have allowed navigation to some URLs that do not point to web content.<br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96. + + +- [Live-Hack-CVE/CVE-2022-22749](https://github.com/Live-Hack-CVE/CVE-2022-22749) + +### CVE-2022-22750 (2022-12-22) + + +By generally accepting and passing resource handles across processes, a compromised content process might have confused higher privileged processes to interact with handles that the unprivileged process should not have access to.<br>*This bug only affects Firefox for Windows and MacOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96. + + +- [Live-Hack-CVE/CVE-2022-22750](https://github.com/Live-Hack-CVE/CVE-2022-22750) + +### CVE-2022-22751 (2022-12-22) + + +Mozilla developers Calixte Denizet, Kershaw Chang, Christian Holler, Jason Kratzer, Gabriele Svelto, Tyson Smith, Simon Giesecke, and Steve Fink reported memory safety bugs present in Firefox 95 and Firefox ESR 91.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2022-22751](https://github.com/Live-Hack-CVE/CVE-2022-22751) + +### CVE-2022-22752 (2022-12-22) + + +Mozilla developers Christian Holler and Jason Kratzer reported memory safety bugs present in Firefox 95. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 96. + + +- [Live-Hack-CVE/CVE-2022-22752](https://github.com/Live-Hack-CVE/CVE-2022-22752) + +### CVE-2022-22753 (2022-12-22) + + +A Time-of-Check Time-of-Use bug existed in the Maintenance (Updater) Service that could be abused to grant Users write access to an arbitrary directory. This could have been used to escalate to SYSTEM access.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22753](https://github.com/Live-Hack-CVE/CVE-2022-22753) + +### CVE-2022-22754 (2022-12-22) + + +If a user installed an extension of a particular type, the extension could have auto-updated itself and while doing so, bypass the prompt which grants the new version the new requested permissions. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22754](https://github.com/Live-Hack-CVE/CVE-2022-22754) + +### CVE-2022-22755 (2022-12-22) + + +By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97. + + +- [Live-Hack-CVE/CVE-2022-22755](https://github.com/Live-Hack-CVE/CVE-2022-22755) + +### CVE-2022-22756 (2022-12-22) + + +If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22756](https://github.com/Live-Hack-CVE/CVE-2022-22756) + +### CVE-2022-22757 (2022-12-22) + + +Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user's browser to control it. <br>*This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.*. This vulnerability affects Firefox < 97. + + +- [Live-Hack-CVE/CVE-2022-22757](https://github.com/Live-Hack-CVE/CVE-2022-22757) + +### CVE-2022-22758 (2022-12-22) + + +When clicking on a tel: link, USSD codes, specified after a <code>\*</code> character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user's account, similar to a cross-site request forgery attack.<br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97. + + +- [Live-Hack-CVE/CVE-2022-22758](https://github.com/Live-Hack-CVE/CVE-2022-22758) + +### CVE-2022-22759 (2022-12-22) + + +If a document created a sandboxed iframe without <code>allow-scripts</code>, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22759](https://github.com/Live-Hack-CVE/CVE-2022-22759) + +### CVE-2022-22760 (2022-12-22) + + +When importing resources using Web Workers, error messages would distinguish the difference between <code>application/javascript</code> responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22760](https://github.com/Live-Hack-CVE/CVE-2022-22760) + +### CVE-2022-22761 (2022-12-22) + + +Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22761](https://github.com/Live-Hack-CVE/CVE-2022-22761) + +### CVE-2022-22762 (2022-12-22) + + +Under certain circumstances, a JavaScript alert (or prompt) could have been shown while another website was displayed underneath it. This could have been abused to trick the user. <br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 97. + + +- [Live-Hack-CVE/CVE-2022-22762](https://github.com/Live-Hack-CVE/CVE-2022-22762) + +### CVE-2022-22763 (2022-12-22) + + +When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox < 96, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22763](https://github.com/Live-Hack-CVE/CVE-2022-22763) + +### CVE-2022-22764 (2022-12-22) + + +Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6. + + +- [Live-Hack-CVE/CVE-2022-22764](https://github.com/Live-Hack-CVE/CVE-2022-22764) + ### CVE-2022-22793 (2022-02-24) @@ -2820,7 +3132,6 @@ kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to - [tr3ee/CVE-2022-23222](https://github.com/tr3ee/CVE-2022-23222) - [PenteraIO/CVE-2022-23222-POC](https://github.com/PenteraIO/CVE-2022-23222-POC) -- [Live-Hack-CVE/CVE-2022-23222](https://github.com/Live-Hack-CVE/CVE-2022-23222) ### CVE-2022-23253 (2022-03-09) @@ -2855,14 +3166,6 @@ In DataEase v1.6.1, an authenticated user can gain unauthorized access to all us - [Live-Hack-CVE/CVE-2022-23331](https://github.com/Live-Hack-CVE/CVE-2022-23331) -### CVE-2022-23332 (2022-05-09) - - -Command injection vulnerability in Manual Ping Form (Web UI) in Shenzhen Ejoin Information Technology Co., Ltd. ACOM508/ACOM516/ACOM532 609-915-041-100-020 allows a remote attacker to inject arbitrary code via the field. - - -- [Live-Hack-CVE/CVE-2022-23332](https://github.com/Live-Hack-CVE/CVE-2022-23332) - ### CVE-2022-23342 (2022-06-21) @@ -2906,6 +3209,54 @@ Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a p - [Live-Hack-CVE/CVE-2022-23464](https://github.com/Live-Hack-CVE/CVE-2022-23464) +### CVE-2022-23490 (2022-12-16) + + +BigBlueButton is an open source web conferencing system. Versions prior to 2.4.0 expose sensitive information to Unauthorized Actors. This issue affects meetings with polls, where the attacker is a meeting participant. Subscribing to the current-poll collection does not update the client UI, but does give the attacker access to the contents of the collection, which include the individual poll responses. This issue is patched in version 2.4.0. There are no workarounds. + + +- [Live-Hack-CVE/CVE-2022-23490](https://github.com/Live-Hack-CVE/CVE-2022-23490) + +### CVE-2022-23513 (2022-12-22) + + +Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists. + + +- [Live-Hack-CVE/CVE-2022-23513](https://github.com/Live-Hack-CVE/CVE-2022-23513) + +### CVE-2022-23540 (2022-12-22) + + +In versions `<=8.5.1` of `jsonwebtoken` library, lack of algorithm definition in the `jwt.verify()` function can lead to signature validation bypass due to defaulting to the `none` algorithm for signature verification. Users are affected if you do not specify algorithms in the `jwt.verify()` function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in the `jwt.verify()` method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for the `none` algorithm. If you need 'none' algorithm, you have to explicitly specify that in `jwt.verify()` options. + + +- [Live-Hack-CVE/CVE-2022-23540](https://github.com/Live-Hack-CVE/CVE-2022-23540) + +### CVE-2022-23541 (2022-12-22) + + +jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0. + + +- [Live-Hack-CVE/CVE-2022-23541](https://github.com/Live-Hack-CVE/CVE-2022-23541) + +### CVE-2022-23547 (2022-12-23) + + +PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. This issue is similar to GHSA-9pfh-r8x4-w26w. Possible buffer overread when parsing a certain STUN message. The vulnerability affects applications that uses STUN including PJNATH and PJSUA-LIB. The patch is available as commit in the master branch. + + +- [Live-Hack-CVE/CVE-2022-23547](https://github.com/Live-Hack-CVE/CVE-2022-23547) + +### CVE-2022-23556 (2022-12-22) + + +CodeIgniter is a PHP full-stack web framework. This vulnerability may allow attackers to spoof their IP address when the server is behind a reverse proxy. This issue has been patched, please upgrade to version 4.2.11 or later, and configure `Config\App::$proxyIPs`. As a workaround, do not use `$request->getIPAddress()`. + + +- [Live-Hack-CVE/CVE-2022-23556](https://github.com/Live-Hack-CVE/CVE-2022-23556) + ### CVE-2022-23626 (2022-02-08) @@ -2914,14 +3265,6 @@ m1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from fu - [Live-Hack-CVE/CVE-2022-23626](https://github.com/Live-Hack-CVE/CVE-2022-23626) -### CVE-2022-23634 (2022-02-11) - - -Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability. - - -- [Live-Hack-CVE/CVE-2022-23634](https://github.com/Live-Hack-CVE/CVE-2022-23634) - ### CVE-2022-23642 (2022-02-18) @@ -2970,14 +3313,6 @@ Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed serve - [fbusr/CVE-2022-23779](https://github.com/fbusr/CVE-2022-23779) -### CVE-2022-23802 (2022-05-06) - - -Joomla Guru extension 5.2.5 is affected by: Insecure Permissions. The impact is: obtain sensitive information (remote). The component is: Access to private information and components, possibility to view other users' information. Information disclosure Access to private information and components, possibility to view other users' information. - - -- [Live-Hack-CVE/CVE-2022-23802](https://github.com/Live-Hack-CVE/CVE-2022-23802) - ### CVE-2022-23808 (2022-01-21) @@ -3002,6 +3337,14 @@ Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer - [Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23852](https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23852) +### CVE-2022-23854 (2022-12-23) + + +AVEVA InTouch Access Anywhere versions 2020 R2 and older are vulnerable to a path traversal exploit that could allow an unauthenticated user with network access to read files on the system outside of the secure gateway web server. + + +- [Live-Hack-CVE/CVE-2022-23854](https://github.com/Live-Hack-CVE/CVE-2022-23854) + ### CVE-2022-23884 (2022-03-28) @@ -3152,6 +3495,14 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t - [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2) +### CVE-2022-24399 (2022-03-08) + + +The SAP Focused Run (Real User Monitoring) - versions 200, 300, REST service does not sufficiently sanitize the input name of the file using multipart/form-data, resulting in Cross-Site Scripting (XSS) vulnerability. + + +- [Live-Hack-CVE/CVE-2022-24399](https://github.com/Live-Hack-CVE/CVE-2022-24399) + ### CVE-2022-24409 (2022-02-23) @@ -3200,14 +3551,6 @@ Windows Network File System Remote Code Execution Vulnerability. This CVE ID is - [corelight/CVE-2022-24497](https://github.com/corelight/CVE-2022-24497) -### CVE-2022-24504 (2022-10-11) - - -Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081. - - -- [Live-Hack-CVE/CVE-2022-24504](https://github.com/Live-Hack-CVE/CVE-2022-24504) - ### CVE-2022-24545 (2022-04-15) @@ -3340,14 +3683,6 @@ Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7 - [Live-Hack-CVE/CVE-2022-24780](https://github.com/Live-Hack-CVE/CVE-2022-24780) -### CVE-2022-24790 (2022-03-30) - - -Puma is a simple, fast, multi-threaded, parallel HTTP 1.1 server for Ruby/Rack applications. When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The vulnerability has been fixed in 5.6.4 and 4.3.12. Users are advised to upgrade as soon as possible. Workaround: when deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard. - - -- [Live-Hack-CVE/CVE-2022-24790](https://github.com/Live-Hack-CVE/CVE-2022-24790) - ### CVE-2022-24851 (2022-04-15) @@ -3612,14 +3947,6 @@ In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement - [dim0x69/cve-2022-25640-exploit](https://github.com/dim0x69/cve-2022-25640-exploit) -### CVE-2022-25648 (2022-04-19) - - -The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. - - -- [Live-Hack-CVE/CVE-2022-25648](https://github.com/Live-Hack-CVE/CVE-2022-25648) - ### CVE-2022-25795 (2022-04-13) @@ -3669,6 +3996,14 @@ Incomplete cleanup in a firmware subsystem for Intel(R) SPS before versions SPS_ - [Live-Hack-CVE/CVE-2022-26074](https://github.com/Live-Hack-CVE/CVE-2022-26074) +### CVE-2022-26101 (2022-03-08) + + +Fiori launchpad - versions 754, 755, 756, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. + + +- [Live-Hack-CVE/CVE-2022-26101](https://github.com/Live-Hack-CVE/CVE-2022-26101) + ### CVE-2022-26102 (2022-03-08) @@ -3677,14 +4012,6 @@ Due to missing authorization check, SAP NetWeaver Application Server for ABAP - - [Live-Hack-CVE/CVE-2022-26102](https://github.com/Live-Hack-CVE/CVE-2022-26102) -### CVE-2022-26121 (2022-10-10) - - -An exposure of resource to wrong sphere vulnerability [CWE-668] in FortiAnalyzer and FortiManager GUI 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11, 5.6.0 through 5.6.11 may allow an unauthenticated and remote attacker to access report template images via referencing the name in the URL path. - - -- [Live-Hack-CVE/CVE-2022-26121](https://github.com/Live-Hack-CVE/CVE-2022-26121) - ### CVE-2022-26133 (2022-04-20) @@ -3872,6 +4199,62 @@ On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute ar - [h3llk4t3/Watchguard-RCE-POC-CVE-2022-26318](https://github.com/h3llk4t3/Watchguard-RCE-POC-CVE-2022-26318) - [BabyTeam1024/CVE-2022-26318](https://github.com/BabyTeam1024/CVE-2022-26318) +### CVE-2022-26381 (2022-12-22) + + +An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. + + +- [Live-Hack-CVE/CVE-2022-26381](https://github.com/Live-Hack-CVE/CVE-2022-26381) + +### CVE-2022-26382 (2022-12-22) + + +While the text displayed in Autofill tooltips cannot be directly read by JavaScript, the text was rendered using page fonts. Side-channel attacks on the text by using specially crafted fonts could have lead to this text being inferred by the webpage. This vulnerability affects Firefox < 98. + + +- [Live-Hack-CVE/CVE-2022-26382](https://github.com/Live-Hack-CVE/CVE-2022-26382) + +### CVE-2022-26383 (2022-12-22) + + +When resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. + + +- [Live-Hack-CVE/CVE-2022-26383](https://github.com/Live-Hack-CVE/CVE-2022-26383) + +### CVE-2022-26384 (2022-12-22) + + +If an attacker could control the contents of an iframe sandboxed with <code>allow-popups</code> but not <code>allow-scripts</code>, they were able to craft a link that, when clicked, would lead to JavaScript execution in violation of the sandbox. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. + + +- [Live-Hack-CVE/CVE-2022-26384](https://github.com/Live-Hack-CVE/CVE-2022-26384) + +### CVE-2022-26385 (2022-12-22) + + +In unusual circumstances, an individual thread may outlive the thread's manager during shutdown. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 98. + + +- [Live-Hack-CVE/CVE-2022-26385](https://github.com/Live-Hack-CVE/CVE-2022-26385) + +### CVE-2022-26386 (2022-12-22) + + +Previously Firefox for macOS and Linux would download temporary files to a user-specific directory in <code>/tmp</code>, but this behavior was changed to download them to <code>/tmp</code> where they could be affected by other local users. This behavior was reverted to the original, user-specific directory. <br>*This bug only affects Firefox for macOS and Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 91.7 and Thunderbird < 91.7. + + +- [Live-Hack-CVE/CVE-2022-26386](https://github.com/Live-Hack-CVE/CVE-2022-26386) + +### CVE-2022-26387 (2022-12-22) + + +When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. + + +- [Live-Hack-CVE/CVE-2022-26387](https://github.com/Live-Hack-CVE/CVE-2022-26387) + ### CVE-2022-26452 (2022-10-07) @@ -3920,6 +4303,22 @@ In wlan, there is a possible out of bounds write due to a missing bounds check. - [Live-Hack-CVE/CVE-2022-26475](https://github.com/Live-Hack-CVE/CVE-2022-26475) +### CVE-2022-26485 (2022-12-22) + + +Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. + + +- [Live-Hack-CVE/CVE-2022-26485](https://github.com/Live-Hack-CVE/CVE-2022-26485) + +### CVE-2022-26486 (2022-12-22) + + +An unexpected message in the WebGPU IPC framework could lead to a use-after-free and exploitable sandbox escape. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0. + + +- [Live-Hack-CVE/CVE-2022-26486](https://github.com/Live-Hack-CVE/CVE-2022-26486) + ### CVE-2022-26503 (2022-03-17) @@ -3928,6 +4327,38 @@ Deserialization of untrusted data in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0. - [sinsinology/CVE-2022-26503](https://github.com/sinsinology/CVE-2022-26503) +### CVE-2022-26579 (2022-12-16) + + +PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 allows root privileged attackers to install an unsigned application by copying the APK to /data/app, setting the appropriate permissions and rebooting the device. + + +- [Live-Hack-CVE/CVE-2022-26579](https://github.com/Live-Hack-CVE/CVE-2022-26579) + +### CVE-2022-26580 (2022-12-16) + + +PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 was discovered to be vulnerable to command injection. + + +- [Live-Hack-CVE/CVE-2022-26580](https://github.com/Live-Hack-CVE/CVE-2022-26580) + +### CVE-2022-26581 (2022-12-16) + + +The ADB daemon in PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 allows the execution of the systool utility in production mode, allowing unauthenticated attackers to perform privileged actions. + + +- [Live-Hack-CVE/CVE-2022-26581](https://github.com/Live-Hack-CVE/CVE-2022-26581) + +### CVE-2022-26582 (2022-12-16) + + +The systool_server in PAX Technology A930 PayDroid 7.1.1 Virgo V04.4.02 20211201 fails to check for dollar signs or backticks in user supplied commands, leading to to arbitrary command execution as root. + + +- [Live-Hack-CVE/CVE-2022-26582](https://github.com/Live-Hack-CVE/CVE-2022-26582) + ### CVE-2022-26629 (2022-03-24) @@ -4009,14 +4440,6 @@ Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID i - [yuanLink/CVE-2022-26809](https://github.com/yuanLink/CVE-2022-26809) - [s1ckb017/PoC-CVE-2022-26809](https://github.com/s1ckb017/PoC-CVE-2022-26809) -### CVE-2022-26874 (2022-03-11) - - -lib/Horde/Mime/Viewer/Ooo.php in Horde Mime_Viewer before 2.2.4 allows XSS via an OpenOffice document, leading to account takeover in Horde Groupware Webmail Edition. This occurs after XSLT rendering. - - -- [Live-Hack-CVE/CVE-2022-26874](https://github.com/Live-Hack-CVE/CVE-2022-26874) - ### CVE-2022-26923 (2022-05-10) @@ -4051,6 +4474,14 @@ Windows Network File System Remote Code Execution Vulnerability. - [corelight/CVE-2022-26937](https://github.com/corelight/CVE-2022-26937) - [omair2084/CVE-2022-26937](https://github.com/omair2084/CVE-2022-26937) +### CVE-2022-26966 (2022-03-12) + + +An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device. + + +- [Live-Hack-CVE/CVE-2022-26966](https://github.com/Live-Hack-CVE/CVE-2022-26966) + ### CVE-2022-27002 (2022-03-15) @@ -4067,14 +4498,6 @@ EOSIO batdappboomx v327c04cf has an Access-control vulnerability in the `transfe - [Kenun99/CVE-batdappboomx](https://github.com/Kenun99/CVE-batdappboomx) -### CVE-2022-27224 (2022-05-09) - - -An issue was discovered in Galleon NTS-6002-GPS 4.14.103-Galleon-NTS-6002.V12 4. An authenticated attacker can perform command injection as root via shell metacharacters within the Network Tools section of the web-management interface. All three networking tools are affected (Ping, Traceroute, and DNS Lookup) and their respective input fields (ping_address, trace_address, nslookup_address). - - -- [Live-Hack-CVE/CVE-2022-27224](https://github.com/Live-Hack-CVE/CVE-2022-27224) - ### CVE-2022-27226 (2022-03-18) @@ -4310,6 +4733,14 @@ A SQL injection vulnerability exists in Microfinance Management System 1.0 when - [erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated](https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated) +### CVE-2022-27943 (2022-03-26) + + +libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new. + + +- [Live-Hack-CVE/CVE-2022-27943](https://github.com/Live-Hack-CVE/CVE-2022-27943) + ### CVE-2022-28077 (2022-05-11) @@ -4369,54 +4800,6 @@ SiteServer CMS v7.x allows attackers to execute arbitrary code via a crafted plu ### CVE-2022-28132 - [alpernae/CVE-2022-28132](https://github.com/alpernae/CVE-2022-28132) -### CVE-2022-28184 (2022-05-17) - - -NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where an unprivileged regular user can access administrator- privileged registers, which may lead to denial of service, information disclosure, and data tampering. - - -- [Live-Hack-CVE/CVE-2022-28184](https://github.com/Live-Hack-CVE/CVE-2022-28184) - -### CVE-2022-28185 (2022-05-17) - - -NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the ECC layer, where an unprivileged regular user can cause an out-of-bounds write, which may lead to denial of service and data tampering. - - -- [Live-Hack-CVE/CVE-2022-28185](https://github.com/Live-Hack-CVE/CVE-2022-28185) - -### CVE-2022-28193 (2022-04-27) - - -NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot module tegrabl_cbo.c, where insufficient validation of untrusted data may allow a local attacker with elevated privileges to cause a memory buffer overflow, which may lead to code execution, loss of integrity, limited denial of service, and some impact to confidentiality. - - -- [Live-Hack-CVE/CVE-2022-28193](https://github.com/Live-Hack-CVE/CVE-2022-28193) - -### CVE-2022-28194 (2022-04-27) - - -NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot module tegrabl_cbo.c, where, if TFTP is enabled, a local attacker with elevated privileges can cause a memory buffer overflow, which may lead to code execution, loss of Integrity, limited denial of service, and some impact to confidentiality. - - -- [Live-Hack-CVE/CVE-2022-28194](https://github.com/Live-Hack-CVE/CVE-2022-28194) - -### CVE-2022-28195 (2022-04-27) - - -NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot ext4_read_file function, where insufficient validation of untrusted data may allow a highly privileged local attacker to cause a integer overflow, which may lead to code execution, escalation of privileges, limited denial of service, and some impact to confidentiality and integrity. The scope of impact can extend to other components. - - -- [Live-Hack-CVE/CVE-2022-28195](https://github.com/Live-Hack-CVE/CVE-2022-28195) - -### CVE-2022-28197 (2022-04-27) - - -NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot ext4_mount function, where Insufficient validation of untrusted data may allow a highly privileged local attacker to cause an integer overflow. This difficult-to-exploit vulnerability may lead to code execution, escalation of privileges, limited denial of service, and some impact to confidentiality and integrity. The scope of impact can extend to other components. - - -- [Live-Hack-CVE/CVE-2022-28197](https://github.com/Live-Hack-CVE/CVE-2022-28197) - ### CVE-2022-28215 (2022-04-12) @@ -4433,6 +4816,22 @@ Cewolf in Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an unauthe - [horizon3ai/CVE-2022-28219](https://github.com/horizon3ai/CVE-2022-28219) +### CVE-2022-28228 (2022-12-23) + + +Out-of-bounds read was discovered in YDB server. An attacker could construct a query with insert statement that would allow him to read sensitive information from other memory locations or cause a crash. + + +- [Live-Hack-CVE/CVE-2022-28228](https://github.com/Live-Hack-CVE/CVE-2022-28228) + +### CVE-2022-28229 (2022-12-23) + + +The hash functionality in userver before 42059b6319661583b3080cab9b595d4f8ac48128 allows attackers to cause a denial of service via crafted HTTP request, involving collisions. + + +- [Live-Hack-CVE/CVE-2022-28229](https://github.com/Live-Hack-CVE/CVE-2022-28229) + ### CVE-2022-28281 (2022-12-22) @@ -4440,14 +4839,71 @@ If a compromised content process sent an unexpected number of WebAuthN Extension - [0vercl0k/CVE-2022-28281](https://github.com/0vercl0k/CVE-2022-28281) +- [Live-Hack-CVE/CVE-2022-28281](https://github.com/Live-Hack-CVE/CVE-2022-28281) -### CVE-2022-28327 (2022-04-20) +### CVE-2022-28282 (2022-12-22) -The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input. +By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. -- [Live-Hack-CVE/CVE-2022-28327](https://github.com/Live-Hack-CVE/CVE-2022-28327) +- [Live-Hack-CVE/CVE-2022-28282](https://github.com/Live-Hack-CVE/CVE-2022-28282) + +### CVE-2022-28283 (2022-12-22) + + +The sourceMapURL feature in devtools was missing security checks that would have allowed a webpage to attempt to include local files or other files that should have been inaccessible. This vulnerability affects Firefox < 99. + + +- [Live-Hack-CVE/CVE-2022-28283](https://github.com/Live-Hack-CVE/CVE-2022-28283) + +### CVE-2022-28284 (2022-12-22) + + +SVG's <code>&lt;use&gt;</code> element could have been used to load unexpected content that could have executed script in certain circumstances. While the specification seems to allow this, other browsers do not, and web developers relied on this property for script security so gecko's implementation was aligned with theirs. This vulnerability affects Firefox < 99. + + +- [Live-Hack-CVE/CVE-2022-28284](https://github.com/Live-Hack-CVE/CVE-2022-28284) + +### CVE-2022-28285 (2022-12-22) + + +When generating the assembly code for <code>MLoadTypedArrayElementHole</code>, an incorrect AliasSet was used. In conjunction with another vulnerability this could have been used for an out of bounds memory read. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. + + +- [Live-Hack-CVE/CVE-2022-28285](https://github.com/Live-Hack-CVE/CVE-2022-28285) + +### CVE-2022-28286 (2022-12-22) + + +Due to a layout change, iframe contents could have been rendered outside of its border. This could have led to user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. + + +- [Live-Hack-CVE/CVE-2022-28286](https://github.com/Live-Hack-CVE/CVE-2022-28286) + +### CVE-2022-28287 (2022-12-22) + + +In unusual circumstances, selecting text could cause text selection caching to behave incorrectly, leading to a crash. This vulnerability affects Firefox < 99. + + +- [Live-Hack-CVE/CVE-2022-28287](https://github.com/Live-Hack-CVE/CVE-2022-28287) + +### CVE-2022-28288 (2022-12-22) + + +Mozilla developers and community members Randell Jesup, Sebastian Hengst, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 98. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 99. + + +- [Live-Hack-CVE/CVE-2022-28288](https://github.com/Live-Hack-CVE/CVE-2022-28288) + +### CVE-2022-28289 (2022-12-22) + + +Mozilla developers and community members Nika Layzell, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 91.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. + + +- [Live-Hack-CVE/CVE-2022-28289](https://github.com/Live-Hack-CVE/CVE-2022-28289) ### CVE-2022-28346 (2022-04-12) @@ -4541,22 +4997,6 @@ In Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version - [Live-Hack-CVE/CVE-2022-28815](https://github.com/Live-Hack-CVE/CVE-2022-28815) -### CVE-2022-28866 (2022-10-11) - - -Multiple Improper Access Control was discovered in Nokia AirFrame BMC Web GUI < R18 Firmware v4.13.00. It does not properly validate requests for access to (or editing of) data and functionality in all endpoints under /#settings/* and /api/settings/*. By not verifying the permissions for access to resources, it allows a potential attacker to view pages, with sensitive data, that are not allowed, and modify system configurations also causing DoS, which should be accessed only by user with administration profile, bypassing all controls (without checking for user identity). - - -- [Live-Hack-CVE/CVE-2022-28866](https://github.com/Live-Hack-CVE/CVE-2022-28866) - -### CVE-2022-28887 (2022-10-12) - - -Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl.dll unpacker handler function crashes. This can lead to a possible scanning engine crash. - - -- [Live-Hack-CVE/CVE-2022-28887](https://github.com/Live-Hack-CVE/CVE-2022-28887) - ### CVE-2022-28893 (2022-04-11) @@ -4615,7 +5055,6 @@ Multiple SQL injection vulnerabilities via the username and password parameters - [sudoninja-noob/CVE-2022-29006](https://github.com/sudoninja-noob/CVE-2022-29006) -- [Live-Hack-CVE/CVE-2022-29006](https://github.com/Live-Hack-CVE/CVE-2022-29006) ### CVE-2022-29007 (2022-05-11) @@ -4624,7 +5063,6 @@ Multiple SQL injection vulnerabilities via the username and password parameters - [sudoninja-noob/CVE-2022-29007](https://github.com/sudoninja-noob/CVE-2022-29007) -- [Live-Hack-CVE/CVE-2022-29007](https://github.com/Live-Hack-CVE/CVE-2022-29007) ### CVE-2022-29008 (2022-05-11) @@ -4955,6 +5393,86 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20 - [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885) +### CVE-2022-29909 (2022-12-22) + + +Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29909](https://github.com/Live-Hack-CVE/CVE-2022-29909) + +### CVE-2022-29910 (2022-12-22) + + +When closed or sent to the background, Firefox for Android would not properly record and persist HSTS settings.<br>*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29910](https://github.com/Live-Hack-CVE/CVE-2022-29910) + +### CVE-2022-29911 (2022-12-22) + + +An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29911](https://github.com/Live-Hack-CVE/CVE-2022-29911) + +### CVE-2022-29912 (2022-12-22) + + +Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29912](https://github.com/Live-Hack-CVE/CVE-2022-29912) + +### CVE-2022-29913 (2022-12-22) + + +The parent process would not properly check whether the Speech Synthesis feature is enabled, when receiving instructions from a child process. This vulnerability affects Thunderbird < 91.9. + + +- [Live-Hack-CVE/CVE-2022-29913](https://github.com/Live-Hack-CVE/CVE-2022-29913) + +### CVE-2022-29914 (2022-12-22) + + +When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29914](https://github.com/Live-Hack-CVE/CVE-2022-29914) + +### CVE-2022-29915 (2022-12-22) + + +The Performance API did not properly hide the fact whether a request cross-origin resource has observed redirects. This vulnerability affects Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29915](https://github.com/Live-Hack-CVE/CVE-2022-29915) + +### CVE-2022-29916 (2022-12-22) + + +Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29916](https://github.com/Live-Hack-CVE/CVE-2022-29916) + +### CVE-2022-29917 (2022-12-22) + + +Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29917](https://github.com/Live-Hack-CVE/CVE-2022-29917) + +### CVE-2022-29918 (2022-12-22) + + +Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 100. + + +- [Live-Hack-CVE/CVE-2022-29918](https://github.com/Live-Hack-CVE/CVE-2022-29918) + ### CVE-2022-29922 (2022-09-14) @@ -5139,14 +5657,6 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi - [ethicalblue/Follina-CVE-2022-30190-Sample](https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample) - [Gra3s/CVE-2022-30190-Follina-PowerPoint-Version](https://github.com/Gra3s/CVE-2022-30190-Follina-PowerPoint-Version) -### CVE-2022-30198 (2022-10-11) - - -Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081. - - -- [Live-Hack-CVE/CVE-2022-30198](https://github.com/Live-Hack-CVE/CVE-2022-30198) - ### CVE-2022-30292 (2022-05-04) @@ -5155,14 +5665,6 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer - [sprushed/CVE-2022-30292](https://github.com/sprushed/CVE-2022-30292) -### CVE-2022-30293 (2022-05-06) - - -In WebKitGTK through 2.36.0 (and WPE WebKit), there is a heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp. - - -- [Live-Hack-CVE/CVE-2022-30293](https://github.com/Live-Hack-CVE/CVE-2022-30293) - ### CVE-2022-30330 (2022-05-06) @@ -5265,13 +5767,13 @@ IBM QRadar SIEM 7.4 and 7.5 could disclose sensitive information via a local ser - [Live-Hack-CVE/CVE-2022-30613](https://github.com/Live-Hack-CVE/CVE-2022-30613) -### CVE-2022-30763 (2022-05-15) +### CVE-2022-30689 (2022-05-17) -Janet before 1.22.0 mishandles arrays. +HashiCorp Vault and Vault Enterprise from 1.10.0 to 1.10.2 did not correctly configure and enforce MFA on login after server restarts. This affects the Login MFA feature introduced in Vault and Vault Enterprise 1.10.0 and does not affect the separate Enterprise MFA feature set. Fixed in 1.10.3. -- [Live-Hack-CVE/CVE-2022-30763](https://github.com/Live-Hack-CVE/CVE-2022-30763) +- [Live-Hack-CVE/CVE-2022-30689](https://github.com/Live-Hack-CVE/CVE-2022-30689) ### CVE-2022-30778 - [kang8/CVE-2022-30778](https://github.com/kang8/CVE-2022-30778) @@ -5332,6 +5834,14 @@ An authorization bypass in b2evolution allows remote, unauthenticated attackers - [Live-Hack-CVE/CVE-2022-30935](https://github.com/Live-Hack-CVE/CVE-2022-30935) +### CVE-2022-31029 (2022-07-07) + + +AdminLTE is a Pi-hole Dashboard for stats and configuration. In affected versions inserting code like `<script>alert("XSS")</script>` in the field marked with "Domain to look for" and hitting <kbd>enter</kbd> (or clicking on any of the buttons) will execute the script. The user must be logged in to use this vulnerability. Usually only administrators have login access to pi-hole, minimizing the risks. Users are advised to upgrade. There are no known workarounds for this issue. + + +- [Live-Hack-CVE/CVE-2022-31029](https://github.com/Live-Hack-CVE/CVE-2022-31029) + ### CVE-2022-31144 (2022-07-19) @@ -5356,14 +5866,6 @@ PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and - [Live-Hack-CVE/CVE-2022-31181](https://github.com/Live-Hack-CVE/CVE-2022-31181) -### CVE-2022-31228 (2022-10-12) - - -Dell EMC XtremIO versions prior to X2 6.4.0-22 contain a bruteforce vulnerability. A remote unauthenticated attacker can potentially exploit this vulnerability and gain access to an admin account. - - -- [Live-Hack-CVE/CVE-2022-31228](https://github.com/Live-Hack-CVE/CVE-2022-31228) - ### CVE-2022-31245 (2022-05-20) @@ -5471,13 +5973,109 @@ VMware ESXi contains a null-pointer deference vulnerability. A malicious actor w - [Live-Hack-CVE/CVE-2022-31681](https://github.com/Live-Hack-CVE/CVE-2022-31681) -### CVE-2022-31682 (2022-10-11) +### CVE-2022-31736 (2022-12-22) -VMware Aria Operations contains an arbitrary file read vulnerability. A malicious actor with administrative privileges may be able to read arbitrary files containing sensitive data. +A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. -- [Live-Hack-CVE/CVE-2022-31682](https://github.com/Live-Hack-CVE/CVE-2022-31682) +- [Live-Hack-CVE/CVE-2022-31736](https://github.com/Live-Hack-CVE/CVE-2022-31736) + +### CVE-2022-31737 (2022-12-22) + + +A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. + + +- [Live-Hack-CVE/CVE-2022-31737](https://github.com/Live-Hack-CVE/CVE-2022-31737) + +### CVE-2022-31738 (2022-12-22) + + +When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. + + +- [Live-Hack-CVE/CVE-2022-31738](https://github.com/Live-Hack-CVE/CVE-2022-31738) + +### CVE-2022-31739 (2022-12-22) + + +When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.<br>*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. + + +- [Live-Hack-CVE/CVE-2022-31739](https://github.com/Live-Hack-CVE/CVE-2022-31739) + +### CVE-2022-31740 (2022-12-22) + + +On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. + + +- [Live-Hack-CVE/CVE-2022-31740](https://github.com/Live-Hack-CVE/CVE-2022-31740) + +### CVE-2022-31741 (2022-12-22) + + +A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. + + +- [Live-Hack-CVE/CVE-2022-31741](https://github.com/Live-Hack-CVE/CVE-2022-31741) + +### CVE-2022-31742 (2022-12-22) + + +An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. + + +- [Live-Hack-CVE/CVE-2022-31742](https://github.com/Live-Hack-CVE/CVE-2022-31742) + +### CVE-2022-31743 (2022-12-22) + + +Firefox's HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers. This could have been used to escape HTML comments on pages that put user-controlled data in them. This vulnerability affects Firefox < 101. + + +- [Live-Hack-CVE/CVE-2022-31743](https://github.com/Live-Hack-CVE/CVE-2022-31743) + +### CVE-2022-31744 (2022-12-22) + + +An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR < 91.11, Thunderbird < 102, Thunderbird < 91.11, and Firefox < 101. + + +- [Live-Hack-CVE/CVE-2022-31744](https://github.com/Live-Hack-CVE/CVE-2022-31744) + +### CVE-2022-31745 (2022-12-22) + + +If array shift operations are not used, the Garbage Collector may have become confused about valid objects. This vulnerability affects Firefox < 101. + + +- [Live-Hack-CVE/CVE-2022-31745](https://github.com/Live-Hack-CVE/CVE-2022-31745) + +### CVE-2022-31746 (2022-12-22) + + +Internal URLs are protected by a secret UUID key, which could have been leaked to web page through the Referrer header. This vulnerability affects Firefox for iOS < 102. + + +- [Live-Hack-CVE/CVE-2022-31746](https://github.com/Live-Hack-CVE/CVE-2022-31746) + +### CVE-2022-31747 (2022-12-22) + + +Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10. + + +- [Live-Hack-CVE/CVE-2022-31747](https://github.com/Live-Hack-CVE/CVE-2022-31747) + +### CVE-2022-31748 (2022-12-22) + + +Mozilla developers Gabriele Svelto, Timothy Nikkel, Randell Jesup, Jon Coppeard, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 101. + + +- [Live-Hack-CVE/CVE-2022-31748](https://github.com/Live-Hack-CVE/CVE-2022-31748) ### CVE-2022-31749 - [jbaines-r7/hook](https://github.com/jbaines-r7/hook) @@ -5506,14 +6104,6 @@ The AMS module has a vulnerability in input validation. Successful exploitation - [Live-Hack-CVE/CVE-2022-31762](https://github.com/Live-Hack-CVE/CVE-2022-31762) -### CVE-2022-31766 (2022-10-11) - - -A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.1.2), SCALANCE M804PB (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.1.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.1.2), SCALANCE M874-2 (All versions < V7.1.2), SCALANCE M874-3 (All versions < V7.1.2), SCALANCE M876-3 (EVDO) (All versions < V7.1.2), SCALANCE M876-3 (ROK) (All versions < V7.1.2), SCALANCE M876-4 (EU) (All versions < V7.1.2), SCALANCE M876-4 (NAM) (All versions < V7.1.2), SCALANCE MUM853-1 (EU) (All versions < V7.1.2), SCALANCE MUM856-1 (EU) (All versions < V7.1.2), SCALANCE MUM856-1 (RoW) (All versions < V7.1.2), SCALANCE S615 (All versions < V7.1.2), SCALANCE WAM763-1 (All versions >= V1.1.0), SCALANCE WAM766-1 (All versions >= V1.1.0), SCALANCE WAM766-1 (All versions >= V1.1.0), SCALANCE WAM766-1 6GHz (All versions >= V1.1.0), SCALANCE WAM766-1 EEC (All versions >= V1.1.0), SCALANCE WAM766-1 EEC (All versions >= V1.1.0), SCALANCE WAM766-1 EEC 6GHz (All versions >= V1.1.0), SCALANCE WUM763-1 (All versions >= V1.1.0), SCALANCE WUM763-1 (All versions >= V1.1.0), SCALANCE WUM766-1 (All versions >= V1.1.0), SCALANCE WUM766-1 (All versions >= V1.1.0), SCALANCE WUM766-1 6GHz (All versions >= V1.1.0). Affected devices with TCP Event service enabled do not properly handle malformed packets. This could allow an unauthenticated remote attacker to cause a denial of service and reboot the device thus possibly affecting other network resources. - - -- [Live-Hack-CVE/CVE-2022-31766](https://github.com/Live-Hack-CVE/CVE-2022-31766) - ### CVE-2022-31983 (2022-06-01) @@ -5682,86 +6272,6 @@ The Linux kernel before 5.17.9 allows TCP servers to identify clients by observi - [Live-Hack-CVE/CVE-2022-32296](https://github.com/Live-Hack-CVE/CVE-2022-32296) -### CVE-2022-32483 (2022-10-12) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable. - - -- [Live-Hack-CVE/CVE-2022-32483](https://github.com/Live-Hack-CVE/CVE-2022-32483) - -### CVE-2022-32484 (2022-10-12) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable. - - -- [Live-Hack-CVE/CVE-2022-32484](https://github.com/Live-Hack-CVE/CVE-2022-32484) - -### CVE-2022-32485 (2022-10-12) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-32485](https://github.com/Live-Hack-CVE/CVE-2022-32485) - -### CVE-2022-32486 (2022-10-11) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-32486](https://github.com/Live-Hack-CVE/CVE-2022-32486) - -### CVE-2022-32487 (2022-10-12) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-32487](https://github.com/Live-Hack-CVE/CVE-2022-32487) - -### CVE-2022-32488 (2022-10-12) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-32488](https://github.com/Live-Hack-CVE/CVE-2022-32488) - -### CVE-2022-32489 (2022-10-12) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-32489](https://github.com/Live-Hack-CVE/CVE-2022-32489) - -### CVE-2022-32491 (2022-10-12) - - -Dell Client BIOS contains a Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause an arbitrary write during SMM. - - -- [Live-Hack-CVE/CVE-2022-32491](https://github.com/Live-Hack-CVE/CVE-2022-32491) - -### CVE-2022-32492 (2022-10-11) - - -Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-32492](https://github.com/Live-Hack-CVE/CVE-2022-32492) - -### CVE-2022-32493 (2022-10-12) - - -Dell BIOS contains an Stack-Based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-32493](https://github.com/Live-Hack-CVE/CVE-2022-32493) - ### CVE-2022-32532 (2022-06-28) @@ -5770,46 +6280,6 @@ Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypa - [Lay0us1/CVE-2022-32532](https://github.com/Lay0us1/CVE-2022-32532) -### CVE-2022-32589 (2022-10-07) - - -In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600. - - -- [Live-Hack-CVE/CVE-2022-32589](https://github.com/Live-Hack-CVE/CVE-2022-32589) - -### CVE-2022-32590 (2022-10-07) - - -In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425. - - -- [Live-Hack-CVE/CVE-2022-32590](https://github.com/Live-Hack-CVE/CVE-2022-32590) - -### CVE-2022-32591 (2022-10-07) - - -In ril, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07257259; Issue ID: ALPS07257259. - - -- [Live-Hack-CVE/CVE-2022-32591](https://github.com/Live-Hack-CVE/CVE-2022-32591) - -### CVE-2022-32592 (2022-10-07) - - -In cpu dvfs, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07139405; Issue ID: ALPS07139405. - - -- [Live-Hack-CVE/CVE-2022-32592](https://github.com/Live-Hack-CVE/CVE-2022-32592) - -### CVE-2022-32593 (2022-10-07) - - -In vowe, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138493; Issue ID: ALPS07138493. - - -- [Live-Hack-CVE/CVE-2022-32593](https://github.com/Live-Hack-CVE/CVE-2022-32593) - ### CVE-2022-32782 (2022-09-23) @@ -5970,14 +6440,6 @@ Redis v7.0 was discovered to contain a memory leak via the component streamGetEd - [Live-Hack-CVE/CVE-2022-33105](https://github.com/Live-Hack-CVE/CVE-2022-33105) -### CVE-2022-33106 (2022-10-12) - - -WiJungle NGFW Version U250 was discovered to be vulnerable to No Rate Limit attack, allowing the attacker to brute force the admin password leading to Account Take Over. - - -- [Live-Hack-CVE/CVE-2022-33106](https://github.com/Live-Hack-CVE/CVE-2022-33106) - ### CVE-2022-33139 (2022-06-21) @@ -5986,21 +6448,13 @@ A vulnerability has been identified in Cerberus DMS (All versions), Desigo CC (A - [Live-Hack-CVE/CVE-2022-33139](https://github.com/Live-Hack-CVE/CVE-2022-33139) -### CVE-2022-33634 (2022-10-11) +### CVE-2022-33324 (2022-12-22) -Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081. +Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions "32" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "65" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU all versions, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery. -- [Live-Hack-CVE/CVE-2022-33634](https://github.com/Live-Hack-CVE/CVE-2022-33634) - -### CVE-2022-33635 (2022-10-11) - - -Windows GDI+ Remote Code Execution Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-33635](https://github.com/Live-Hack-CVE/CVE-2022-33635) +- [Live-Hack-CVE/CVE-2022-33324](https://github.com/Live-Hack-CVE/CVE-2022-33324) ### CVE-2022-33642 (2022-07-12) @@ -6010,14 +6464,6 @@ Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique - [Live-Hack-CVE/CVE-2022-33642](https://github.com/Live-Hack-CVE/CVE-2022-33642) -### CVE-2022-33645 (2022-10-11) - - -Windows TCP/IP Driver Denial of Service Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-33645](https://github.com/Live-Hack-CVE/CVE-2022-33645) - ### CVE-2022-33681 (2022-09-23) @@ -6042,14 +6488,6 @@ Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that do - [Live-Hack-CVE/CVE-2022-33683](https://github.com/Live-Hack-CVE/CVE-2022-33683) -### CVE-2022-33749 (2022-10-11) - - -XAPI open file limit DoS It is possible for an unauthenticated client on the network to cause XAPI to hit its file-descriptor limit. This causes XAPI to be unable to accept new requests for other (trusted) clients, and blocks XAPI from carrying out any tasks that require the opening of file descriptors. - - -- [Live-Hack-CVE/CVE-2022-33749](https://github.com/Live-Hack-CVE/CVE-2022-33749) - ### CVE-2022-33880 (2022-09-29) @@ -6122,70 +6560,6 @@ A buffer underflow vulnerability exists in the way Hword of Hancom Office 2020 v - [Live-Hack-CVE/CVE-2022-33896](https://github.com/Live-Hack-CVE/CVE-2022-33896) -### CVE-2022-33918 (2022-10-12) - - -Dell GeoDrive, Versions 2.1 - 2.2, contains an information disclosure vulnerability. An authenticated non-admin user could potentially exploit this vulnerability and gain access to sensitive information. - - -- [Live-Hack-CVE/CVE-2022-33918](https://github.com/Live-Hack-CVE/CVE-2022-33918) - -### CVE-2022-33919 (2022-10-12) - - -Dell GeoDrive, versions 2.1 - 2.2, contains an information disclosure vulnerability in GUI. An authenticated non-admin user could potentially exploit this vulnerability and view sensitive information. - - -- [Live-Hack-CVE/CVE-2022-33919](https://github.com/Live-Hack-CVE/CVE-2022-33919) - -### CVE-2022-33920 (2022-10-12) - - -Dell GeoDrive, versions prior to 2.2, contains an Unquoted File Path vulnerability. A low privilege attacker could potentially exploit this vulnerability, leading to the execution of arbitrary code in the SYSTEM security context. - - -- [Live-Hack-CVE/CVE-2022-33920](https://github.com/Live-Hack-CVE/CVE-2022-33920) - -### CVE-2022-33921 (2022-10-12) - - -Dell GeoDrive, versions prior to 2.2, contains Multiple DLL Hijacking Vulnerabilities. A low privilege attacker could potentially exploit this vulnerability, leading to the execution of arbitrary code in the SYSTEM security context. - - -- [Live-Hack-CVE/CVE-2022-33921](https://github.com/Live-Hack-CVE/CVE-2022-33921) - -### CVE-2022-33922 (2022-10-12) - - -Dell GeoDrive, versions prior to 2.2, contains Insecure File and Folder Permissions vulnerabilities. A low privilege attacker could potentially exploit this vulnerability, leading to the execution of arbitrary code in the SYSTEM security context. Dell recommends customers to upgrade at the earliest opportunity. - - -- [Live-Hack-CVE/CVE-2022-33922](https://github.com/Live-Hack-CVE/CVE-2022-33922) - -### CVE-2022-33937 (2022-10-12) - - -Dell GeoDrive, Versions 1.0 - 2.2, contain a Path Traversal Vulnerability in the reporting function. A local, low privileged attacker could potentially exploit this vulnerability, to gain unauthorized delete access to the files stored on the server filesystem, with the privileges of the GeoDrive service: NT AUTHORITY\SYSTEM. - - -- [Live-Hack-CVE/CVE-2022-33937](https://github.com/Live-Hack-CVE/CVE-2022-33937) - -### CVE-2022-33978 (2022-10-11) - - -Reflected Cross-Site Scripting (XSS) vulnerability FontMeister plugin <= 1.08 at WordPress. - - -- [Live-Hack-CVE/CVE-2022-33978](https://github.com/Live-Hack-CVE/CVE-2022-33978) - -### CVE-2022-34021 (2022-10-13) - - -Multiple Cross Site Scripting (XSS) vulnerabilities in ResIOT IOT Platform + LoRaWAN Network Server through 4.1.1000114 via the form fields. - - -- [Live-Hack-CVE/CVE-2022-34021](https://github.com/Live-Hack-CVE/CVE-2022-34021) - ### CVE-2022-34046 (2022-07-20) @@ -6234,14 +6608,6 @@ IBM CICS TX 11.1 could allow a local user to cause a denial of service due to im - [Live-Hack-CVE/CVE-2022-34308](https://github.com/Live-Hack-CVE/CVE-2022-34308) -### CVE-2022-34334 (2022-10-10) - - -IBM Sterling Partner Engagement Manager 2.0 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 229704. - - -- [Live-Hack-CVE/CVE-2022-34334](https://github.com/Live-Hack-CVE/CVE-2022-34334) - ### CVE-2022-34348 (2022-09-23) @@ -6250,22 +6616,6 @@ IBM Sterling Partner Engagement Manager 6.1 is vulnerable to an XML External Ent - [Live-Hack-CVE/CVE-2022-34348](https://github.com/Live-Hack-CVE/CVE-2022-34348) -### CVE-2022-34390 (2022-10-12) - - -Dell BIOS contains a use of uninitialized variable vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-34390](https://github.com/Live-Hack-CVE/CVE-2022-34390) - -### CVE-2022-34391 (2022-10-12) - - -Dell Client BIOS Versions prior to the remediated version contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. - - -- [Live-Hack-CVE/CVE-2022-34391](https://github.com/Live-Hack-CVE/CVE-2022-34391) - ### CVE-2022-34394 (2022-09-28) @@ -6274,14 +6624,6 @@ Dell OS10, version 10.5.3.4, contains an Improper Certificate Validation vulnera - [Live-Hack-CVE/CVE-2022-34394](https://github.com/Live-Hack-CVE/CVE-2022-34394) -### CVE-2022-34402 (2022-10-10) - - -Dell Wyse ThinOS 2205 contains a Regular Expression Denial of Service Vulnerability in UI. An admin privilege attacker could potentially exploit this vulnerability, leading to denial-of-service. - - -- [Live-Hack-CVE/CVE-2022-34402](https://github.com/Live-Hack-CVE/CVE-2022-34402) - ### CVE-2022-34424 (2022-09-28) @@ -6290,30 +6632,6 @@ Networking OS10, versions 10.5.1.x, 10.5.2.x, and 10.5.3.x contain a vulnerabili - [Live-Hack-CVE/CVE-2022-34424](https://github.com/Live-Hack-CVE/CVE-2022-34424) -### CVE-2022-34425 (2022-10-10) - - -Dell Enterprise SONiC OS, 4.0.0, 4.0.1, contain a cryptographic key vulnerability in SSH. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to unauthorized access to communication. - - -- [Live-Hack-CVE/CVE-2022-34425](https://github.com/Live-Hack-CVE/CVE-2022-34425) - -### CVE-2022-34426 (2022-10-11) - - -Dell Container Storage Modules 1.2 contains an Improper Limitation of a Pathname to a Restricted Directory in goiscsi and gobrick libraries which could lead to OS command injection. A remote unauthenticated attacker could exploit this vulnerability leading to unintentional access to path outside of restricted directory. - - -- [Live-Hack-CVE/CVE-2022-34426](https://github.com/Live-Hack-CVE/CVE-2022-34426) - -### CVE-2022-34427 (2022-10-11) - - -Dell Container Storage Modules 1.2 contains an OS Command Injection in goiscsi and gobrick libraries. A remote unauthenticated attacker could exploit this vulnerability leading to modification of intended OS command execution. - - -- [Live-Hack-CVE/CVE-2022-34427](https://github.com/Live-Hack-CVE/CVE-2022-34427) - ### CVE-2022-34428 (2022-09-30) @@ -6330,37 +6648,149 @@ Dell Hybrid Client below 1.8 version contains a Zip Slip Vulnerability in UI. A - [Live-Hack-CVE/CVE-2022-34429](https://github.com/Live-Hack-CVE/CVE-2022-34429) -### CVE-2022-34430 (2022-10-11) +### CVE-2022-34468 (2022-12-22) -Dell Hybrid Client below 1.8 version contains a Zip Bomb Vulnerability in UI. A guest privilege attacker could potentially exploit this vulnerability, leading to system files modification. +An iframe that was not permitted to run scripts could do so if the user clicked on a <code>javascript:</code> link. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. -- [Live-Hack-CVE/CVE-2022-34430](https://github.com/Live-Hack-CVE/CVE-2022-34430) +- [Live-Hack-CVE/CVE-2022-34468](https://github.com/Live-Hack-CVE/CVE-2022-34468) -### CVE-2022-34431 (2022-10-11) +### CVE-2022-34469 (2022-12-22) -Dell Hybrid Client below 1.8 version contains a guest user profile corruption vulnerability. A WMS privilege attacker could potentially exploit this vulnerability, leading to DHC system not being accessible. +When a TLS Certificate error occurs on a domain protected by the HSTS header, the browser should not allow the user to bypass the certificate error. On Firefox for Android, the user was presented with the option to bypass the error; this could only have been done by the user explicitly. <br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102. -- [Live-Hack-CVE/CVE-2022-34431](https://github.com/Live-Hack-CVE/CVE-2022-34431) +- [Live-Hack-CVE/CVE-2022-34469](https://github.com/Live-Hack-CVE/CVE-2022-34469) -### CVE-2022-34432 (2022-10-11) +### CVE-2022-34470 (2022-12-22) -Dell Hybrid Client below 1.8 version contains a gedit vulnerability. A guest attacker could potentially exploit this vulnerability, allowing deletion of user and some system files and folders. +Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. -- [Live-Hack-CVE/CVE-2022-34432](https://github.com/Live-Hack-CVE/CVE-2022-34432) +- [Live-Hack-CVE/CVE-2022-34470](https://github.com/Live-Hack-CVE/CVE-2022-34470) -### CVE-2022-34434 (2022-10-11) +### CVE-2022-34471 (2022-12-22) -Cloud Mobility for Dell Storage versions 1.3.0 and earlier contains an Improper Access Control vulnerability within the Postgres database. A threat actor with root level access to either the vApp or containerized versions of Cloud Mobility may potentially exploit this vulnerability, leading to the modification or deletion of tables that are required for many of the core functionalities of Cloud Mobility. Exploitation may lead to the compromise of integrity and availability of the normal functionality of the Cloud Mobility application. +When downloading an update for an addon, the downloaded addon update's version was not verified to match the version selected from the manifest. If the manifest had been tampered with on the server, an attacker could trick the browser into downgrading the addon to a prior version. This vulnerability affects Firefox < 102. -- [Live-Hack-CVE/CVE-2022-34434](https://github.com/Live-Hack-CVE/CVE-2022-34434) +- [Live-Hack-CVE/CVE-2022-34471](https://github.com/Live-Hack-CVE/CVE-2022-34471) + +### CVE-2022-34472 (2022-12-22) + + +If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. + + +- [Live-Hack-CVE/CVE-2022-34472](https://github.com/Live-Hack-CVE/CVE-2022-34472) + +### CVE-2022-34473 (2022-12-22) + + +The HTML Sanitizer should have sanitized the <code>href</code> attribute of SVG <code>&lt;use&gt;</code> tags; however it incorrectly did not sanitize <code>xlink:href</code> attributes. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34473](https://github.com/Live-Hack-CVE/CVE-2022-34473) + +### CVE-2022-34474 (2022-12-22) + + +Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34474](https://github.com/Live-Hack-CVE/CVE-2022-34474) + +### CVE-2022-34475 (2022-12-22) + + +SVG <code>&lt;use&gt;</code> tags that referenced a same-origin document could have resulted in script execution if attacker input was sanitized via the HTML Sanitizer API. This would have required the attacker to reference a same-origin JavaScript file containing the script to be executed. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34475](https://github.com/Live-Hack-CVE/CVE-2022-34475) + +### CVE-2022-34476 (2022-12-22) + + +ASN.1 parsing of an indefinite SEQUENCE inside an indefinite GROUP could have resulted in the parser accepting malformed ASN.1. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34476](https://github.com/Live-Hack-CVE/CVE-2022-34476) + +### CVE-2022-34477 (2022-12-22) + + +The MediaError message property should be consistent to avoid leaking information about cross-origin resources; however for a same-site cross-origin resource, the message could have leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34477](https://github.com/Live-Hack-CVE/CVE-2022-34477) + +### CVE-2022-34478 (2022-12-22) + + +The <code>ms-msdt</code>, <code>search</code>, and <code>search-ms</code> protocols deliver content to Microsoft applications, bypassing the browser, when a user accepts a prompt. These applications have had known vulnerabilities, exploited in the wild (although we know of none exploited through Thunderbird), so in this release Thunderbird has blocked these protocols from prompting the user to open them.<br>*This bug only affects Thunderbird on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. + + +- [Live-Hack-CVE/CVE-2022-34478](https://github.com/Live-Hack-CVE/CVE-2022-34478) + +### CVE-2022-34479 (2022-12-22) + + +A malicious website that could create a popup could have resized the popup to overlay the address bar with its own content, resulting in potential user confusion or spoofing attacks. <br>*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. + + +- [Live-Hack-CVE/CVE-2022-34479](https://github.com/Live-Hack-CVE/CVE-2022-34479) + +### CVE-2022-34480 (2022-12-22) + + +Within the <code>lg_init()</code> function, if several allocations succeed but then one fails, an uninitialized pointer would have been freed despite never being allocated. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34480](https://github.com/Live-Hack-CVE/CVE-2022-34480) + +### CVE-2022-34481 (2022-12-22) + + +In the <code>nsTArray_Impl::ReplaceElementsAt()</code> function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. + + +- [Live-Hack-CVE/CVE-2022-34481](https://github.com/Live-Hack-CVE/CVE-2022-34481) + +### CVE-2022-34482 (2022-12-22) + + +An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34483. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34482](https://github.com/Live-Hack-CVE/CVE-2022-34482) + +### CVE-2022-34483 (2022-12-22) + + +An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34482. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34483](https://github.com/Live-Hack-CVE/CVE-2022-34483) + +### CVE-2022-34484 (2022-12-22) + + +The Mozilla Fuzzing Team reported potential vulnerabilities present in Thunderbird 91.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. + + +- [Live-Hack-CVE/CVE-2022-34484](https://github.com/Live-Hack-CVE/CVE-2022-34484) + +### CVE-2022-34485 (2022-12-22) + + +Mozilla developers Bryce Seager van Dyk and the Mozilla Fuzzing Team reported potential vulnerabilities present in Firefox 101. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 102. + + +- [Live-Hack-CVE/CVE-2022-34485](https://github.com/Live-Hack-CVE/CVE-2022-34485) ### CVE-2022-34612 (2022-07-26) @@ -6370,14 +6800,6 @@ Rizin v0.4.0 and below was discovered to contain an integer overflow via the fun - [Live-Hack-CVE/CVE-2022-34612](https://github.com/Live-Hack-CVE/CVE-2022-34612) -### CVE-2022-34689 (2022-10-11) - - -Windows CryptoAPI Spoofing Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-34689](https://github.com/Live-Hack-CVE/CVE-2022-34689) - ### CVE-2022-34709 (2022-08-09) @@ -6410,94 +6832,6 @@ OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contai - [bypazs/CVE-2022-34963](https://github.com/bypazs/CVE-2022-34963) -### CVE-2022-35040 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b5567. - - -- [Live-Hack-CVE/CVE-2022-35040](https://github.com/Live-Hack-CVE/CVE-2022-35040) - -### CVE-2022-35041 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b558f. - - -- [Live-Hack-CVE/CVE-2022-35041](https://github.com/Live-Hack-CVE/CVE-2022-35041) - -### CVE-2022-35042 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x4adb11. - - -- [Live-Hack-CVE/CVE-2022-35042](https://github.com/Live-Hack-CVE/CVE-2022-35042) - -### CVE-2022-35043 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c08a6. - - -- [Live-Hack-CVE/CVE-2022-35043](https://github.com/Live-Hack-CVE/CVE-2022-35043) - -### CVE-2022-35044 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x617087. - - -- [Live-Hack-CVE/CVE-2022-35044](https://github.com/Live-Hack-CVE/CVE-2022-35044) - -### CVE-2022-35045 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0d63. - - -- [Live-Hack-CVE/CVE-2022-35045](https://github.com/Live-Hack-CVE/CVE-2022-35045) - -### CVE-2022-35046 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b0466. - - -- [Live-Hack-CVE/CVE-2022-35046](https://github.com/Live-Hack-CVE/CVE-2022-35046) - -### CVE-2022-35058 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b05ce. - - -- [Live-Hack-CVE/CVE-2022-35058](https://github.com/Live-Hack-CVE/CVE-2022-35058) - -### CVE-2022-35059 (2022-10-14) - - -OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6c0414. - - -- [Live-Hack-CVE/CVE-2022-35059](https://github.com/Live-Hack-CVE/CVE-2022-35059) - -### CVE-2022-35080 (2022-10-13) - - -SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via png_load at /lib/png.c. - - -- [Live-Hack-CVE/CVE-2022-35080](https://github.com/Live-Hack-CVE/CVE-2022-35080) - -### CVE-2022-35081 (2022-10-13) - - -SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via png_read_header at /src/png2swf.c. - - -- [Live-Hack-CVE/CVE-2022-35081](https://github.com/Live-Hack-CVE/CVE-2022-35081) - ### CVE-2022-35091 (2022-09-23) @@ -6570,30 +6904,6 @@ SWFTools commit 772e55a2 was discovered to contain a stack overflow via ImageStr - [Live-Hack-CVE/CVE-2022-35099](https://github.com/Live-Hack-CVE/CVE-2022-35099) -### CVE-2022-35134 (2022-10-13) - - -Boodskap IoT Platform v4.4.9-02 contains a cross-site scripting (XSS) vulnerability. - - -- [Live-Hack-CVE/CVE-2022-35134](https://github.com/Live-Hack-CVE/CVE-2022-35134) - -### CVE-2022-35135 (2022-10-13) - - -Boodskap IoT Platform v4.4.9-02 allows attackers to escalate privileges via a crafted request sent to /api/user/upsert/<uuid>. - - -- [Live-Hack-CVE/CVE-2022-35135](https://github.com/Live-Hack-CVE/CVE-2022-35135) - -### CVE-2022-35136 (2022-10-13) - - -Boodskap IoT Platform v4.4.9-02 allows attackers to make unauthenticated API requests. - - -- [Live-Hack-CVE/CVE-2022-35136](https://github.com/Live-Hack-CVE/CVE-2022-35136) - ### CVE-2022-35137 (2022-09-29) @@ -6618,14 +6928,6 @@ Bus Pass Management System 1.0 was discovered to contain a SQL Injection vulnera - [Live-Hack-CVE/CVE-2022-35156](https://github.com/Live-Hack-CVE/CVE-2022-35156) -### CVE-2022-35226 (2022-10-11) - - -SAP Data Services Management allows an attacker to copy the data from a request and echoed into the application's immediate response, it will lead to a Cross-Site Scripting vulnerability. The attacker would have to log in to the management console to perform such as an attack, only few of the pages are vulnerable in the DS management console. - - -- [Live-Hack-CVE/CVE-2022-35226](https://github.com/Live-Hack-CVE/CVE-2022-35226) - ### CVE-2022-35246 (2022-09-23) @@ -6642,6 +6944,94 @@ A privilege escalation vulnerability exists in Rocket.chat <v5 which made it - [Live-Hack-CVE/CVE-2022-35250](https://github.com/Live-Hack-CVE/CVE-2022-35250) +### CVE-2022-35261 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_authorized_keys/` API. + + +- [Live-Hack-CVE/CVE-2022-35261](https://github.com/Live-Hack-CVE/CVE-2022-35261) + +### CVE-2022-35262 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_xml_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35262](https://github.com/Live-Hack-CVE/CVE-2022-35262) + +### CVE-2022-35263 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35263](https://github.com/Live-Hack-CVE/CVE-2022-35263) + +### CVE-2022-35264 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_aaa_cert_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35264](https://github.com/Live-Hack-CVE/CVE-2022-35264) + +### CVE-2022-35265 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_nodejs_app/` API. + + +- [Live-Hack-CVE/CVE-2022-35265](https://github.com/Live-Hack-CVE/CVE-2022-35265) + +### CVE-2022-35266 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_firmware/` API. + + +- [Live-Hack-CVE/CVE-2022-35266](https://github.com/Live-Hack-CVE/CVE-2022-35266) + +### CVE-2022-35267 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_https_cert_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35267](https://github.com/Live-Hack-CVE/CVE-2022-35267) + +### CVE-2022-35268 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_sdk_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35268](https://github.com/Live-Hack-CVE/CVE-2022-35268) + +### CVE-2022-35269 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_e2c_json_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35269](https://github.com/Live-Hack-CVE/CVE-2022-35269) + +### CVE-2022-35270 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_wireguard_cert_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35270](https://github.com/Live-Hack-CVE/CVE-2022-35270) + +### CVE-2022-35271 (2022-10-25) + + +A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_cert_file/` API. + + +- [Live-Hack-CVE/CVE-2022-35271](https://github.com/Live-Hack-CVE/CVE-2022-35271) + ### CVE-2022-35282 (2022-09-28) @@ -6666,45 +7056,13 @@ An attacker with basic business user privileges could craft and upload a malicio - [Live-Hack-CVE/CVE-2022-35294](https://github.com/Live-Hack-CVE/CVE-2022-35294) -### CVE-2022-35296 (2022-10-11) +### CVE-2022-35646 (2022-12-22) -Under certain conditions, the application SAP BusinessObjects Business Intelligence Platform (Version Management System) exposes sensitive information to an actor over the network with high privileges that is not explicitly authorized to have access to that information, leading to a high impact on Confidentiality. +IBM Security Verify Governance, Identity Manager 10.0.1 software component could allow an authenticated user to modify or cancel any other user's access request using man-in-the-middle techniques. IBM X-Force ID: 231096. -- [Live-Hack-CVE/CVE-2022-35296](https://github.com/Live-Hack-CVE/CVE-2022-35296) - -### CVE-2022-35297 (2022-10-11) - - -The application SAP Enable Now does not sufficiently encode user-controlled inputs over the network before it is placed in the output being served to other users, thereby expanding the attack scope, resulting in Stored Cross-Site Scripting (XSS) vulnerability leading to limited impact on Confidentiality, Integrity and Availability. - - -- [Live-Hack-CVE/CVE-2022-35297](https://github.com/Live-Hack-CVE/CVE-2022-35297) - -### CVE-2022-35299 (2022-10-11) - - -SAP SQL Anywhere - version 17.0, and SAP IQ - version 16.1, allows an attacker to leverage logical errors in memory management to cause a memory corruption, such as Stack-based buffer overflow. - - -- [Live-Hack-CVE/CVE-2022-35299](https://github.com/Live-Hack-CVE/CVE-2022-35299) - -### CVE-2022-35611 (2022-10-13) - - -A Cross-Site Request Forgery (CSRF) in MQTTRoute v3.3 and below allows attackers to create and remove dashboards. - - -- [Live-Hack-CVE/CVE-2022-35611](https://github.com/Live-Hack-CVE/CVE-2022-35611) - -### CVE-2022-35612 (2022-10-13) - - -A cross-site scripting (XSS) vulnerability in MQTTRoute v3.3 and below allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the dashboard name text field. - - -- [Live-Hack-CVE/CVE-2022-35612](https://github.com/Live-Hack-CVE/CVE-2022-35612) +- [Live-Hack-CVE/CVE-2022-35646](https://github.com/Live-Hack-CVE/CVE-2022-35646) ### CVE-2022-35721 (2022-09-23) @@ -6730,21 +7088,13 @@ Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from - [Live-Hack-CVE/CVE-2022-35761](https://github.com/Live-Hack-CVE/CVE-2022-35761) -### CVE-2022-35770 (2022-10-11) +### CVE-2022-35823 (2022-09-13) -Windows NTLM Spoofing Vulnerability. +Microsoft SharePoint Remote Code Execution Vulnerability. -- [Live-Hack-CVE/CVE-2022-35770](https://github.com/Live-Hack-CVE/CVE-2022-35770) - -### CVE-2022-35829 (2022-10-11) - - -Service Fabric Explorer Spoofing Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-35829](https://github.com/Live-Hack-CVE/CVE-2022-35829) +- [Live-Hack-CVE/CVE-2022-35823](https://github.com/Live-Hack-CVE/CVE-2022-35823) ### CVE-2022-35888 (2022-09-28) @@ -6826,14 +7176,6 @@ Rizin is a UNIX-like reverse engineering framework and command-line toolset. Ver - [Live-Hack-CVE/CVE-2022-36044](https://github.com/Live-Hack-CVE/CVE-2022-36044) -### CVE-2022-36063 (2022-10-10) - - -Azure RTOS USBx is a USB host, device, and on-the-go (OTG) embedded stack, fully integrated with Azure RTOS ThreadX and available for all Azure RTOS ThreadX–supported processors. Azure RTOS USBX implementation of host support for USB CDC ECM includes an integer underflow and a buffer overflow in the `_ux_host_class_cdc_ecm_mac_address_get` function which may be potentially exploited to achieve remote code execution or denial of service. Setting mac address string descriptor length to a `0` or `1` allows an attacker to introduce an integer underflow followed (string_length) by a buffer overflow of the `cdc_ecm -> ux_host_class_cdc_ecm_node_id` array. This may allow one to redirect the code execution flow or introduce a denial of service. The fix has been included in USBX release [6.1.12](https://github.com/azure-rtos/usbx/releases/tag/v6.1.12_rel). Improved mac address string descriptor length validation to check for unexpectedly small values may be used as a workaround. - - -- [Live-Hack-CVE/CVE-2022-36063](https://github.com/Live-Hack-CVE/CVE-2022-36063) - ### CVE-2022-36066 (2022-09-29) @@ -6850,6 +7192,62 @@ Discourse is an open source discussion platform. In versions prior to 2.8.9 on t - [Live-Hack-CVE/CVE-2022-36068](https://github.com/Live-Hack-CVE/CVE-2022-36068) +### CVE-2022-36314 (2022-12-22) + + +When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.<br>This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1. + + +- [Live-Hack-CVE/CVE-2022-36314](https://github.com/Live-Hack-CVE/CVE-2022-36314) + +### CVE-2022-36315 (2022-12-22) + + +When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox < 103. + + +- [Live-Hack-CVE/CVE-2022-36315](https://github.com/Live-Hack-CVE/CVE-2022-36315) + +### CVE-2022-36316 (2022-12-22) + + +When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox < 103. + + +- [Live-Hack-CVE/CVE-2022-36316](https://github.com/Live-Hack-CVE/CVE-2022-36316) + +### CVE-2022-36317 (2022-12-22) + + +When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service.<br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 103. + + +- [Live-Hack-CVE/CVE-2022-36317](https://github.com/Live-Hack-CVE/CVE-2022-36317) + +### CVE-2022-36318 (2022-12-22) + + +When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12. + + +- [Live-Hack-CVE/CVE-2022-36318](https://github.com/Live-Hack-CVE/CVE-2022-36318) + +### CVE-2022-36319 (2022-12-22) + + +When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12. + + +- [Live-Hack-CVE/CVE-2022-36319](https://github.com/Live-Hack-CVE/CVE-2022-36319) + +### CVE-2022-36320 (2022-12-22) + + +Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 103. + + +- [Live-Hack-CVE/CVE-2022-36320](https://github.com/Live-Hack-CVE/CVE-2022-36320) + ### CVE-2022-36338 (2022-09-23) @@ -6858,37 +7256,13 @@ An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. An SMM - [Live-Hack-CVE/CVE-2022-36338](https://github.com/Live-Hack-CVE/CVE-2022-36338) -### CVE-2022-36360 (2022-10-11) +### CVE-2022-36354 (2022-12-22) -A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Affected devices load firmware updates without checking the authenticity. Furthermore the integrity of the unencrypted firmware is only verified by a non-cryptographic method. This could allow an attacker to manipulate a firmware update and flash it to the device. +A heap out-of-bounds read vulnerability exists in the RLA format parser of OpenImageIO master-branch-9aeece7a and v2.3.19.0. More specifically, in the way run-length encoded byte spans are handled. A malformed RLA file can lead to an out-of-bounds read of heap metadata which can result in sensitive information leak. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-36360](https://github.com/Live-Hack-CVE/CVE-2022-36360) - -### CVE-2022-36361 (2022-10-11) - - -A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). Affected devices do not properly validate the structure of TCP packets in several methods. This could allow an attacker to cause buffer overflows, get control over the instruction counter and run custom code. - - -- [Live-Hack-CVE/CVE-2022-36361](https://github.com/Live-Hack-CVE/CVE-2022-36361) - -### CVE-2022-36362 (2022-10-11) - - -A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). Affected devices do not conduct certain validations when interacting with them. This could allow an unauthenticated remote attacker to manipulate the devices IP address, which means the device would not be reachable and could only be recovered by power cycling the device. - - -- [Live-Hack-CVE/CVE-2022-36362](https://github.com/Live-Hack-CVE/CVE-2022-36362) - -### CVE-2022-36363 (2022-10-11) - - -A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions). Affected devices do not properly validate an offset value which can be defined in TCP packets when calling a method. This could allow an attacker to retrieve parts of the content of the memory. - - -- [Live-Hack-CVE/CVE-2022-36363](https://github.com/Live-Hack-CVE/CVE-2022-36363) +- [Live-Hack-CVE/CVE-2022-36354](https://github.com/Live-Hack-CVE/CVE-2022-36354) ### CVE-2022-36446 (2022-07-25) @@ -6954,14 +7328,6 @@ IBM InfoSphere Information Server 11.7 could allow an authenticated user to obta - [Live-Hack-CVE/CVE-2022-36772](https://github.com/Live-Hack-CVE/CVE-2022-36772) -### CVE-2022-36774 (2022-10-06) - - -IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 is vulnerable to man in the middle attacks through manipulation of the client proxy configuration. IBM X-Force ID: 233575. - - -- [Live-Hack-CVE/CVE-2022-36774](https://github.com/Live-Hack-CVE/CVE-2022-36774) - ### CVE-2022-36868 (2022-10-07) @@ -6986,14 +7352,6 @@ Chipolo ONE Bluetooth tracker (2020) Chipolo iOS app version 4.13.0 is vulnerabl - [Live-Hack-CVE/CVE-2022-37193](https://github.com/Live-Hack-CVE/CVE-2022-37193) -### CVE-2022-37208 (2022-10-13) - - -JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection. - - -- [Live-Hack-CVE/CVE-2022-37208](https://github.com/Live-Hack-CVE/CVE-2022-37208) - ### CVE-2022-37209 (2022-09-27) @@ -7034,38 +7392,6 @@ Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because - [Live-Hack-CVE/CVE-2022-37451](https://github.com/Live-Hack-CVE/CVE-2022-37451) -### CVE-2022-37609 (2022-10-11) - - -Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js. - - -- [Live-Hack-CVE/CVE-2022-37609](https://github.com/Live-Hack-CVE/CVE-2022-37609) - -### CVE-2022-37611 (2022-10-11) - - -Prototype pollution vulnerability in tschaub gh-pages 3.1.0 via the partial variable in util.js. - - -- [Live-Hack-CVE/CVE-2022-37611](https://github.com/Live-Hack-CVE/CVE-2022-37611) - -### CVE-2022-37614 (2022-10-12) - - -Prototype pollution vulnerability in function enable in mockery.js in mfncooper mockery commit 822f0566fd6d72af8c943ae5ca2aa92e516aa2cf via the key variable in mockery.js. - - -- [Live-Hack-CVE/CVE-2022-37614](https://github.com/Live-Hack-CVE/CVE-2022-37614) - -### CVE-2022-37617 (2022-10-11) - - -Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the k variable in resolve-shims.js. - - -- [Live-Hack-CVE/CVE-2022-37617](https://github.com/Live-Hack-CVE/CVE-2022-37617) - ### CVE-2022-37703 (2022-09-13) @@ -7082,245 +7408,21 @@ graphql-java before19.0 is vulnerable to Denial of Service. An attacker can send - [Live-Hack-CVE/CVE-2022-37734](https://github.com/Live-Hack-CVE/CVE-2022-37734) -### CVE-2022-37864 (2022-10-11) +### CVE-2022-37832 (2022-12-16) -A vulnerability has been identified in Solid Edge (All Versions < SE2022MP9). The affected application contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17627) +Mutiny 7.2.0-10788 suffers from Hardcoded root password. -- [Live-Hack-CVE/CVE-2022-37864](https://github.com/Live-Hack-CVE/CVE-2022-37864) +- [Live-Hack-CVE/CVE-2022-37832](https://github.com/Live-Hack-CVE/CVE-2022-37832) -### CVE-2022-37965 (2022-10-11) +### CVE-2022-37972 (2022-09-20) -Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability. +Microsoft Endpoint Configuration Manager Spoofing Vulnerability. -- [Live-Hack-CVE/CVE-2022-37965](https://github.com/Live-Hack-CVE/CVE-2022-37965) - -### CVE-2022-37968 (2022-10-11) - - -Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37968](https://github.com/Live-Hack-CVE/CVE-2022-37968) - -### CVE-2022-37970 (2022-10-11) - - -Windows DWM Core Library Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37970](https://github.com/Live-Hack-CVE/CVE-2022-37970) - -### CVE-2022-37971 (2022-10-11) - - -Microsoft Windows Defender Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37971](https://github.com/Live-Hack-CVE/CVE-2022-37971) - -### CVE-2022-37974 (2022-10-11) - - -Windows Mixed Reality Developer Tools Information Disclosure Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37974](https://github.com/Live-Hack-CVE/CVE-2022-37974) - -### CVE-2022-37976 (2022-10-11) - - -Active Directory Certificate Services Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37976](https://github.com/Live-Hack-CVE/CVE-2022-37976) - -### CVE-2022-37977 (2022-10-11) - - -Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37977](https://github.com/Live-Hack-CVE/CVE-2022-37977) - -### CVE-2022-37978 (2022-10-11) - - -Windows Active Directory Certificate Services Security Feature Bypass. - - -- [Live-Hack-CVE/CVE-2022-37978](https://github.com/Live-Hack-CVE/CVE-2022-37978) - -### CVE-2022-37979 (2022-10-11) - - -Windows Hyper-V Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37979](https://github.com/Live-Hack-CVE/CVE-2022-37979) - -### CVE-2022-37980 (2022-10-11) - - -Windows DHCP Client Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37980](https://github.com/Live-Hack-CVE/CVE-2022-37980) - -### CVE-2022-37981 (2022-10-11) - - -Windows Event Logging Service Denial of Service Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37981](https://github.com/Live-Hack-CVE/CVE-2022-37981) - -### CVE-2022-37982 (2022-10-11) - - -Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38031. - - -- [Live-Hack-CVE/CVE-2022-37982](https://github.com/Live-Hack-CVE/CVE-2022-37982) - -### CVE-2022-37983 (2022-10-11) - - -Microsoft DWM Core Library Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37983](https://github.com/Live-Hack-CVE/CVE-2022-37983) - -### CVE-2022-37984 (2022-10-11) - - -Windows WLAN Service Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37984](https://github.com/Live-Hack-CVE/CVE-2022-37984) - -### CVE-2022-37985 (2022-10-11) - - -Windows Graphics Component Information Disclosure Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37985](https://github.com/Live-Hack-CVE/CVE-2022-37985) - -### CVE-2022-37986 (2022-10-11) - - -Windows Win32k Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37986](https://github.com/Live-Hack-CVE/CVE-2022-37986) - -### CVE-2022-37987 (2022-10-11) - - -Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37989. - - -- [Live-Hack-CVE/CVE-2022-37987](https://github.com/Live-Hack-CVE/CVE-2022-37987) - -### CVE-2022-37989 (2022-10-11) - - -Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37987. - - -- [Live-Hack-CVE/CVE-2022-37989](https://github.com/Live-Hack-CVE/CVE-2022-37989) - -### CVE-2022-37990 (2022-10-11) - - -Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039. - - -- [Live-Hack-CVE/CVE-2022-37990](https://github.com/Live-Hack-CVE/CVE-2022-37990) - -### CVE-2022-37993 (2022-10-11) - - -Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37994, CVE-2022-37999. - - -- [Live-Hack-CVE/CVE-2022-37993](https://github.com/Live-Hack-CVE/CVE-2022-37993) - -### CVE-2022-37994 (2022-10-11) - - -Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37993, CVE-2022-37999. - - -- [Live-Hack-CVE/CVE-2022-37994](https://github.com/Live-Hack-CVE/CVE-2022-37994) - -### CVE-2022-37995 (2022-10-11) - - -Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039. - - -- [Live-Hack-CVE/CVE-2022-37995](https://github.com/Live-Hack-CVE/CVE-2022-37995) - -### CVE-2022-37996 (2022-10-11) - - -Windows Kernel Memory Information Disclosure Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-37996](https://github.com/Live-Hack-CVE/CVE-2022-37996) - -### CVE-2022-37997 (2022-10-11) - - -Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-38051. - - -- [Live-Hack-CVE/CVE-2022-37997](https://github.com/Live-Hack-CVE/CVE-2022-37997) - -### CVE-2022-37998 (2022-10-11) - - -Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37973. - - -- [Live-Hack-CVE/CVE-2022-37998](https://github.com/Live-Hack-CVE/CVE-2022-37998) - -### CVE-2022-37999 (2022-10-11) - - -Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37993, CVE-2022-37994. - - -- [Live-Hack-CVE/CVE-2022-37999](https://github.com/Live-Hack-CVE/CVE-2022-37999) - -### CVE-2022-38000 (2022-10-11) - - -Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38047, CVE-2022-41081. - - -- [Live-Hack-CVE/CVE-2022-38000](https://github.com/Live-Hack-CVE/CVE-2022-38000) - -### CVE-2022-38001 (2022-10-11) - - -Microsoft Office Spoofing Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38001](https://github.com/Live-Hack-CVE/CVE-2022-38001) - -### CVE-2022-38003 (2022-10-11) - - -Windows Resilient File System Elevation of Privilege. - - -- [Live-Hack-CVE/CVE-2022-38003](https://github.com/Live-Hack-CVE/CVE-2022-38003) +- [Live-Hack-CVE/CVE-2022-37972](https://github.com/Live-Hack-CVE/CVE-2022-37972) ### CVE-2022-38012 (2022-09-13) @@ -7330,182 +7432,6 @@ Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. - [Live-Hack-CVE/CVE-2022-38012](https://github.com/Live-Hack-CVE/CVE-2022-38012) -### CVE-2022-38016 (2022-10-11) - - -Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38016](https://github.com/Live-Hack-CVE/CVE-2022-38016) - -### CVE-2022-38017 (2022-10-11) - - -StorSimple 8000 Series Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38017](https://github.com/Live-Hack-CVE/CVE-2022-38017) - -### CVE-2022-38021 (2022-10-11) - - -Connected User Experiences and Telemetry Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38021](https://github.com/Live-Hack-CVE/CVE-2022-38021) - -### CVE-2022-38025 (2022-10-11) - - -Windows Distributed File System (DFS) Information Disclosure Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38025](https://github.com/Live-Hack-CVE/CVE-2022-38025) - -### CVE-2022-38026 (2022-10-11) - - -Windows DHCP Client Information Disclosure Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38026](https://github.com/Live-Hack-CVE/CVE-2022-38026) - -### CVE-2022-38027 (2022-10-11) - - -Windows Storage Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38027](https://github.com/Live-Hack-CVE/CVE-2022-38027) - -### CVE-2022-38028 (2022-10-11) - - -Windows Print Spooler Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38028](https://github.com/Live-Hack-CVE/CVE-2022-38028) - -### CVE-2022-38029 (2022-10-11) - - -Windows ALPC Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38029](https://github.com/Live-Hack-CVE/CVE-2022-38029) - -### CVE-2022-38030 (2022-10-11) - - -Windows USB Serial Driver Information Disclosure Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38030](https://github.com/Live-Hack-CVE/CVE-2022-38030) - -### CVE-2022-38031 (2022-10-11) - - -Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-37982. - - -- [Live-Hack-CVE/CVE-2022-38031](https://github.com/Live-Hack-CVE/CVE-2022-38031) - -### CVE-2022-38033 (2022-10-11) - - -Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38033](https://github.com/Live-Hack-CVE/CVE-2022-38033) - -### CVE-2022-38036 (2022-10-11) - - -Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38036](https://github.com/Live-Hack-CVE/CVE-2022-38036) - -### CVE-2022-38039 (2022-10-11) - - -Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038. - - -- [Live-Hack-CVE/CVE-2022-38039](https://github.com/Live-Hack-CVE/CVE-2022-38039) - -### CVE-2022-38040 (2022-10-11) - - -Microsoft ODBC Driver Remote Code Execution Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38040](https://github.com/Live-Hack-CVE/CVE-2022-38040) - -### CVE-2022-38041 (2022-10-11) - - -Windows Secure Channel Denial of Service Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38041](https://github.com/Live-Hack-CVE/CVE-2022-38041) - -### CVE-2022-38044 (2022-10-11) - - -Windows CD-ROM File System Driver Remote Code Execution Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38044](https://github.com/Live-Hack-CVE/CVE-2022-38044) - -### CVE-2022-38047 (2022-10-11) - - -Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-41081. - - -- [Live-Hack-CVE/CVE-2022-38047](https://github.com/Live-Hack-CVE/CVE-2022-38047) - -### CVE-2022-38048 (2022-10-11) - - -Microsoft Office Remote Code Execution Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38048](https://github.com/Live-Hack-CVE/CVE-2022-38048) - -### CVE-2022-38049 (2022-10-11) - - -Microsoft Office Graphics Remote Code Execution Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38049](https://github.com/Live-Hack-CVE/CVE-2022-38049) - -### CVE-2022-38050 (2022-10-11) - - -Win32k Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-38050](https://github.com/Live-Hack-CVE/CVE-2022-38050) - -### CVE-2022-38051 (2022-10-11) - - -Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37997. - - -- [Live-Hack-CVE/CVE-2022-38051](https://github.com/Live-Hack-CVE/CVE-2022-38051) - -### CVE-2022-38053 (2022-10-11) - - -Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41036, CVE-2022-41037, CVE-2022-41038. - - -- [Live-Hack-CVE/CVE-2022-38053](https://github.com/Live-Hack-CVE/CVE-2022-38053) - ### CVE-2022-38061 (2022-09-23) @@ -7514,13 +7440,13 @@ Authenticated (author+) CSV Injection vulnerability in Export Post Info plugin & - [Live-Hack-CVE/CVE-2022-38061](https://github.com/Live-Hack-CVE/CVE-2022-38061) -### CVE-2022-38086 (2022-10-11) +### CVE-2022-38143 (2022-12-22) -Cross-Site Request Forgery (CSRF) vulnerability in Shortcodes Ultimate plugin <= 5.12.0 at WordPress leading to plugin preset settings change. +A heap out-of-bounds write vulnerability exists in the way OpenImageIO v2.3.19.0 processes RLE encoded BMP images. A specially-crafted bmp file can write to arbitrary out of bounds memory, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-38086](https://github.com/Live-Hack-CVE/CVE-2022-38086) +- [Live-Hack-CVE/CVE-2022-38143](https://github.com/Live-Hack-CVE/CVE-2022-38143) ### CVE-2022-38170 (2022-09-02) @@ -7546,13 +7472,61 @@ Vtiger CRM v7.4.0 was discovered to contain a stored cross-site scripting (XSS) - [Live-Hack-CVE/CVE-2022-38335](https://github.com/Live-Hack-CVE/CVE-2022-38335) -### CVE-2022-38388 (2022-10-11) +### CVE-2022-38472 (2022-12-22) -IBM Navigator Mobile Android 3.4.1.1 and 3.4.1.2 app could allow a local user to obtain sensitive information due to improper access control. IBM X-Force ID: 233968. +An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104. -- [Live-Hack-CVE/CVE-2022-38388](https://github.com/Live-Hack-CVE/CVE-2022-38388) +- [Live-Hack-CVE/CVE-2022-38472](https://github.com/Live-Hack-CVE/CVE-2022-38472) + +### CVE-2022-38473 (2022-12-22) + + +A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access). This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104. + + +- [Live-Hack-CVE/CVE-2022-38473](https://github.com/Live-Hack-CVE/CVE-2022-38473) + +### CVE-2022-38474 (2022-12-22) + + +A website that had permission to access the microphone could record audio without the audio notification being shown. This bug does not allow the attacker to bypass the permission prompt - it only affects the notification shown once permission has been granted.<br />*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 104. + + +- [Live-Hack-CVE/CVE-2022-38474](https://github.com/Live-Hack-CVE/CVE-2022-38474) + +### CVE-2022-38475 (2022-12-22) + + +An attacker could have written a value to the first element in a zero-length JavaScript array. Although the array was zero-length, the value was not written to an invalid memory address. This vulnerability affects Firefox < 104. + + +- [Live-Hack-CVE/CVE-2022-38475](https://github.com/Live-Hack-CVE/CVE-2022-38475) + +### CVE-2022-38476 (2022-12-22) + + +A data race could occur in the <code>PK11_ChangePW</code> function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR < 102.2 and Thunderbird < 102.2. + + +- [Live-Hack-CVE/CVE-2022-38476](https://github.com/Live-Hack-CVE/CVE-2022-38476) + +### CVE-2022-38477 (2022-12-22) + + +Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.2, Thunderbird < 102.2, and Firefox < 104. + + +- [Live-Hack-CVE/CVE-2022-38477](https://github.com/Live-Hack-CVE/CVE-2022-38477) + +### CVE-2022-38478 (2022-12-22) + + +Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104. + + +- [Live-Hack-CVE/CVE-2022-38478](https://github.com/Live-Hack-CVE/CVE-2022-38478) ### CVE-2022-38539 (2022-09-13) @@ -7578,6 +7552,14 @@ Academy Learning Management System before v5.9.1 was discovered to contain a ref - [Live-Hack-CVE/CVE-2022-38553](https://github.com/Live-Hack-CVE/CVE-2022-38553) +### CVE-2022-38658 (2022-12-22) + + +BigFix deployments that have installed the Notification Service on Windows are susceptible to disclosing SMTP BigFix operator's sensitive data in clear text. Operators who use Notification Service related content from BES Support are at risk of leaving their SMTP sensitive data exposed. + + +- [Live-Hack-CVE/CVE-2022-38658](https://github.com/Live-Hack-CVE/CVE-2022-38658) + ### CVE-2022-38699 (2022-09-27) @@ -7586,14 +7568,6 @@ Armoury Crate Service’s logging function has insufficient validation to check - [Live-Hack-CVE/CVE-2022-38699](https://github.com/Live-Hack-CVE/CVE-2022-38699) -### CVE-2022-38709 (2022-10-06) - - -IBM Robotic Process Automation 21.0.1, 21.0.2, and 21.0.3 for Cloud Pak is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 234291. - - -- [Live-Hack-CVE/CVE-2022-38709](https://github.com/Live-Hack-CVE/CVE-2022-38709) - ### CVE-2022-38732 (2022-09-29) @@ -7634,6 +7608,22 @@ Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Ser - [Live-Hack-CVE/CVE-2022-38752](https://github.com/Live-Hack-CVE/CVE-2022-38752) +### CVE-2022-38756 (2022-12-16) + + +A vulnerability has been identified in Micro Focus GroupWise Web in versions prior to 18.4.2. The GW Web component makes a request to the Post Office Agent that contains sensitive information in the query parameters that could be logged by any intervening HTTP proxies. + + +- [Live-Hack-CVE/CVE-2022-38756](https://github.com/Live-Hack-CVE/CVE-2022-38756) + +### CVE-2022-38757 (2022-12-23) + + +A vulnerability has been identified in Micro Focus ZENworks 2020 Update 3a and prior versions. This vulnerability allows administrators with rights to perform actions (e.g., install a bundle) on a set of managed devices, to be able to exercise these rights on managed devices in the ZENworks zone but which are outside the scope of the administrator. This vulnerability does not result in the administrators gaining additional rights on the managed devices, either in the scope or outside the scope of the administrator. + + +- [Live-Hack-CVE/CVE-2022-38757](https://github.com/Live-Hack-CVE/CVE-2022-38757) + ### CVE-2022-38817 (2022-10-03) @@ -7674,22 +7664,6 @@ DOM-based cross-site scripting vulnerability in EC-CUBE 4 series (EC-CUBE 4.0.0 - [Live-Hack-CVE/CVE-2022-38975](https://github.com/Live-Hack-CVE/CVE-2022-38975) -### CVE-2022-39013 (2022-10-11) - - -Under certain conditions an authenticated attacker can get access to OS credentials. Getting access to OS credentials enables the attacker to modify system data and make the system unavailable leading to high impact on confidentiality and low impact on integrity and availability of the application. - - -- [Live-Hack-CVE/CVE-2022-39013](https://github.com/Live-Hack-CVE/CVE-2022-39013) - -### CVE-2022-39015 (2022-10-11) - - -Under certain conditions, BOE AdminTools/ BOE SDK allows an attacker to access information which would otherwise be restricted. - - -- [Live-Hack-CVE/CVE-2022-39015](https://github.com/Live-Hack-CVE/CVE-2022-39015) - ### CVE-2022-39029 (2022-09-27) @@ -7754,6 +7728,22 @@ Cowell enterprise travel management system has insufficient filtering for specia - [Live-Hack-CVE/CVE-2022-39054](https://github.com/Live-Hack-CVE/CVE-2022-39054) +### CVE-2022-39164 (2022-12-23) + + +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 235181. + + +- [Live-Hack-CVE/CVE-2022-39164](https://github.com/Live-Hack-CVE/CVE-2022-39164) + +### CVE-2022-39165 (2022-12-23) + + +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in CAA to cause a denial of service. IBM X-Force ID: 235183. + + +- [Live-Hack-CVE/CVE-2022-39165](https://github.com/Live-Hack-CVE/CVE-2022-39165) + ### CVE-2022-39168 (2022-09-29) @@ -7922,14 +7912,6 @@ isolated-vm is a library for nodejs which gives the user access to v8's Isolate - [Live-Hack-CVE/CVE-2022-39266](https://github.com/Live-Hack-CVE/CVE-2022-39266) -### CVE-2022-39271 (2022-10-11) - - -Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that assists in deploying microservices. There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service. There has been a patch released in versions 2.8.8 and 2.9.0-rc5. There are currently no known workarounds. - - -- [Live-Hack-CVE/CVE-2022-39271](https://github.com/Live-Hack-CVE/CVE-2022-39271) - ### CVE-2022-39279 (2022-10-06) @@ -7970,14 +7952,6 @@ tiny-csrf is a Node.js cross site request forgery (CSRF) protection middleware. - [Live-Hack-CVE/CVE-2022-39287](https://github.com/Live-Hack-CVE/CVE-2022-39287) -### CVE-2022-39288 (2022-10-10) - - -fastify is a fast and low overhead web framework, for Node.js. Affected versions of fastify are subject to a denial of service via malicious use of the Content-Type header. An attacker can send an invalid Content-Type header that can cause the application to crash. This issue has been addressed in commit `fbb07e8d` and will be included in release version 4.8.1. Users are advised to upgrade. Users unable to upgrade may manually filter out http content with malicious Content-Type headers. - - -- [Live-Hack-CVE/CVE-2022-39288](https://github.com/Live-Hack-CVE/CVE-2022-39288) - ### CVE-2022-39289 (2022-10-07) @@ -8010,38 +7984,6 @@ Slack Morphism is a modern client library for Slack Web/Events API/Socket Mode a - [Live-Hack-CVE/CVE-2022-39292](https://github.com/Live-Hack-CVE/CVE-2022-39292) -### CVE-2022-39296 (2022-10-11) - - -MelisAssetManager provides deliveries of Melis Platform's assets located in every module's public folder. Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. This issue was addressed by restricting access to files to intended directories only. - - -- [Live-Hack-CVE/CVE-2022-39296](https://github.com/Live-Hack-CVE/CVE-2022-39296) - -### CVE-2022-39297 (2022-10-12) - - -MelisCms provides a full CMS for Melis Platform, including templating system, drag'n'drop of plugins, SEO and many administration tools. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-cms`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-cms` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data. - - -- [Live-Hack-CVE/CVE-2022-39297](https://github.com/Live-Hack-CVE/CVE-2022-39297) - -### CVE-2022-39298 (2022-10-12) - - -MelisFront is the engine that displays website hosted on Melis Platform. It deals with showing pages, plugins, URL rewritting, search optimization and SEO, etc. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data. - - -- [Live-Hack-CVE/CVE-2022-39298](https://github.com/Live-Hack-CVE/CVE-2022-39298) - -### CVE-2022-39300 (2022-10-13) - - -node SAML is a SAML 2.0 library based on the SAML implementation of passport-saml. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to node-saml version 4.0.0-beta5 or newer. Disabling SAML authentication may be done as a workaround. - - -- [Live-Hack-CVE/CVE-2022-39300](https://github.com/Live-Hack-CVE/CVE-2022-39300) - ### CVE-2022-39799 (2022-09-13) @@ -8050,54 +7992,6 @@ An attacker with no prior authentication could craft and send malicious script t - [Live-Hack-CVE/CVE-2022-39799](https://github.com/Live-Hack-CVE/CVE-2022-39799) -### CVE-2022-39803 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated ACIS Part and Assembly (.sat, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-39803](https://github.com/Live-Hack-CVE/CVE-2022-39803) - -### CVE-2022-39804 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated SolidWorks Part (.sldprt, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-39804](https://github.com/Live-Hack-CVE/CVE-2022-39804) - -### CVE-2022-39805 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Computer Graphics Metafile (.cgm, CgmTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-39805](https://github.com/Live-Hack-CVE/CVE-2022-39805) - -### CVE-2022-39806 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated SolidWorks Drawing (.slddrw, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-39806](https://github.com/Live-Hack-CVE/CVE-2022-39806) - -### CVE-2022-39807 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated SolidWorks Drawing (.sldasm, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-39807](https://github.com/Live-Hack-CVE/CVE-2022-39807) - -### CVE-2022-39808 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-39808](https://github.com/Live-Hack-CVE/CVE-2022-39808) - ### CVE-2022-39817 (2022-09-13) @@ -8218,46 +8112,6 @@ Implicit intent hijacking vulnerability in UPHelper library prior to version 3.0 - [Live-Hack-CVE/CVE-2022-39859](https://github.com/Live-Hack-CVE/CVE-2022-39859) -### CVE-2022-39860 (2022-10-07) - - -Improper access control vulnerability in QuickShare prior to version 13.2.3.5 allows attackers to access sensitive information via implicit broadcast. - - -- [Live-Hack-CVE/CVE-2022-39860](https://github.com/Live-Hack-CVE/CVE-2022-39860) - -### CVE-2022-39861 (2022-10-07) - - -Unprotected Receiver in AtBroadcastReceiver in FactoryCamera prior to version 3.5.51 allows attackers to record video without camera privilege. - - -- [Live-Hack-CVE/CVE-2022-39861](https://github.com/Live-Hack-CVE/CVE-2022-39861) - -### CVE-2022-39862 (2022-10-07) - - -Improper authorization in Dynamic Lockscreen prior to SMR Sep-2022 Release 1 in Android R(11) and 3.3.03.66 in Android S(12) allows unauthorized use of javascript interface api. - - -- [Live-Hack-CVE/CVE-2022-39862](https://github.com/Live-Hack-CVE/CVE-2022-39862) - -### CVE-2022-39863 (2022-10-07) - - -Intent redirection vulnerability in Samsung Account prior to version 13.5.01.3 allows attackers to access content providers without permission. - - -- [Live-Hack-CVE/CVE-2022-39863](https://github.com/Live-Hack-CVE/CVE-2022-39863) - -### CVE-2022-39864 (2022-10-07) - - -Improper access control vulnerability in WifiSetupLaunchHelper in SmartThings prior to version 1.7.89.25 allows attackers to access sensitive information via implicit intent. - - -- [Live-Hack-CVE/CVE-2022-39864](https://github.com/Live-Hack-CVE/CVE-2022-39864) - ### CVE-2022-39865 (2022-10-07) @@ -8386,6 +8240,14 @@ A cross-site scripting (XSS) vulnerability in Centreon 22.04.0 allows attackers - [Live-Hack-CVE/CVE-2022-39988](https://github.com/Live-Hack-CVE/CVE-2022-39988) +### CVE-2022-40011 (2022-12-23) + + +Cross Site Scripting (XSS) vulnerability in typora through 1.38 allows remote attackers to run arbitrary code via export from editor. + + +- [Live-Hack-CVE/CVE-2022-40011](https://github.com/Live-Hack-CVE/CVE-2022-40011) + ### CVE-2022-40043 (2022-09-26) @@ -8402,14 +8264,6 @@ Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulner - [Live-Hack-CVE/CVE-2022-40044](https://github.com/Live-Hack-CVE/CVE-2022-40044) -### CVE-2022-40047 (2022-10-11) - - -Flatpress v1.2.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the page parameter at /flatpress/admin.php. - - -- [Live-Hack-CVE/CVE-2022-40047](https://github.com/Live-Hack-CVE/CVE-2022-40047) - ### CVE-2022-40048 (2022-09-28) @@ -8554,77 +8408,13 @@ An integer conversion error in Hermes bytecode generation, prior to commit 6aa82 - [Live-Hack-CVE/CVE-2022-40138](https://github.com/Live-Hack-CVE/CVE-2022-40138) -### CVE-2022-40147 (2022-10-11) +### CVE-2022-40149 (2022-09-16) -A vulnerability has been identified in Industrial Edge Management (All versions < V1.5.1). The affected software does not properly validate the server certificate when initiating a TLS connection. This could allow an attacker to spoof a trusted entity by interfering in the communication path between the client and the intended server. +Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. -- [Live-Hack-CVE/CVE-2022-40147](https://github.com/Live-Hack-CVE/CVE-2022-40147) - -### CVE-2022-40176 (2022-10-11) - - -A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). There exists an Improper Neutralization of Special Elements used in an OS Command with root privileges during a restore operation due to the missing validation of the names of files included in the input package. By restoring a specifically crafted package, a remote low-privileged attacker can execute arbitrary system commands with root privileges on the device, leading to a full compromise. - - -- [Live-Hack-CVE/CVE-2022-40176](https://github.com/Live-Hack-CVE/CVE-2022-40176) - -### CVE-2022-40177 (2022-10-11) - - -A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). Endpoints of the “Operation” web application that interpret and execute Axon language queries allow file read access to the device file system with root privileges. By supplying specific I/O related Axon queries, a remote low-privileged attacker can read sensitive files on the device. - - -- [Live-Hack-CVE/CVE-2022-40177](https://github.com/Live-Hack-CVE/CVE-2022-40177) - -### CVE-2022-40178 (2022-10-11) - - -A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). Improper Neutralization of Input During Web Page Generation exists in the “Import Files“ functionality of the “Operation” web application, due to the missing validation of the titles of files included in the input package. By uploading a specifically crafted graphics package, a remote low-privileged attacker can execute arbitrary JavaScript code. - - -- [Live-Hack-CVE/CVE-2022-40178](https://github.com/Live-Hack-CVE/CVE-2022-40178) - -### CVE-2022-40179 (2022-10-11) - - -A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). A Cross-Site Request Forgery exists in endpoints of the “Operation” web application that interpret and execute Axon language queries, due to the missing validation of anti-CSRF tokens or other origin checks. By convincing a victim to click on a malicious link or visit a specifically crafted webpage while logged-in to the device web application, a remote unauthenticated attacker can execute arbitrary Axon queries against the device. - - -- [Live-Hack-CVE/CVE-2022-40179](https://github.com/Live-Hack-CVE/CVE-2022-40179) - -### CVE-2022-40180 (2022-10-11) - - -A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). A Cross-Site Request Forgery exists in the “Import Files“ functionality of the “Operation” web application due to the missing validation of anti-CSRF tokens or other origin checks. A remote unauthenticated attacker can upload and enable permanent arbitrary JavaScript code into the device just by convincing a victim to visit a specifically crafted webpage while logged-in to the device web application. - - -- [Live-Hack-CVE/CVE-2022-40180](https://github.com/Live-Hack-CVE/CVE-2022-40180) - -### CVE-2022-40181 (2022-10-11) - - -A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded browser does not prevent interaction with alternative URI schemes when redirected to corresponding resources by web application code. By setting the homepage URI, the favorite URIs, or redirecting embedded browser users via JavaScript code to alternative scheme resources, a remote low privileged attacker can perform a range of attacks against the device, such as read arbitrary files on the filesystem, execute arbitrary JavaScript code in order to steal or manipulate the information on the screen, or trigger denial of service conditions. - - -- [Live-Hack-CVE/CVE-2022-40181](https://github.com/Live-Hack-CVE/CVE-2022-40181) - -### CVE-2022-40182 (2022-10-11) - - -A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). The device embedded Chromium-based browser is launched as root with the “--no-sandbox” option. Attackers can add arbitrary JavaScript code inside “Operation” graphics and successfully exploit any number of publicly known vulnerabilities against the version of the embedded Chromium-based browser. - - -- [Live-Hack-CVE/CVE-2022-40182](https://github.com/Live-Hack-CVE/CVE-2022-40182) - -### CVE-2022-40187 (2022-10-12) - - -Foresight GC3 Launch Monitor 1.3.15.68 ships with a Target Communication Framework (TCF) service enabled. This service listens on a TCP port on all interfaces and allows for process debugging, file system modification, and terminal access as the root user. In conjunction with a hosted wireless access point and the known passphrase of FSSPORTS, an attacker could use this service to modify a device and steal intellectual property. - - -- [Live-Hack-CVE/CVE-2022-40187](https://github.com/Live-Hack-CVE/CVE-2022-40187) +- [Live-Hack-CVE/CVE-2022-40149](https://github.com/Live-Hack-CVE/CVE-2022-40149) ### CVE-2022-40199 (2022-09-26) @@ -8634,21 +8424,13 @@ Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p - [Live-Hack-CVE/CVE-2022-40199](https://github.com/Live-Hack-CVE/CVE-2022-40199) -### CVE-2022-40226 (2022-10-11) +### CVE-2022-40233 (2022-12-23) -A vulnerability has been identified in SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user's session after login. +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX TCP/IP kernel extension to cause a denial of service. IBM X-Force ID: 235599. -- [Live-Hack-CVE/CVE-2022-40226](https://github.com/Live-Hack-CVE/CVE-2022-40226) - -### CVE-2022-40227 (2022-10-11) - - -A vulnerability has been identified in SIMATIC HMI Comfort Panels (incl. SIPLUS variants) (All versions < V17 Update 4), SIMATIC HMI KTP Mobile Panels (All versions < V17 Update 4), SIMATIC HMI KTP1200 Basic (All versions < V17 Update 5), SIMATIC HMI KTP400 Basic (All versions < V17 Update 5), SIMATIC HMI KTP700 Basic (All versions < V17 Update 5), SIMATIC HMI KTP900 Basic (All versions < V17 Update 5), SIPLUS HMI KTP1200 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP400 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP700 BASIC (All versions < V17 Update 5), SIPLUS HMI KTP900 BASIC (All versions < V17 Update 5). Affected devices do not properly validate input sent to certain services over TCP. This could allow an unauthenticated remote attacker to cause a permanent denial of service condition (requiring a device reboot) by sending specially crafted TCP packets. - - -- [Live-Hack-CVE/CVE-2022-40227](https://github.com/Live-Hack-CVE/CVE-2022-40227) +- [Live-Hack-CVE/CVE-2022-40233](https://github.com/Live-Hack-CVE/CVE-2022-40233) ### CVE-2022-40248 (2022-10-10) @@ -8682,6 +8464,14 @@ An issue was discovered in Samsung TizenRT through 3.0_GBM (and 3.1_PRE). l2_pac - [Live-Hack-CVE/CVE-2022-40279](https://github.com/Live-Hack-CVE/CVE-2022-40279) +### CVE-2022-40284 (2022-11-06) + + +A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device. + + +- [Live-Hack-CVE/CVE-2022-40284](https://github.com/Live-Hack-CVE/CVE-2022-40284) + ### CVE-2022-40313 (2022-09-30) @@ -8802,22 +8592,6 @@ FeehiCMS v2.1.1 was discovered to contain a cross-site scripting (XSS) vulnerabi - [Live-Hack-CVE/CVE-2022-40408](https://github.com/Live-Hack-CVE/CVE-2022-40408) -### CVE-2022-40440 (2022-10-11) - - -mxGraph v4.2.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the setTooltips() function. - - -- [Live-Hack-CVE/CVE-2022-40440](https://github.com/Live-Hack-CVE/CVE-2022-40440) - -### CVE-2022-40468 (2022-09-19) - - -Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function. - - -- [Live-Hack-CVE/CVE-2022-40468](https://github.com/Live-Hack-CVE/CVE-2022-40468) - ### CVE-2022-40472 (2022-09-29) @@ -8866,14 +8640,6 @@ TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) wa - [Live-Hack-CVE/CVE-2022-40486](https://github.com/Live-Hack-CVE/CVE-2022-40486) -### CVE-2022-40494 (2022-10-06) - - -NPS before v0.26.10 was discovered to contain an authentication bypass vulnerability via constantly generating and sending the Auth key and Timestamp parameters. - - -- [Live-Hack-CVE/CVE-2022-40494](https://github.com/Live-Hack-CVE/CVE-2022-40494) - ### CVE-2022-40497 (2022-09-27) @@ -8898,14 +8664,6 @@ This vulnerability exists in Tacitine Firewall, all versions of EN6200-PRIME QUA - [Live-Hack-CVE/CVE-2022-40630](https://github.com/Live-Hack-CVE/CVE-2022-40630) -### CVE-2022-40631 (2022-10-11) - - -A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.0), SCALANCE X201-3P IRT (All versions < V5.5.0), SCALANCE X201-3P IRT PRO (All versions < V5.5.0), SCALANCE X202-2IRT (All versions < V5.5.0), SCALANCE X202-2P IRT (All versions < V5.5.0), SCALANCE X202-2P IRT PRO (All versions < V5.5.0), SCALANCE X204-2 (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X204IRT (All versions < V5.5.0), SCALANCE X204IRT PRO (All versions < V5.5.0), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < V5.5.0), SCALANCE XF202-2P IRT (All versions < V5.5.0), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204-2 (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < V5.5.0), SCALANCE XF204IRT (All versions < V5.5.0), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5), SIPLUS NET SCALANCE X202-2P IRT (All versions < V5.5.0). There is a cross-site scripting vulnerability on the affected devices, that if used by a threat actor, it could result in session hijacking. - - -- [Live-Hack-CVE/CVE-2022-40631](https://github.com/Live-Hack-CVE/CVE-2022-40631) - ### CVE-2022-40707 (2022-09-28) @@ -8962,14 +8720,6 @@ Snyk CLI before 1.996.0 allows arbitrary command execution, affecting Snyk IDE p - [Live-Hack-CVE/CVE-2022-40764](https://github.com/Live-Hack-CVE/CVE-2022-40764) -### CVE-2022-40777 (2022-10-11) - - -Interspire Email Marketer through 6.5.0 allows arbitrary file upload via a surveys_submit.php "create survey and submit survey" operation, which can cause a .php file to be accessible under a /admin/temp/surveys/ URI. NOTE: this issue exists because of an incomplete fix for CVE-2018-19550. - - -- [Live-Hack-CVE/CVE-2022-40777](https://github.com/Live-Hack-CVE/CVE-2022-40777) - ### CVE-2022-40784 (2022-09-26) @@ -9130,14 +8880,6 @@ Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) co - [Live-Hack-CVE/CVE-2022-40868](https://github.com/Live-Hack-CVE/CVE-2022-40868) -### CVE-2022-40871 (2022-10-12) - - -Dolibarr ERP & CRM <=15.0.3 is vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval. - - -- [Live-Hack-CVE/CVE-2022-40871](https://github.com/Live-Hack-CVE/CVE-2022-40871) - ### CVE-2022-40872 (2022-10-07) @@ -9194,6 +8936,30 @@ In certain Nedi products, a vulnerability in the web UI of NeDi login & Comm - [Live-Hack-CVE/CVE-2022-40895](https://github.com/Live-Hack-CVE/CVE-2022-40895) +### CVE-2022-40897 (2022-12-22) + + +An issue discovered in Python Packaging Authority (PyPA) setuptools 65.3.0 and earlier allows remote attackers to cause a denial of service via crafted HTML package or custom PackageIndex page. + + +- [Live-Hack-CVE/CVE-2022-40897](https://github.com/Live-Hack-CVE/CVE-2022-40897) + +### CVE-2022-40898 (2022-12-22) + + +An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli. + + +- [Live-Hack-CVE/CVE-2022-40898](https://github.com/Live-Hack-CVE/CVE-2022-40898) + +### CVE-2022-40899 (2022-12-22) + + +An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. + + +- [Live-Hack-CVE/CVE-2022-40899](https://github.com/Live-Hack-CVE/CVE-2022-40899) + ### CVE-2022-40912 (2022-09-28) @@ -9202,14 +8968,6 @@ ETAP Lighting International NV ETAP Safety Manager 1.0.0.32 is vulnerable to Cro - [Live-Hack-CVE/CVE-2022-40912](https://github.com/Live-Hack-CVE/CVE-2022-40912) -### CVE-2022-40921 (2022-10-11) - - -DedeCMS V5.7.99 was discovered to contain an arbitrary file upload vulnerability via the component /dede/file_manage_control.php. - - -- [Live-Hack-CVE/CVE-2022-40921](https://github.com/Live-Hack-CVE/CVE-2022-40921) - ### CVE-2022-40922 (2022-10-03) @@ -9290,69 +9048,61 @@ Tenda TX3 US_TX3V1.0br_V16.03.13.11 is vulnerable to stack overflow via compare_ - [Live-Hack-CVE/CVE-2022-40942](https://github.com/Live-Hack-CVE/CVE-2022-40942) -### CVE-2022-41031 (2022-10-11) +### CVE-2022-40956 (2022-12-22) -Microsoft Word Remote Code Execution Vulnerability. +When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. -- [Live-Hack-CVE/CVE-2022-41031](https://github.com/Live-Hack-CVE/CVE-2022-41031) +- [Live-Hack-CVE/CVE-2022-40956](https://github.com/Live-Hack-CVE/CVE-2022-40956) -### CVE-2022-41033 (2022-10-11) +### CVE-2022-40957 (2022-12-22) -Windows COM+ Event System Service Elevation of Privilege Vulnerability. +Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.<br>*This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. -- [Live-Hack-CVE/CVE-2022-41033](https://github.com/Live-Hack-CVE/CVE-2022-41033) +- [Live-Hack-CVE/CVE-2022-40957](https://github.com/Live-Hack-CVE/CVE-2022-40957) -### CVE-2022-41034 (2022-10-11) +### CVE-2022-40958 (2022-12-22) -Visual Studio Code Remote Code Execution Vulnerability. +By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. -- [Live-Hack-CVE/CVE-2022-41034](https://github.com/Live-Hack-CVE/CVE-2022-41034) +- [Live-Hack-CVE/CVE-2022-40958](https://github.com/Live-Hack-CVE/CVE-2022-40958) -### CVE-2022-41037 (2022-10-11) +### CVE-2022-40959 (2022-12-22) -Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41036, CVE-2022-41038. +During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. -- [Live-Hack-CVE/CVE-2022-41037](https://github.com/Live-Hack-CVE/CVE-2022-41037) +- [Live-Hack-CVE/CVE-2022-40959](https://github.com/Live-Hack-CVE/CVE-2022-40959) -### CVE-2022-41038 (2022-10-11) +### CVE-2022-40960 (2022-12-22) -Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41036, CVE-2022-41037. +Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. -- [Live-Hack-CVE/CVE-2022-41038](https://github.com/Live-Hack-CVE/CVE-2022-41038) +- [Live-Hack-CVE/CVE-2022-40960](https://github.com/Live-Hack-CVE/CVE-2022-40960) -### CVE-2022-41042 (2022-10-11) +### CVE-2022-40961 (2022-12-22) -Visual Studio Code Information Disclosure Vulnerability. +During startup, a graphics driver with an unexpected name could lead to a stack-buffer overflow causing a potentially exploitable crash.<br>*This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 105. -- [Live-Hack-CVE/CVE-2022-41042](https://github.com/Live-Hack-CVE/CVE-2022-41042) +- [Live-Hack-CVE/CVE-2022-40961](https://github.com/Live-Hack-CVE/CVE-2022-40961) -### CVE-2022-41081 (2022-10-11) +### CVE-2022-40962 (2022-12-22) -Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047. +Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. -- [Live-Hack-CVE/CVE-2022-41081](https://github.com/Live-Hack-CVE/CVE-2022-41081) - -### CVE-2022-41083 (2022-10-11) - - -Visual Studio Code Elevation of Privilege Vulnerability. - - -- [Live-Hack-CVE/CVE-2022-41083](https://github.com/Live-Hack-CVE/CVE-2022-41083) +- [Live-Hack-CVE/CVE-2022-40962](https://github.com/Live-Hack-CVE/CVE-2022-40962) ### CVE-2022-41138 (2022-09-20) @@ -9362,333 +9112,13 @@ In Zutty before 0.13, DECRQSS in text written to the terminal can achieve arbitr - [Live-Hack-CVE/CVE-2022-41138](https://github.com/Live-Hack-CVE/CVE-2022-41138) -### CVE-2022-41166 (2022-10-11) +### CVE-2022-41290 (2022-12-23) -Due to lack of proper memory management, when a victim opens manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the rm_rlcache_file command to obtain root privileges. IBM X-Force ID: 236690. -- [Live-Hack-CVE/CVE-2022-41166](https://github.com/Live-Hack-CVE/CVE-2022-41166) - -### CVE-2022-41167 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dwg, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41167](https://github.com/Live-Hack-CVE/CVE-2022-41167) - -### CVE-2022-41168 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated CATIA5 Part (.catpart, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41168](https://github.com/Live-Hack-CVE/CVE-2022-41168) - -### CVE-2022-41169 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated CATIA5 Part (.catpart, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41169](https://github.com/Live-Hack-CVE/CVE-2022-41169) - -### CVE-2022-41170 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated CATIA4 Part (.model, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41170](https://github.com/Live-Hack-CVE/CVE-2022-41170) - -### CVE-2022-41171 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated CATIA4 Part (.model, CatiaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41171](https://github.com/Live-Hack-CVE/CVE-2022-41171) - -### CVE-2022-41172 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41172](https://github.com/Live-Hack-CVE/CVE-2022-41172) - -### CVE-2022-41173 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41173](https://github.com/Live-Hack-CVE/CVE-2022-41173) - -### CVE-2022-41174 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Right Hemisphere Material (.rhm, rh.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41174](https://github.com/Live-Hack-CVE/CVE-2022-41174) - -### CVE-2022-41175 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Enhanced Metafile (.emf, emf.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41175](https://github.com/Live-Hack-CVE/CVE-2022-41175) - -### CVE-2022-41176 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Enhanced Metafile (.emf, emf.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41176](https://github.com/Live-Hack-CVE/CVE-2022-41176) - -### CVE-2022-41177 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Iges Part and Assembly (.igs, .iges, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41177](https://github.com/Live-Hack-CVE/CVE-2022-41177) - -### CVE-2022-41178 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Iges Part and Assembly (.igs, .iges, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41178](https://github.com/Live-Hack-CVE/CVE-2022-41178) - -### CVE-2022-41179 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JtTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41179](https://github.com/Live-Hack-CVE/CVE-2022-41179) - -### CVE-2022-41180 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Portable Document Format (.pdf, PDFPublishing.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41180](https://github.com/Live-Hack-CVE/CVE-2022-41180) - -### CVE-2022-41181 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Portable Document Format (.pdf, PDFPublishing.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41181](https://github.com/Live-Hack-CVE/CVE-2022-41181) - -### CVE-2022-41182 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Parasolid Part and Assembly (.x_b, CoreCadTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41182](https://github.com/Live-Hack-CVE/CVE-2022-41182) - -### CVE-2022-41183 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41183](https://github.com/Live-Hack-CVE/CVE-2022-41183) - -### CVE-2022-41184 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Windows Cursor File (.cur, ico.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41184](https://github.com/Live-Hack-CVE/CVE-2022-41184) - -### CVE-2022-41185 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Visual Design Stream (.vds, MataiPersistence.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41185](https://github.com/Live-Hack-CVE/CVE-2022-41185) - -### CVE-2022-41186 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, a Remote Code Execution can be triggered when payload forces a stack-based overflow and or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41186](https://github.com/Live-Hack-CVE/CVE-2022-41186) - -### CVE-2022-41187 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41187](https://github.com/Live-Hack-CVE/CVE-2022-41187) - -### CVE-2022-41188 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41188](https://github.com/Live-Hack-CVE/CVE-2022-41188) - -### CVE-2022-41189 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dwg, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41189](https://github.com/Live-Hack-CVE/CVE-2022-41189) - -### CVE-2022-41190 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41190](https://github.com/Live-Hack-CVE/CVE-2022-41190) - -### CVE-2022-41191 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41191](https://github.com/Live-Hack-CVE/CVE-2022-41191) - -### CVE-2022-41192 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41192](https://github.com/Live-Hack-CVE/CVE-2022-41192) - -### CVE-2022-41193 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Post Script (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41193](https://github.com/Live-Hack-CVE/CVE-2022-41193) - -### CVE-2022-41194 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Postscript (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41194](https://github.com/Live-Hack-CVE/CVE-2022-41194) - -### CVE-2022-41195 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated EAAmiga Interchange File Format (.iff, 2d.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41195](https://github.com/Live-Hack-CVE/CVE-2022-41195) - -### CVE-2022-41196 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated VRML Worlds (.wrl, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41196](https://github.com/Live-Hack-CVE/CVE-2022-41196) - -### CVE-2022-41197 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated VRML Worlds (.wrl, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. - - -- [Live-Hack-CVE/CVE-2022-41197](https://github.com/Live-Hack-CVE/CVE-2022-41197) - -### CVE-2022-41198 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated SketchUp (.skp, SketchUp.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41198](https://github.com/Live-Hack-CVE/CVE-2022-41198) - -### CVE-2022-41199 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Open Inventor File (.iv, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41199](https://github.com/Live-Hack-CVE/CVE-2022-41199) - -### CVE-2022-41200 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Scalable Vector Graphic (.svg, svg.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41200](https://github.com/Live-Hack-CVE/CVE-2022-41200) - -### CVE-2022-41201 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Right Hemisphere Binary (.rh, rh.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41201](https://github.com/Live-Hack-CVE/CVE-2022-41201) - -### CVE-2022-41202 (2022-10-11) - - -Due to lack of proper memory management, when a victim opens a manipulated Visual Design Stream (.vds, vds.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. - - -- [Live-Hack-CVE/CVE-2022-41202](https://github.com/Live-Hack-CVE/CVE-2022-41202) - -### CVE-2022-41204 (2022-10-11) - - -An attacker can change the content of an SAP Commerce - versions 1905, 2005, 2105, 2011, 2205, login page through a manipulated URL. They can inject code that allows them to redirect submissions from the affected login form to their own server. This allows them to steal credentials and hijack accounts. A successful attack could compromise the Confidentiality, Integrity, and Availability of the system. - - -- [Live-Hack-CVE/CVE-2022-41204](https://github.com/Live-Hack-CVE/CVE-2022-41204) - -### CVE-2022-41206 (2022-10-11) - - -SAP BusinessObjects Business Intelligence platform (Analysis for OLAP) - versions 420, 430, allows an authenticated attacker to send user-controlled inputs when OLAP connections are created and edited in the Central Management Console. On successful exploitation, there could be a limited impact on confidentiality and integrity of the application. - - -- [Live-Hack-CVE/CVE-2022-41206](https://github.com/Live-Hack-CVE/CVE-2022-41206) - -### CVE-2022-41209 (2022-10-11) - - -SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses encryption method which lacks proper diffusion and does not hide the patterns well. This can lead to information disclosure. In certain scenarios, application might also be susceptible to replay attacks. - - -- [Live-Hack-CVE/CVE-2022-41209](https://github.com/Live-Hack-CVE/CVE-2022-41209) - -### CVE-2022-41210 (2022-10-11) - - -SAP Customer Data Cloud (Gigya mobile app for Android) - version 7.4, uses insecure random number generator program which makes it easy for the attacker to predict future random numbers. This can lead to information disclosure and modification of certain user settings. - - -- [Live-Hack-CVE/CVE-2022-41210](https://github.com/Live-Hack-CVE/CVE-2022-41210) +- [Live-Hack-CVE/CVE-2022-41290](https://github.com/Live-Hack-CVE/CVE-2022-41290) ### CVE-2022-41291 (2022-10-07) @@ -9698,14 +9128,6 @@ IBM InfoSphere Information Server 11.7 does not invalidate session after logout - [Live-Hack-CVE/CVE-2022-41291](https://github.com/Live-Hack-CVE/CVE-2022-41291) -### CVE-2022-41294 (2022-10-06) - - -IBM Robotic Process Automation 21.0.0, 21.0.1, 21.0.2, 21.0.3, and 21.0.4 is vulnerable to cross origin resource sharing using the bot api. IBM X-Force ID: 236807. - - -- [Live-Hack-CVE/CVE-2022-41294](https://github.com/Live-Hack-CVE/CVE-2022-41294) - ### CVE-2022-41340 (2022-09-24) @@ -9722,38 +9144,6 @@ An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.1 - [Live-Hack-CVE/CVE-2022-41347](https://github.com/Live-Hack-CVE/CVE-2022-41347) -### CVE-2022-41348 (2022-10-12) - - -An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur via the onerror attribute of an IMG element, leading to information disclosure. - - -- [Live-Hack-CVE/CVE-2022-41348](https://github.com/Live-Hack-CVE/CVE-2022-41348) - -### CVE-2022-41349 (2022-10-12) - - -In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/compose accepts an attachUrl parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine. - - -- [Live-Hack-CVE/CVE-2022-41349](https://github.com/Live-Hack-CVE/CVE-2022-41349) - -### CVE-2022-41350 (2022-10-12) - - -In Zimbra Collaboration Suite (ZCS) 8.8.15, /h/search?action=voicemail&action=listen accepts a phone parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine. - - -- [Live-Hack-CVE/CVE-2022-41350](https://github.com/Live-Hack-CVE/CVE-2022-41350) - -### CVE-2022-41351 (2022-10-12) - - -In Zimbra Collaboration Suite (ZCS) 8.8.15, at the URL /h/calendar, one can trigger XSS by adding JavaScript code to the view parameter and changing the value of the uncheck parameter to a string (instead of default value of 10). - - -- [Live-Hack-CVE/CVE-2022-41351](https://github.com/Live-Hack-CVE/CVE-2022-41351) - ### CVE-2022-41355 (2022-10-06) @@ -9794,102 +9184,6 @@ An arbitrary file upload vulnerability in the component /leave_system/classes/Us - [Live-Hack-CVE/CVE-2022-41379](https://github.com/Live-Hack-CVE/CVE-2022-41379) -### CVE-2022-41380 (2022-10-11) - - -The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41380](https://github.com/Live-Hack-CVE/CVE-2022-41380) - -### CVE-2022-41381 (2022-10-11) - - -The d8s-utility package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41381](https://github.com/Live-Hack-CVE/CVE-2022-41381) - -### CVE-2022-41382 (2022-10-11) - - -The d8s-json package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41382](https://github.com/Live-Hack-CVE/CVE-2022-41382) - -### CVE-2022-41383 (2022-10-11) - - -The d8s-archives package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41383](https://github.com/Live-Hack-CVE/CVE-2022-41383) - -### CVE-2022-41384 (2022-10-11) - - -The d8s-domains package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41384](https://github.com/Live-Hack-CVE/CVE-2022-41384) - -### CVE-2022-41385 (2022-10-11) - - -The d8s-html package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41385](https://github.com/Live-Hack-CVE/CVE-2022-41385) - -### CVE-2022-41386 (2022-10-11) - - -The d8s-utility package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41386](https://github.com/Live-Hack-CVE/CVE-2022-41386) - -### CVE-2022-41387 (2022-10-11) - - -The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-urls package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-41387](https://github.com/Live-Hack-CVE/CVE-2022-41387) - -### CVE-2022-41403 (2022-10-12) - - -OpenCart 3.x Newsletter Custom Popup was discovered to contain a SQL injection vulnerability via the email parameter at index.php?route=extension/module/so_newletter_custom_popup/newsletter. - - -- [Live-Hack-CVE/CVE-2022-41403](https://github.com/Live-Hack-CVE/CVE-2022-41403) - -### CVE-2022-41406 (2022-10-11) - - -An arbitrary file upload vulnerability in the /admin/admin_pic.php component of Church Management System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. - - -- [Live-Hack-CVE/CVE-2022-41406](https://github.com/Live-Hack-CVE/CVE-2022-41406) - -### CVE-2022-41407 (2022-10-11) - - -Online Pet Shop We App v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/view_order. - - -- [Live-Hack-CVE/CVE-2022-41407](https://github.com/Live-Hack-CVE/CVE-2022-41407) - -### CVE-2022-41408 (2022-10-11) - - -Online Pet Shop We App v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/view_order. - - -- [Live-Hack-CVE/CVE-2022-41408](https://github.com/Live-Hack-CVE/CVE-2022-41408) - ### CVE-2022-41414 (2022-10-07) @@ -9978,62 +9272,6 @@ phpipam v1.5.0 was discovered to contain a header injection vulnerability via th - [Live-Hack-CVE/CVE-2022-41443](https://github.com/Live-Hack-CVE/CVE-2022-41443) -### CVE-2022-41473 (2022-10-13) - - -RPCMS v3.0.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the Search function. - - -- [Live-Hack-CVE/CVE-2022-41473](https://github.com/Live-Hack-CVE/CVE-2022-41473) - -### CVE-2022-41474 (2022-10-13) - - -RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily change the password of any account. - - -- [Live-Hack-CVE/CVE-2022-41474](https://github.com/Live-Hack-CVE/CVE-2022-41474) - -### CVE-2022-41475 (2022-10-13) - - -RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add an administrator account. - - -- [Live-Hack-CVE/CVE-2022-41475](https://github.com/Live-Hack-CVE/CVE-2022-41475) - -### CVE-2022-41489 (2022-10-13) - - -WAYOS LQ_09 22.03.17V was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to send crafted requests to the server from the affected device. This vulnerability is exploitable due to a lack of authentication in the component Usb_upload.htm. - - -- [Live-Hack-CVE/CVE-2022-41489](https://github.com/Live-Hack-CVE/CVE-2022-41489) - -### CVE-2022-41495 (2022-10-13) - - -ClipperCMS 1.3.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the rss_url_news parameter at /manager/index.php. - - -- [Live-Hack-CVE/CVE-2022-41495](https://github.com/Live-Hack-CVE/CVE-2022-41495) - -### CVE-2022-41496 (2022-10-13) - - -iCMS v7.0.16 was discovered to contain a Server-Side Request Forgery (SSRF) via the url parameter at admincp.php. - - -- [Live-Hack-CVE/CVE-2022-41496](https://github.com/Live-Hack-CVE/CVE-2022-41496) - -### CVE-2022-41497 (2022-10-13) - - -ClipperCMS 1.3.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the pkg_url parameter at /manager/index.php. - - -- [Live-Hack-CVE/CVE-2022-41497](https://github.com/Live-Hack-CVE/CVE-2022-41497) - ### CVE-2022-41512 (2022-10-07) @@ -10066,126 +9304,6 @@ Open Source SACCO Management System v1.0 was discovered to contain a SQL injecti - [Live-Hack-CVE/CVE-2022-41515](https://github.com/Live-Hack-CVE/CVE-2022-41515) -### CVE-2022-41517 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain a stack overflow in the lang parameter in the setLanguageCfg function - - -- [Live-Hack-CVE/CVE-2022-41517](https://github.com/Live-Hack-CVE/CVE-2022-41517) - -### CVE-2022-41518 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain a command injection vulnerability via the UploadFirmwareFile function at /cgi-bin/cstecgi.cgi. - - -- [Live-Hack-CVE/CVE-2022-41518](https://github.com/Live-Hack-CVE/CVE-2022-41518) - -### CVE-2022-41520 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the File parameter in the UploadCustomModule function. - - -- [Live-Hack-CVE/CVE-2022-41520](https://github.com/Live-Hack-CVE/CVE-2022-41520) - -### CVE-2022-41521 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the sPort/ePort parameter in the setIpPortFilterRules function. - - -- [Live-Hack-CVE/CVE-2022-41521](https://github.com/Live-Hack-CVE/CVE-2022-41521) - -### CVE-2022-41522 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an unauthenticated stack overflow via the "main" function. - - -- [Live-Hack-CVE/CVE-2022-41522](https://github.com/Live-Hack-CVE/CVE-2022-41522) - -### CVE-2022-41523 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the command parameter in the setTracerouteCfg function. - - -- [Live-Hack-CVE/CVE-2022-41523](https://github.com/Live-Hack-CVE/CVE-2022-41523) - -### CVE-2022-41524 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the week, sTime, and eTime parameters in the setParentalRules function. - - -- [Live-Hack-CVE/CVE-2022-41524](https://github.com/Live-Hack-CVE/CVE-2022-41524) - -### CVE-2022-41525 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain a command injection vulnerability via the OpModeCfg function at /cgi-bin/cstecgi.cgi. - - -- [Live-Hack-CVE/CVE-2022-41525](https://github.com/Live-Hack-CVE/CVE-2022-41525) - -### CVE-2022-41526 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the ip parameter in the setDiagnosisCfg function. - - -- [Live-Hack-CVE/CVE-2022-41526](https://github.com/Live-Hack-CVE/CVE-2022-41526) - -### CVE-2022-41527 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the pppoeUser parameter in the setOpModeCfg function. - - -- [Live-Hack-CVE/CVE-2022-41527](https://github.com/Live-Hack-CVE/CVE-2022-41527) - -### CVE-2022-41528 (2022-10-06) - - -TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the text parameter in the setSmsCfg function. - - -- [Live-Hack-CVE/CVE-2022-41528](https://github.com/Live-Hack-CVE/CVE-2022-41528) - -### CVE-2022-41530 (2022-10-11) - - -Open Source SACCO Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /sacco_shield/ajax.php?action=delete_borrower. - - -- [Live-Hack-CVE/CVE-2022-41530](https://github.com/Live-Hack-CVE/CVE-2022-41530) - -### CVE-2022-41532 (2022-10-11) - - -Open Source SACCO Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /sacco_shield/ajax.php?action=delete_plan. - - -- [Live-Hack-CVE/CVE-2022-41532](https://github.com/Live-Hack-CVE/CVE-2022-41532) - -### CVE-2022-41533 (2022-10-13) - - -Online Diagnostic Lab Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /php_action/editProductImage.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. - - -- [Live-Hack-CVE/CVE-2022-41533](https://github.com/Live-Hack-CVE/CVE-2022-41533) - -### CVE-2022-41534 (2022-10-13) - - -Online Diagnostic Lab Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /php_action/createOrder.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. - - -- [Live-Hack-CVE/CVE-2022-41534](https://github.com/Live-Hack-CVE/CVE-2022-41534) - ### CVE-2022-41540 (2022-10-18) @@ -10194,14 +9312,6 @@ The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic key - [efchatz/easy-exploits](https://github.com/efchatz/easy-exploits) -### CVE-2022-41550 (2022-10-11) - - -GNU oSIP v5.3.0 was discovered to contain an integer overflow via the component osip_body_parse_header. - - -- [Live-Hack-CVE/CVE-2022-41550](https://github.com/Live-Hack-CVE/CVE-2022-41550) - ### CVE-2022-41570 (2022-09-26) @@ -10226,102 +9336,6 @@ An access-control vulnerability in Gradle Enterprise 2022.4 through 2022.3.1 all - [Live-Hack-CVE/CVE-2022-41574](https://github.com/Live-Hack-CVE/CVE-2022-41574) -### CVE-2022-41576 (2022-10-14) - - -The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices. - - -- [Live-Hack-CVE/CVE-2022-41576](https://github.com/Live-Hack-CVE/CVE-2022-41576) - -### CVE-2022-41577 (2022-10-14) - - -The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability. - - -- [Live-Hack-CVE/CVE-2022-41577](https://github.com/Live-Hack-CVE/CVE-2022-41577) - -### CVE-2022-41592 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41592](https://github.com/Live-Hack-CVE/CVE-2022-41592) - -### CVE-2022-41593 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41593](https://github.com/Live-Hack-CVE/CVE-2022-41593) - -### CVE-2022-41594 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41594](https://github.com/Live-Hack-CVE/CVE-2022-41594) - -### CVE-2022-41595 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41595](https://github.com/Live-Hack-CVE/CVE-2022-41595) - -### CVE-2022-41597 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41597](https://github.com/Live-Hack-CVE/CVE-2022-41597) - -### CVE-2022-41598 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41598](https://github.com/Live-Hack-CVE/CVE-2022-41598) - -### CVE-2022-41600 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41600](https://github.com/Live-Hack-CVE/CVE-2022-41600) - -### CVE-2022-41601 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41601](https://github.com/Live-Hack-CVE/CVE-2022-41601) - -### CVE-2022-41602 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41602](https://github.com/Live-Hack-CVE/CVE-2022-41602) - -### CVE-2022-41603 (2022-10-14) - - -The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service. - - -- [Live-Hack-CVE/CVE-2022-41603](https://github.com/Live-Hack-CVE/CVE-2022-41603) - ### CVE-2022-41604 (2022-09-26) @@ -10330,13 +9344,29 @@ Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users - [Live-Hack-CVE/CVE-2022-41604](https://github.com/Live-Hack-CVE/CVE-2022-41604) -### CVE-2022-41606 (2022-10-11) +### CVE-2022-41639 (2022-12-22) -HashiCorp Nomad and Nomad Enterprise 1.0.2 up to 1.2.12, and 1.3.5 jobs submitted with an artifact stanza using invalid S3 or GCS URLs can be used to crash client agents. Fixed in 1.2.13, 1.3.6, and 1.4.0. +A heap based buffer overflow vulnerability exists in tile decoding code of TIFF image parser in OpenImageIO master-branch-9aeece7a and v2.3.19.0. A specially-crafted TIFF file can lead to an out of bounds memory corruption, which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-41606](https://github.com/Live-Hack-CVE/CVE-2022-41606) +- [Live-Hack-CVE/CVE-2022-41639](https://github.com/Live-Hack-CVE/CVE-2022-41639) + +### CVE-2022-41649 (2022-12-22) + + +A heap out of bounds read vulnerability exists in the handling of IPTC data while parsing TIFF images in OpenImageIO v2.3.19.0. A specially-crafted TIFF file can cause a read of adjacent heap memory, which can leak sensitive process information. An attacker can provide a malicious file to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41649](https://github.com/Live-Hack-CVE/CVE-2022-41649) + +### CVE-2022-41684 (2022-12-22) + + +A heap out of bounds read vulnerability exists in the OpenImageIO master-branch-9aeece7a when parsing the image file directory part of a PSD image file. A specially-crafted .psd file can cause a read of arbitrary memory address which can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41684](https://github.com/Live-Hack-CVE/CVE-2022-41684) ### CVE-2022-41744 (2022-10-10) @@ -10386,13 +9416,45 @@ An origin validation error vulnerability in Trend Micro Apex One agents could al - [Live-Hack-CVE/CVE-2022-41749](https://github.com/Live-Hack-CVE/CVE-2022-41749) -### CVE-2022-41851 (2022-10-11) +### CVE-2022-41794 (2022-12-22) -A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973) +A heap based buffer overflow vulnerability exists in the PSD thumbnail resource parsing code of OpenImageIO 2.3.19.0. A specially-crafted PSD file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-41851](https://github.com/Live-Hack-CVE/CVE-2022-41851) +- [Live-Hack-CVE/CVE-2022-41794](https://github.com/Live-Hack-CVE/CVE-2022-41794) + +### CVE-2022-41837 (2022-12-22) + + +An out-of-bounds write vulnerability exists in the OpenImageIO::add_exif_item_to_spec functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially-crafted exif metadata can lead to stack-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41837](https://github.com/Live-Hack-CVE/CVE-2022-41837) + +### CVE-2022-41838 (2022-12-22) + + +A code execution vulnerability exists in the DDS scanline parsing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially-crafted .dds can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41838](https://github.com/Live-Hack-CVE/CVE-2022-41838) + +### CVE-2022-41849 (2022-09-30) + + +drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect. + + +- [Live-Hack-CVE/CVE-2022-41849](https://github.com/Live-Hack-CVE/CVE-2022-41849) + +### CVE-2022-41850 (2022-09-30) + + +roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress. + + +- [Live-Hack-CVE/CVE-2022-41850](https://github.com/Live-Hack-CVE/CVE-2022-41850) ### CVE-2022-41870 (2022-09-30) @@ -10402,85 +9464,37 @@ AP Manager in Innovaphone before 13r2 Service Release 17 allows command injectio - [Live-Hack-CVE/CVE-2022-41870](https://github.com/Live-Hack-CVE/CVE-2022-41870) -### CVE-2022-42034 (2022-10-11) +### CVE-2022-41977 (2022-12-22) -Wedding Planner v1.0 is vulnerable to arbitrary code execution via users_profile.php. +An out of bounds read vulnerability exists in the way OpenImageIO version v2.3.19.0 processes string fields in TIFF image files. A specially-crafted TIFF file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-42034](https://github.com/Live-Hack-CVE/CVE-2022-42034) +- [Live-Hack-CVE/CVE-2022-41977](https://github.com/Live-Hack-CVE/CVE-2022-41977) -### CVE-2022-42036 (2022-10-11) +### CVE-2022-41981 (2022-12-22) -The d8s-urls package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0. +A stack-based buffer overflow vulnerability exists in the TGA file format parser of OpenImageIO v2.3.19.0. A specially-crafted targa file can lead to out of bounds read and write on the process stack, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-42036](https://github.com/Live-Hack-CVE/CVE-2022-42036) +- [Live-Hack-CVE/CVE-2022-41981](https://github.com/Live-Hack-CVE/CVE-2022-41981) -### CVE-2022-42037 (2022-10-11) +### CVE-2022-41988 (2022-12-22) -The d8s-asns package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0. +An information disclosure vulnerability exists in the OpenImageIO::decode_iptc_iim() functionality of OpenImageIO Project OpenImageIO v2.3.19.0. A specially-crafted TIFF file can lead to a disclosure of sensitive information. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-42037](https://github.com/Live-Hack-CVE/CVE-2022-42037) +- [Live-Hack-CVE/CVE-2022-41988](https://github.com/Live-Hack-CVE/CVE-2022-41988) -### CVE-2022-42038 (2022-10-11) +### CVE-2022-41999 (2022-12-22) -The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0. +A denial of service vulnerability exists in the DDS native tile reading functionality of OpenImageIO Project OpenImageIO v2.3.19.0 and v2.4.4.2. A specially-crafted .dds can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-42038](https://github.com/Live-Hack-CVE/CVE-2022-42038) - -### CVE-2022-42039 (2022-10-11) - - -The d8s-lists package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-dicts package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-42039](https://github.com/Live-Hack-CVE/CVE-2022-42039) - -### CVE-2022-42040 (2022-10-11) - - -The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-dicts package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-42040](https://github.com/Live-Hack-CVE/CVE-2022-42040) - -### CVE-2022-42041 (2022-10-11) - - -The d8s-file-system package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hashes package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-42041](https://github.com/Live-Hack-CVE/CVE-2022-42041) - -### CVE-2022-42042 (2022-10-11) - - -The d8s-networking package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hashes package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-42042](https://github.com/Live-Hack-CVE/CVE-2022-42042) - -### CVE-2022-42043 (2022-10-11) - - -The d8s-xml package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-html package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-42043](https://github.com/Live-Hack-CVE/CVE-2022-42043) - -### CVE-2022-42044 (2022-10-11) - - -The d8s-asns package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-html package. The affected version is 0.1.0. - - -- [Live-Hack-CVE/CVE-2022-42044](https://github.com/Live-Hack-CVE/CVE-2022-42044) +- [Live-Hack-CVE/CVE-2022-41999](https://github.com/Live-Hack-CVE/CVE-2022-41999) ### CVE-2022-42073 (2022-10-07) @@ -10498,62 +9512,6 @@ Online Diagnostic Lab Management System v1.0 is vulnerable to SQL Injection via - [Live-Hack-CVE/CVE-2022-42074](https://github.com/Live-Hack-CVE/CVE-2022-42074) -### CVE-2022-42077 (2022-10-12) - - -Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot. - - -- [Live-Hack-CVE/CVE-2022-42077](https://github.com/Live-Hack-CVE/CVE-2022-42077) - -### CVE-2022-42078 (2022-10-12) - - -Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet. - - -- [Live-Hack-CVE/CVE-2022-42078](https://github.com/Live-Hack-CVE/CVE-2022-42078) - -### CVE-2022-42079 (2022-10-12) - - -Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via the function formWifiBasicSet. - - -- [Live-Hack-CVE/CVE-2022-42079](https://github.com/Live-Hack-CVE/CVE-2022-42079) - -### CVE-2022-42080 (2022-10-12) - - -Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a heap overflow via sched_start_time parameter. - - -- [Live-Hack-CVE/CVE-2022-42080](https://github.com/Live-Hack-CVE/CVE-2022-42080) - -### CVE-2022-42081 (2022-10-12) - - -Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via sched_end_time parameter. - - -- [Live-Hack-CVE/CVE-2022-42081](https://github.com/Live-Hack-CVE/CVE-2022-42081) - -### CVE-2022-42086 (2022-10-12) - - -Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Request Forgery (CSRF) via function TendaAteMode. - - -- [Live-Hack-CVE/CVE-2022-42086](https://github.com/Live-Hack-CVE/CVE-2022-42086) - -### CVE-2022-42087 (2022-10-12) - - -Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot. - - -- [Live-Hack-CVE/CVE-2022-42087](https://github.com/Live-Hack-CVE/CVE-2022-42087) - ### CVE-2022-42092 (2022-10-07) @@ -10562,46 +9520,6 @@ Backdrop CMS 1.22.0 has Unrestricted File Upload vulnerability via 'themes' that - [Live-Hack-CVE/CVE-2022-42092](https://github.com/Live-Hack-CVE/CVE-2022-42092) -### CVE-2022-42229 (2022-10-11) - - -Wedding Planner v1.0 is vulnerable to Arbitrary code execution via package_edit.php. - - -- [Live-Hack-CVE/CVE-2022-42229](https://github.com/Live-Hack-CVE/CVE-2022-42229) - -### CVE-2022-42230 (2022-10-11) - - -Simple Cold Storage Management System v1.0 is vulnerable to SQL Injection via /csms/admin/?page=user/manage_user&id=. - - -- [Live-Hack-CVE/CVE-2022-42230](https://github.com/Live-Hack-CVE/CVE-2022-42230) - -### CVE-2022-42235 (2022-10-11) - - -A Stored XSS issue in Student Clearance System v.1.0 allows the injection of arbitrary JavaScript in the Student registration form. - - -- [Live-Hack-CVE/CVE-2022-42235](https://github.com/Live-Hack-CVE/CVE-2022-42235) - -### CVE-2022-42236 (2022-10-11) - - -A Stored XSS issue in Merchandise Online Store v.1.0 allows to injection of Arbitrary JavaScript in edit account form. - - -- [Live-Hack-CVE/CVE-2022-42236](https://github.com/Live-Hack-CVE/CVE-2022-42236) - -### CVE-2022-42238 (2022-10-11) - - -A Vertical Privilege Escalation issue in Merchandise Online Store v.1.0 allows an attacker to get access to the admin dashboard. - - -- [Live-Hack-CVE/CVE-2022-42238](https://github.com/Live-Hack-CVE/CVE-2022-42238) - ### CVE-2022-42241 (2022-10-06) @@ -10658,21 +9576,21 @@ An issue was discovered in Veritas NetBackup through 10.0 and related Veritas pr - [Live-Hack-CVE/CVE-2022-42302](https://github.com/Live-Hack-CVE/CVE-2022-42302) -### CVE-2022-42711 (2022-10-11) +### CVE-2022-42328 (2022-12-06) -In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser. +Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329). -- [Live-Hack-CVE/CVE-2022-42711](https://github.com/Live-Hack-CVE/CVE-2022-42711) +- [Live-Hack-CVE/CVE-2022-42328](https://github.com/Live-Hack-CVE/CVE-2022-42328) -### CVE-2022-42715 (2022-10-12) +### CVE-2022-42329 (2022-12-06) -A reflected XSS vulnerability exists in REDCap before 12.04.18 in the Alerts & Notifications upload feature. A crafted CSV file will, when uploaded, trigger arbitrary JavaScript code execution. +Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329). -- [Live-Hack-CVE/CVE-2022-42715](https://github.com/Live-Hack-CVE/CVE-2022-42715) +- [Live-Hack-CVE/CVE-2022-42329](https://github.com/Live-Hack-CVE/CVE-2022-42329) ### CVE-2022-42724 (2022-10-10) @@ -10690,37 +9608,1133 @@ mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay - [Live-Hack-CVE/CVE-2022-42731](https://github.com/Live-Hack-CVE/CVE-2022-42731) -### CVE-2022-42897 (2022-10-12) +### CVE-2022-42818 (2022-11-01) -Array Networks AG/vxAG with ArrayOS AG before 9.4.0.469 allows unauthenticated command injection that leads to privilege escalation and control of the system. NOTE: ArrayOS AG 10.x is unaffected. +This issue was addressed with improved data protection. This issue is fixed in macOS Ventura 13. A user in a privileged network position may be able to track user activity. -- [Live-Hack-CVE/CVE-2022-42897](https://github.com/Live-Hack-CVE/CVE-2022-42897) +- [Live-Hack-CVE/CVE-2022-42818](https://github.com/Live-Hack-CVE/CVE-2022-42818) -### CVE-2022-42899 (2022-10-12) +### CVE-2022-42927 (2022-12-22) -Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read and stack overflow issues when opening crafted SKP files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View. +A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via <code>performance.getEntries()</code>. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. -- [Live-Hack-CVE/CVE-2022-42899](https://github.com/Live-Hack-CVE/CVE-2022-42899) +- [Live-Hack-CVE/CVE-2022-42927](https://github.com/Live-Hack-CVE/CVE-2022-42927) -### CVE-2022-42900 (2022-10-12) +### CVE-2022-42928 (2022-12-22) -Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds read issues when opening crafted FBX files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View. +Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. -- [Live-Hack-CVE/CVE-2022-42900](https://github.com/Live-Hack-CVE/CVE-2022-42900) +- [Live-Hack-CVE/CVE-2022-42928](https://github.com/Live-Hack-CVE/CVE-2022-42928) -### CVE-2022-42901 (2022-10-12) +### CVE-2022-42929 (2022-12-22) -Bentley MicroStation and MicroStation-based applications may be affected by out-of-bounds and stack overflow issues when opening crafted XMT files. Exploiting these issues could lead to information disclosure and code execution. The fixed versions are 10.17.01.58* for MicroStation and 10.17.01.19* for Bentley View. +If a website called <code>window.print()</code> in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. -- [Live-Hack-CVE/CVE-2022-42901](https://github.com/Live-Hack-CVE/CVE-2022-42901) +- [Live-Hack-CVE/CVE-2022-42929](https://github.com/Live-Hack-CVE/CVE-2022-42929) + +### CVE-2022-42930 (2022-12-22) + + +If two Workers were simultaneously initializing their CacheStorage, a data race could have occurred in the <code>ThirdPartyUtil</code> component. This vulnerability affects Firefox < 106. + + +- [Live-Hack-CVE/CVE-2022-42930](https://github.com/Live-Hack-CVE/CVE-2022-42930) + +### CVE-2022-42931 (2022-12-22) + + +Logins saved by Firefox should be managed by the Password Manager component which uses encryption to save files on-disk. Instead, the username (not password) was saved by the Form Manager to an unencrypted file on disk. This vulnerability affects Firefox < 106. + + +- [Live-Hack-CVE/CVE-2022-42931](https://github.com/Live-Hack-CVE/CVE-2022-42931) + +### CVE-2022-42932 (2022-12-22) + + +Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106. + + +- [Live-Hack-CVE/CVE-2022-42932](https://github.com/Live-Hack-CVE/CVE-2022-42932) + +### CVE-2022-42953 (2022-12-24) + + +Certain ZKTeco products (ZEM500-510-560-760, ZEM600-800, ZEM720, ZMM) allow access to sensitive information via direct requests for the form/DataApp?style=1 and form/DataApp?style=0 URLs. The affected versions may be before 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and 15.00 (ZMM200-220-210). The fixed versions are firmware version 8.88 (ZEM500-510-560-760, ZEM600-800, ZEM720) and firmware version 15.00 (ZMM200-220-210). + + +- [Live-Hack-CVE/CVE-2022-42953](https://github.com/Live-Hack-CVE/CVE-2022-42953) + +### CVE-2022-43380 (2022-12-23) + + +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX NFS kernel extension to cause a denial of service. IBM X-Force ID: 238640. + + +- [Live-Hack-CVE/CVE-2022-43380](https://github.com/Live-Hack-CVE/CVE-2022-43380) + +### CVE-2022-43381 (2022-12-23) + + +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX SMB client to cause a denial of service. IBM X-Force ID: 238639. + + +- [Live-Hack-CVE/CVE-2022-43381](https://github.com/Live-Hack-CVE/CVE-2022-43381) + +### CVE-2022-43551 (2022-12-23) + + +A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded. + + +- [Live-Hack-CVE/CVE-2022-43551](https://github.com/Live-Hack-CVE/CVE-2022-43551) + +### CVE-2022-43592 (2022-12-22) + + +An information disclosure vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-43592](https://github.com/Live-Hack-CVE/CVE-2022-43592) + +### CVE-2022-43593 (2022-12-22) + + +A denial of service vulnerability exists in the DPXOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to null pointer dereference. An attacker can provide malicious input to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-43593](https://github.com/Live-Hack-CVE/CVE-2022-43593) + +### CVE-2022-43594 (2022-12-22) + + +Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .bmp files. + + +- [Live-Hack-CVE/CVE-2022-43594](https://github.com/Live-Hack-CVE/CVE-2022-43594) + +### CVE-2022-43595 (2022-12-22) + + +Multiple denial of service vulnerabilities exist in the image output closing functionality of OpenImageIO Project OpenImageIO v2.4.4.2. Specially crafted ImageOutput Objects can lead to multiple null pointer dereferences. An attacker can provide malicious multiple inputs to trigger these vulnerabilities.This vulnerability applies to writing .fits files. + + +- [Live-Hack-CVE/CVE-2022-43595](https://github.com/Live-Hack-CVE/CVE-2022-43595) + +### CVE-2022-43596 (2022-12-22) + + +An information disclosure vulnerability exists in the IFFOutput channel interleaving functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to leaked heap data. An attacker can provide malicious input to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-43596](https://github.com/Live-Hack-CVE/CVE-2022-43596) + +### CVE-2022-43597 (2022-12-22) + + +Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT8`. + + +- [Live-Hack-CVE/CVE-2022-43597](https://github.com/Live-Hack-CVE/CVE-2022-43597) + +### CVE-2022-43598 (2022-12-22) + + +Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT16`. + + +- [Live-Hack-CVE/CVE-2022-43598](https://github.com/Live-Hack-CVE/CVE-2022-43598) + +### CVE-2022-43599 (2022-12-22) + + +Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8` + + +- [Live-Hack-CVE/CVE-2022-43599](https://github.com/Live-Hack-CVE/CVE-2022-43599) + +### CVE-2022-43600 (2022-12-22) + + +Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16` + + +- [Live-Hack-CVE/CVE-2022-43600](https://github.com/Live-Hack-CVE/CVE-2022-43600) + +### CVE-2022-43601 (2022-12-22) + + +Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16` + + +- [Live-Hack-CVE/CVE-2022-43601](https://github.com/Live-Hack-CVE/CVE-2022-43601) + +### CVE-2022-43602 (2022-12-22) + + +Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8` + + +- [Live-Hack-CVE/CVE-2022-43602](https://github.com/Live-Hack-CVE/CVE-2022-43602) + +### CVE-2022-43603 (2022-12-22) + + +A denial of service vulnerability exists in the ZfileOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-43603](https://github.com/Live-Hack-CVE/CVE-2022-43603) + +### CVE-2022-43848 (2022-12-23) + + +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX perfstat kernel extension to cause a denial of service. IBM X-Force ID: 239169. + + +- [Live-Hack-CVE/CVE-2022-43848](https://github.com/Live-Hack-CVE/CVE-2022-43848) + +### CVE-2022-43849 (2022-12-23) + + +IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1could allow a non-privileged local user to exploit a vulnerability in the AIX pfcdd kernel extension to cause a denial of service. IBM X-Force ID: 239170. + + +- [Live-Hack-CVE/CVE-2022-43849](https://github.com/Live-Hack-CVE/CVE-2022-43849) + +### CVE-2022-43857 (2022-12-22) + + +IBM Navigator for i 7.3, 7.4 and 7.5 could allow an authenticated user to access IBM Navigator for i log files they are authorized to but not while using this interface. The remote authenticated user can bypass the interface checks and download log files by modifying servlet filter. IBM X-Force ID: 239301. + + +- [Live-Hack-CVE/CVE-2022-43857](https://github.com/Live-Hack-CVE/CVE-2022-43857) + +### CVE-2022-43858 (2022-12-22) + + +IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to access the file system and download files they are authorized to but not while using this interface. The remote authenticated user can bypass the interface checks by modifying a parameter thereby gaining access to their files through this interface. IBM X-Force ID: 239303. + + +- [Live-Hack-CVE/CVE-2022-43858](https://github.com/Live-Hack-CVE/CVE-2022-43858) + +### CVE-2022-43859 (2022-12-22) + + +IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information for an object they are authorized to but not while using this interface. By performing a UNION based SQL injection an attacker could see file permissions through this interface. IBM X-Force ID: 239304. + + +- [Live-Hack-CVE/CVE-2022-43859](https://github.com/Live-Hack-CVE/CVE-2022-43859) + +### CVE-2022-43860 (2022-12-23) + + +IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information they are authorized to but not while using this interface. By performing an SQL injection an attacker could see user profile attributes through this interface. IBM X-Force ID: 239305. + + +- [Live-Hack-CVE/CVE-2022-43860](https://github.com/Live-Hack-CVE/CVE-2022-43860) + +### CVE-2022-44012 (2022-12-24) + + +An issue was discovered in /DS/LM_API/api/SelectionService/InsertQueryWithActiveRelationsReturnId in Simmeth Lieferantenmanager before 5.6. An attacker can execute JavaScript code in the browser of the victim if a site is loaded. The victim's encrypted password can be stolen and most likely be decrypted. + + +- [Live-Hack-CVE/CVE-2022-44012](https://github.com/Live-Hack-CVE/CVE-2022-44012) + +### CVE-2022-44013 (2022-12-24) + + +An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can make various API calls without authentication because the password in a Credential Object is not checked. + + +- [Live-Hack-CVE/CVE-2022-44013](https://github.com/Live-Hack-CVE/CVE-2022-44013) + +### CVE-2022-44014 (2022-12-24) + + +An issue was discovered in Simmeth Lieferantenmanager before 5.6. In the design of the API, a user is inherently able to fetch arbitrary SQL tables. This leaks all user passwords and MSSQL hashes via /DS/LM_API/api/SelectionService/GetPaggedTab. + + +- [Live-Hack-CVE/CVE-2022-44014](https://github.com/Live-Hack-CVE/CVE-2022-44014) + +### CVE-2022-44015 (2022-12-24) + + +An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can inject raw SQL queries. By activating MSSQL features, the attacker is able to execute arbitrary commands on the MSSQL server via the xp_cmdshell extended procedure. + + +- [Live-Hack-CVE/CVE-2022-44015](https://github.com/Live-Hack-CVE/CVE-2022-44015) + +### CVE-2022-44016 (2022-12-24) + + +An issue was discovered in Simmeth Lieferantenmanager before 5.6. An attacker can download arbitrary files from the web server by abusing an API call: /DS/LM_API/api/ConfigurationService/GetImages with an '"ImagesPath":"C:\\"' value. + + +- [Live-Hack-CVE/CVE-2022-44016](https://github.com/Live-Hack-CVE/CVE-2022-44016) + +### CVE-2022-44017 (2022-12-24) + + +An issue was discovered in Simmeth Lieferantenmanager before 5.6. Due to errors in session management, an attacker can log back into a victim's account after the victim logged out - /LMS/LM/#main can be used for this. This is due to the credentials not being cleaned from the local storage after logout. + + +- [Live-Hack-CVE/CVE-2022-44017](https://github.com/Live-Hack-CVE/CVE-2022-44017) + +### CVE-2022-44380 (2022-12-24) + + +Snipe-IT before 6.0.14 is vulnerable to Cross Site Scripting (XSS) for View Assigned Assets. + + +- [Live-Hack-CVE/CVE-2022-44380](https://github.com/Live-Hack-CVE/CVE-2022-44380) + +### CVE-2022-44381 (2022-12-24) + + +Snipe-IT through 6.0.14 allows attackers to check whether a user account exists because of response variations in a /password/reset request. + + +- [Live-Hack-CVE/CVE-2022-44381](https://github.com/Live-Hack-CVE/CVE-2022-44381) + +### CVE-2022-44510 (2022-12-22) + + +Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. + + +- [Live-Hack-CVE/CVE-2022-44510](https://github.com/Live-Hack-CVE/CVE-2022-44510) + +### CVE-2022-44542 (2022-10-31) + + +lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash. + + +- [Live-Hack-CVE/CVE-2022-44542](https://github.com/Live-Hack-CVE/CVE-2022-44542) + +### CVE-2022-44565 (2022-12-23) + + +An improper access validation vulnerability exists in airMAX AC <8.7.11, airFiber 60/LR <2.6.2, airFiber 60 XG/HD <v1.0.0 and airFiber GBE <1.4.1 that allows a malicious actor to retrieve status and usage data from the UISP device. + + +- [Live-Hack-CVE/CVE-2022-44565](https://github.com/Live-Hack-CVE/CVE-2022-44565) + +### CVE-2022-44567 (2022-12-23) + + +A command injection vulnerability exists in Rocket.Chat-Desktop <3.8.14 that could allow an attacker to pass a malicious url of openInternalVideoChatWindow to shell.openExternal(), which may lead to remote code execution (internalVideoChatWindow.ts#L17). To exploit the vulnerability, the internal video chat window must be disabled or a Mac App Store build must be used (internalVideoChatWindow.ts#L14). The vulnerability may be exploited by an XSS attack because the function openInternalVideoChatWindow is exposed in the Rocket.Chat-Desktop-API. + + +- [Live-Hack-CVE/CVE-2022-44567](https://github.com/Live-Hack-CVE/CVE-2022-44567) + +### CVE-2022-44640 (2022-12-24) + + +Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC). + + +- [Live-Hack-CVE/CVE-2022-44640](https://github.com/Live-Hack-CVE/CVE-2022-44640) + +### CVE-2022-45197 (2022-12-24) + + +Slixmpp before 1.8.3 lacks SSL Certificate hostname validation in XMLStream, allowing an attacker to pose as any server in the eyes of Slixmpp. + + +- [Live-Hack-CVE/CVE-2022-45197](https://github.com/Live-Hack-CVE/CVE-2022-45197) + +### CVE-2022-45403 (2022-12-22) + + +Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45403](https://github.com/Live-Hack-CVE/CVE-2022-45403) + +### CVE-2022-45405 (2022-12-22) + + +Freeing arbitrary <code>nsIInputStream</code>'s on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45405](https://github.com/Live-Hack-CVE/CVE-2022-45405) + +### CVE-2022-45406 (2022-12-22) + + +If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45406](https://github.com/Live-Hack-CVE/CVE-2022-45406) + +### CVE-2022-45407 (2022-12-22) + + +If an attacker loaded a font using <code>FontFace()</code> on a background worker, a use-after-free could have occurred, leading to a potentially exploitable crash. This vulnerability affects Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45407](https://github.com/Live-Hack-CVE/CVE-2022-45407) + +### CVE-2022-45408 (2022-12-22) + + +Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45408](https://github.com/Live-Hack-CVE/CVE-2022-45408) + +### CVE-2022-45409 (2022-12-22) + + +The garbage collector could have been aborted in several states and zones and <code>GCRuntime::finishCollection</code> may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45409](https://github.com/Live-Hack-CVE/CVE-2022-45409) + +### CVE-2022-45410 (2022-12-22) + + +When a ServiceWorker intercepted a request with <code>FetchEvent</code>, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45410](https://github.com/Live-Hack-CVE/CVE-2022-45410) + +### CVE-2022-45411 (2022-12-22) + + +Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on <code>fetch()</code> and XMLHttpRequest; however some webservers have implemented non-standard headers such as <code>X-Http-Method-Override</code> that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45411](https://github.com/Live-Hack-CVE/CVE-2022-45411) + +### CVE-2022-45412 (2022-12-22) + + +When resolving a symlink such as <code>file:///proc/self/fd/1</code>, an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. <br>*This bug only affects Thunderbird on Unix-based operated systems (Android, Linux, MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45412](https://github.com/Live-Hack-CVE/CVE-2022-45412) + +### CVE-2022-45413 (2022-12-22) + + +Using the <code>S.browser_fallback_url parameter</code> parameter, an attacker could redirect a user to a URL and cause SameSite=Strict cookies to be sent.<br>*This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45413](https://github.com/Live-Hack-CVE/CVE-2022-45413) + +### CVE-2022-45414 (2022-12-22) + + +If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1. + + +- [Live-Hack-CVE/CVE-2022-45414](https://github.com/Live-Hack-CVE/CVE-2022-45414) + +### CVE-2022-45415 (2022-12-22) + + +When downloading an HTML file, if the title of the page was formatted as a filename with a malicious extension, Firefox may have saved the file with that extension, leading to possible system compromise if the downloaded file was later ran. This vulnerability affects Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45415](https://github.com/Live-Hack-CVE/CVE-2022-45415) + +### CVE-2022-45416 (2022-12-22) + + +Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45416](https://github.com/Live-Hack-CVE/CVE-2022-45416) + +### CVE-2022-45417 (2022-12-22) + + +Service Workers did not detect Private Browsing Mode correctly in all cases, which could have led to Service Workers being written to disk for websites visited in Private Browsing Mode. This would not have persisted them in a state where they would run again, but it would have leaked Private Browsing Mode details to disk. This vulnerability affects Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45417](https://github.com/Live-Hack-CVE/CVE-2022-45417) + +### CVE-2022-45418 (2022-12-22) + + +If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45418](https://github.com/Live-Hack-CVE/CVE-2022-45418) + +### CVE-2022-45419 (2022-12-22) + + +If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45419](https://github.com/Live-Hack-CVE/CVE-2022-45419) + +### CVE-2022-45420 (2022-12-22) + + +Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45420](https://github.com/Live-Hack-CVE/CVE-2022-45420) + +### CVE-2022-45421 (2022-12-22) + + +Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-45421](https://github.com/Live-Hack-CVE/CVE-2022-45421) + +### CVE-2022-45706 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the hostname parameter in the formSetNetCheckTools function. + + +- [Live-Hack-CVE/CVE-2022-45706](https://github.com/Live-Hack-CVE/CVE-2022-45706) + +### CVE-2022-45707 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsHijack function. + + +- [Live-Hack-CVE/CVE-2022-45707](https://github.com/Live-Hack-CVE/CVE-2022-45707) + +### CVE-2022-45708 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the sPortMapIndex parameter in the formDelPortMapping function. + + +- [Live-Hack-CVE/CVE-2022-45708](https://github.com/Live-Hack-CVE/CVE-2022-45708) + +### CVE-2022-45709 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple command injection vulnerabilities via the pEnable, pLevel, and pModule parameters in the formSetDebugCfg function. + + +- [Live-Hack-CVE/CVE-2022-45709](https://github.com/Live-Hack-CVE/CVE-2022-45709) + +### CVE-2022-45710 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the pEnable, pLevel, and pModule parameters in the formSetDebugCfg function. + + +- [Live-Hack-CVE/CVE-2022-45710](https://github.com/Live-Hack-CVE/CVE-2022-45710) + +### CVE-2022-45711 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a command injection vulnerability via the hostname parameter in the formSetNetCheckTools function. + + +- [Live-Hack-CVE/CVE-2022-45711](https://github.com/Live-Hack-CVE/CVE-2022-45711) + +### CVE-2022-45712 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formAddDnsForward function. + + +- [Live-Hack-CVE/CVE-2022-45712](https://github.com/Live-Hack-CVE/CVE-2022-45712) + +### CVE-2022-45714 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the indexSet parameter in the formQOSRuleDel function. + + +- [Live-Hack-CVE/CVE-2022-45714](https://github.com/Live-Hack-CVE/CVE-2022-45714) + +### CVE-2022-45715 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the pLanPortRange and pWanPortRange parameters in the formSetPortMapping function. + + +- [Live-Hack-CVE/CVE-2022-45715](https://github.com/Live-Hack-CVE/CVE-2022-45715) + +### CVE-2022-45716 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the indexSet parameter in the formIPMacBindDel function. + + +- [Live-Hack-CVE/CVE-2022-45716](https://github.com/Live-Hack-CVE/CVE-2022-45716) + +### CVE-2022-45717 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a command injection vulnerability via the usbPartitionName parameter in the formSetUSBPartitionUmount function. This vulnerability is exploited via a crafted GET request. + + +- [Live-Hack-CVE/CVE-2022-45717](https://github.com/Live-Hack-CVE/CVE-2022-45717) + +### CVE-2022-45718 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the rules parameter in the formIPMacBindAdd function. + + +- [Live-Hack-CVE/CVE-2022-45718](https://github.com/Live-Hack-CVE/CVE-2022-45718) + +### CVE-2022-45719 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the gotoUrl parameter in the formPortalAuth function. + + +- [Live-Hack-CVE/CVE-2022-45719](https://github.com/Live-Hack-CVE/CVE-2022-45719) + +### CVE-2022-45720 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain multiple buffer overflows via the ip, mac, and remark parameters in the formIPMacBindModify function. + + +- [Live-Hack-CVE/CVE-2022-45720](https://github.com/Live-Hack-CVE/CVE-2022-45720) + +### CVE-2022-45721 (2022-12-23) + + +IP-COM M50 V15.11.0.33(10768) was discovered to contain a buffer overflow via the picName parameter in the formDelWewifiPic function. + + +- [Live-Hack-CVE/CVE-2022-45721](https://github.com/Live-Hack-CVE/CVE-2022-45721) + +### CVE-2022-45798 (2022-12-22) + + +A link following vulnerability in the Damage Cleanup Engine component of Trend Micro Apex One and Trend Micro Apex One as a Service could allow a local attacker to escalate privileges by creating a symbolic link and abusing the service to delete a file. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-45798](https://github.com/Live-Hack-CVE/CVE-2022-45798) + +### CVE-2022-45889 (2022-12-24) + + +Planet eStream before 6.72.10.07 allows a remote attacker (who is a publisher or admin) to obtain access to all records stored in the database, and achieve the ability to execute arbitrary SQL commands, via Search (the StatisticsResults.aspx flt parameter). + + +- [Live-Hack-CVE/CVE-2022-45889](https://github.com/Live-Hack-CVE/CVE-2022-45889) + +### CVE-2022-45890 (2022-12-24) + + +In Planet eStream before 6.72.10.07, a Reflected Cross-Site Scripting (XSS) vulnerability exists via any metadata filter field (e.g., search within Default.aspx with the r or fo parameter). + + +- [Live-Hack-CVE/CVE-2022-45890](https://github.com/Live-Hack-CVE/CVE-2022-45890) + +### CVE-2022-45891 (2022-12-24) + + +Planet eStream before 6.72.10.07 allows attackers to call restricted functions, and perform unauthenticated uploads (Upload2.ashx) or access content uploaded by other users (View.aspx after Ajax.asmx/SaveGrantAccessList). + + +- [Live-Hack-CVE/CVE-2022-45891](https://github.com/Live-Hack-CVE/CVE-2022-45891) + +### CVE-2022-45892 (2022-12-24) + + +In Planet eStream before 6.72.10.07, multiple Stored Cross-Site Scripting (XSS) vulnerabilities exist: Disclaimer, Search Function, Comments, Batch editing tool, Content Creation, Related Media, Create new user, and Change Username. + + +- [Live-Hack-CVE/CVE-2022-45892](https://github.com/Live-Hack-CVE/CVE-2022-45892) + +### CVE-2022-45893 (2022-12-24) + + +Planet eStream before 6.72.10.07 allows a low-privileged user to gain access to administrative and high-privileged user accounts by changing the value of the ON cookie. A brute-force attack can calculate a value that provides permanent access. + + +- [Live-Hack-CVE/CVE-2022-45893](https://github.com/Live-Hack-CVE/CVE-2022-45893) + +### CVE-2022-45894 (2022-12-24) + + +GetFile.aspx in Planet eStream before 6.72.10.07 allows ..\ directory traversal to read arbitrary local files. + + +- [Live-Hack-CVE/CVE-2022-45894](https://github.com/Live-Hack-CVE/CVE-2022-45894) + +### CVE-2022-45895 (2022-12-24) + + +Planet eStream before 6.72.10.07 discloses sensitive information, related to the ON cookie (findable in HTML source code for Default.aspx in some situations) and the WhoAmI endpoint (e.g., path disclosure). + + +- [Live-Hack-CVE/CVE-2022-45895](https://github.com/Live-Hack-CVE/CVE-2022-45895) + +### CVE-2022-45896 (2022-12-24) + + +Planet eStream before 6.72.10.07 allows unauthenticated upload of arbitrary files: Choose a Video / Related Media or Upload Document. Upload2.ashx can be used, or Ajax.asmx/ProcessUpload2. This leads to remote code execution. + + +- [Live-Hack-CVE/CVE-2022-45896](https://github.com/Live-Hack-CVE/CVE-2022-45896) + +### CVE-2022-45966 (2022-12-22) + + +here is an arbitrary file upload vulnerability in the file management function module of Classcms3.5. + + +- [Live-Hack-CVE/CVE-2022-45966](https://github.com/Live-Hack-CVE/CVE-2022-45966) + +### CVE-2022-46101 (2022-12-22) + + +AyaCMS v3.1.2 was found to have a code flaw in the ust_sql.inc.php file, which allows attackers to cause command execution by inserting malicious code. + + +- [Live-Hack-CVE/CVE-2022-46101](https://github.com/Live-Hack-CVE/CVE-2022-46101) + +### CVE-2022-46102 (2022-12-22) + + +AyaCMS 3.1.2 is vulnerable to Arbitrary file upload via /aya/module/admin/fst_down.inc.php + + +- [Live-Hack-CVE/CVE-2022-46102](https://github.com/Live-Hack-CVE/CVE-2022-46102) + +### CVE-2022-46170 (2022-12-22) + + +CodeIgniter is a PHP full-stack web framework. When an application uses (1) multiple session cookies (e.g., one for user pages and one for admin pages) and (2) a session handler is set to `DatabaseHandler`, `MemcachedHandler`, or `RedisHandler`, then if an attacker gets one session cookie (e.g., one for user pages), they may be able to access pages that require another session cookie (e.g., for admin pages). This issue has been patched, please upgrade to version 4.2.11 or later. As a workaround, use only one session cookie. + + +- [Live-Hack-CVE/CVE-2022-46170](https://github.com/Live-Hack-CVE/CVE-2022-46170) + +### CVE-2022-46171 (2022-12-23) + + +Tauri is a framework for building binaries for all major desktop platforms. The filesystem glob pattern wildcards `*`, `?`, and `[...]` match file path literals and leading dots by default, which unintentionally exposes sub folder content of allowed paths. Scopes without the wildcards are not affected. As `**` allows for sub directories the behavior there is also as expected. The issue has been patched in the latest release and was backported into the currently supported 1.x branches. There are no known workarounds at the time of publication. + + +- [Live-Hack-CVE/CVE-2022-46171](https://github.com/Live-Hack-CVE/CVE-2022-46171) + +### CVE-2022-46175 (2022-12-23) + + +JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. + + +- [Live-Hack-CVE/CVE-2022-46175](https://github.com/Live-Hack-CVE/CVE-2022-46175) + +### CVE-2022-46491 (2022-12-22) + + +A Cross-Site Request Forgery (CSRF) vulnerability in the Add Administrator function of the default version of nbnbk allows attackers to arbitrarily add Administrator accounts. + + +- [Live-Hack-CVE/CVE-2022-46491](https://github.com/Live-Hack-CVE/CVE-2022-46491) + +### CVE-2022-46492 (2022-12-22) + + +nbnbk commit 879858451d53261d10f77d4709aee2d01c72c301 was discovered to contain an arbitrary file read vulnerability via the component /api/Index/getFileBinary. + + +- [Live-Hack-CVE/CVE-2022-46492](https://github.com/Live-Hack-CVE/CVE-2022-46492) + +### CVE-2022-46493 (2022-12-22) + + +Default version of nbnbk was discovered to contain an arbitrary file upload vulnerability via the component /api/User/download_img. + + +- [Live-Hack-CVE/CVE-2022-46493](https://github.com/Live-Hack-CVE/CVE-2022-46493) + +### CVE-2022-46560 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWan2Settings module. + + +- [Live-Hack-CVE/CVE-2022-46560](https://github.com/Live-Hack-CVE/CVE-2022-46560) + +### CVE-2022-46561 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWanSettings module. + + +- [Live-Hack-CVE/CVE-2022-46561](https://github.com/Live-Hack-CVE/CVE-2022-46561) + +### CVE-2022-46562 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the PSK parameter in the SetQuickVPNSettings module. + + +- [Live-Hack-CVE/CVE-2022-46562](https://github.com/Live-Hack-CVE/CVE-2022-46562) + +### CVE-2022-46563 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetDynamicDNSSettings module. + + +- [Live-Hack-CVE/CVE-2022-46563](https://github.com/Live-Hack-CVE/CVE-2022-46563) + +### CVE-2022-46566 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetQuickVPNSettings module. + + +- [Live-Hack-CVE/CVE-2022-46566](https://github.com/Live-Hack-CVE/CVE-2022-46566) + +### CVE-2022-46568 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the AccountPassword parameter in the SetSysEmailSettings module. + + +- [Live-Hack-CVE/CVE-2022-46568](https://github.com/Live-Hack-CVE/CVE-2022-46568) + +### CVE-2022-46569 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Key parameter in the SetWLanRadioSecurity module. + + +- [Live-Hack-CVE/CVE-2022-46569](https://github.com/Live-Hack-CVE/CVE-2022-46569) + +### CVE-2022-46570 (2022-12-23) + + +D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the Password parameter in the SetWan3Settings module. + + +- [Live-Hack-CVE/CVE-2022-46570](https://github.com/Live-Hack-CVE/CVE-2022-46570) + +### CVE-2022-46641 (2022-12-23) + + +D-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the lan(0)_dhcps_staticlist parameter in the SetIpMacBindSettings function. + + +- [Live-Hack-CVE/CVE-2022-46641](https://github.com/Live-Hack-CVE/CVE-2022-46641) + +### CVE-2022-46642 (2022-12-23) + + +D-Link DIR-846 A1_FW100A43 was discovered to contain a command injection vulnerability via the auto_upgrade_hour parameter in the SetAutoUpgradeInfo function. + + +- [Live-Hack-CVE/CVE-2022-46642](https://github.com/Live-Hack-CVE/CVE-2022-46642) + +### CVE-2022-46670 (2022-12-16) + + +Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institute of Technology that the MicroLogix 1100 and 1400 controllers contain a vulnerability that may give an attacker the ability to accomplish remote code execution. The vulnerability is an unauthenticated stored cross-site scripting vulnerability in the embedded webserver. The payload is transferred to the controller over SNMP and is rendered on the homepage of the embedded website. + + +- [Live-Hack-CVE/CVE-2022-46670](https://github.com/Live-Hack-CVE/CVE-2022-46670) + +### CVE-2022-46871 (2022-12-22) + + +An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox < 108. + + +- [Live-Hack-CVE/CVE-2022-46871](https://github.com/Live-Hack-CVE/CVE-2022-46871) + +### CVE-2022-46872 (2022-12-22) + + +An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.<br>*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6. + + +- [Live-Hack-CVE/CVE-2022-46872](https://github.com/Live-Hack-CVE/CVE-2022-46872) + +### CVE-2022-46873 (2022-12-22) + + +Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108. + + +- [Live-Hack-CVE/CVE-2022-46873](https://github.com/Live-Hack-CVE/CVE-2022-46873) + +### CVE-2022-46874 (2022-12-22) + + +A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.<br/>*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6. + + +- [Live-Hack-CVE/CVE-2022-46874](https://github.com/Live-Hack-CVE/CVE-2022-46874) + +### CVE-2022-46875 (2022-12-22) + + +The executable file warning was not presented when downloading .atloc and .ftploc files, which can run commands on a user's computer. <br>*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6. + + +- [Live-Hack-CVE/CVE-2022-46875](https://github.com/Live-Hack-CVE/CVE-2022-46875) + +### CVE-2022-46877 (2022-12-22) + + +By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108. + + +- [Live-Hack-CVE/CVE-2022-46877](https://github.com/Live-Hack-CVE/CVE-2022-46877) + +### CVE-2022-46878 (2022-12-22) + + +Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6. + + +- [Live-Hack-CVE/CVE-2022-46878](https://github.com/Live-Hack-CVE/CVE-2022-46878) + +### CVE-2022-46879 (2022-12-22) + + +Mozilla developers and community members Lukas Bernhard, Gabriele Svelto, Randell Jesup, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108. + + +- [Live-Hack-CVE/CVE-2022-46879](https://github.com/Live-Hack-CVE/CVE-2022-46879) + +### CVE-2022-46880 (2022-12-22) + + +A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.<br />*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR < 102.6, Firefox < 105, and Thunderbird < 102.6. + + +- [Live-Hack-CVE/CVE-2022-46880](https://github.com/Live-Hack-CVE/CVE-2022-46880) + +### CVE-2022-46881 (2022-12-22) + + +An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 106, Firefox ESR < 102.6, and Thunderbird < 102.6. + + +- [Live-Hack-CVE/CVE-2022-46881](https://github.com/Live-Hack-CVE/CVE-2022-46881) + +### CVE-2022-46882 (2022-12-22) + + +A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6. + + +- [Live-Hack-CVE/CVE-2022-46882](https://github.com/Live-Hack-CVE/CVE-2022-46882) + +### CVE-2022-46883 (2022-12-22) + + +Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107. + + +- [Live-Hack-CVE/CVE-2022-46883](https://github.com/Live-Hack-CVE/CVE-2022-46883) + +### CVE-2022-46885 (2022-12-22) + + +Mozilla developers Timothy Nikkel, Ashley Hale, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 106. + + +- [Live-Hack-CVE/CVE-2022-46885](https://github.com/Live-Hack-CVE/CVE-2022-46885) + +### CVE-2022-47514 (2022-12-17) + + +An XML external entity (XXE) injection vulnerability in XML-RPC.NET before 2.5.0 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, as demonstrated by a pingback.aspx POST request. + + +- [Live-Hack-CVE/CVE-2022-47514](https://github.com/Live-Hack-CVE/CVE-2022-47514) + +### CVE-2022-47515 (2022-12-17) + + +An issue was discovered in drachtio-server before 0.8.20. It allows remote attackers to cause a denial of service (daemon crash) via a long message in a TCP request that leads to std::length_error. + + +- [Live-Hack-CVE/CVE-2022-47515](https://github.com/Live-Hack-CVE/CVE-2022-47515) + +### CVE-2022-47518 (2022-12-18) + + +An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames. + + +- [Live-Hack-CVE/CVE-2022-47518](https://github.com/Live-Hack-CVE/CVE-2022-47518) + +### CVE-2022-47519 (2022-12-18) + + +An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames. + + +- [Live-Hack-CVE/CVE-2022-47519](https://github.com/Live-Hack-CVE/CVE-2022-47519) + +### CVE-2022-47520 (2022-12-18) + + +An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet. + + +- [Live-Hack-CVE/CVE-2022-47520](https://github.com/Live-Hack-CVE/CVE-2022-47520) + +### CVE-2022-47521 (2022-12-18) + + +An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames. + + +- [Live-Hack-CVE/CVE-2022-47521](https://github.com/Live-Hack-CVE/CVE-2022-47521) + +### CVE-2022-47524 (2022-12-23) + + +F-Secure SAFE Browser 19.1 before 19.2 for Android allows an IDN homograph attack. + + +- [Live-Hack-CVE/CVE-2022-47524](https://github.com/Live-Hack-CVE/CVE-2022-47524) + +### CVE-2022-47633 (2022-12-23) + + +An image signature validation bypass vulnerability in Kyverno 1.8.3 and 1.8.4 allows a malicious image registry (or a man-in-the-middle attacker) to inject unsigned arbitrary container images into a protected Kubernetes cluster. This is fixed in 1.8.5. This has been fixed in 1.8.5 and mitigations are available for impacted releases. + + +- [Live-Hack-CVE/CVE-2022-47633](https://github.com/Live-Hack-CVE/CVE-2022-47633) + +### CVE-2022-47926 (2022-12-22) + + +AyaCMS 3.1.2 is vulnerable to file deletion via /aya/module/admin/fst_del.inc.php + + +- [Live-Hack-CVE/CVE-2022-47926](https://github.com/Live-Hack-CVE/CVE-2022-47926) + +### CVE-2022-47928 (2022-12-22) + + +In MISP before 2.4.167, there is XSS in the template file uploads in app/View/Templates/upload_file.ctp. + + +- [Live-Hack-CVE/CVE-2022-47928](https://github.com/Live-Hack-CVE/CVE-2022-47928) + +### CVE-2022-47931 (2022-12-22) + + +IO FinNet tss-lib before 2.0.0 allows a collision of hash values. + + +- [Live-Hack-CVE/CVE-2022-47931](https://github.com/Live-Hack-CVE/CVE-2022-47931) + +### CVE-2022-47932 (2022-12-24) + + +Brave Browser before 1.43.34 allowed a remote attacker to cause a denial of service via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This vulnerability is caused by an incomplete fix for CVE-2022-47933. + + +- [Live-Hack-CVE/CVE-2022-47932](https://github.com/Live-Hack-CVE/CVE-2022-47932) + +### CVE-2022-47933 (2022-12-24) + + +Brave Browser before 1.42.51 allowed a remote attacker to cause a denial of service via a crafted HTML file that references the IPFS scheme. This vulnerability is caused by an uncaught exception in the function ipfs::OnBeforeURLRequest_IPFSRedirectWork() in ipfs_redirect_network_delegate_helper.cc. + + +- [Live-Hack-CVE/CVE-2022-47933](https://github.com/Live-Hack-CVE/CVE-2022-47933) + +### CVE-2022-47934 (2022-12-24) + + +Brave Browser before 1.43.88 allowed a remote attacker to cause a denial of service in private and guest windows via a crafted HTML file that mentions an ipfs:// or ipns:// URL. This is caused by an incomplete fix for CVE-2022-47932 and CVE-2022-47934. + + +- [Live-Hack-CVE/CVE-2022-47934](https://github.com/Live-Hack-CVE/CVE-2022-47934) + +### CVE-2022-47938 (2022-12-23) + + +An issue was discovered in ksmbd in the Linux kernel before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT. + + +- [Live-Hack-CVE/CVE-2022-47938](https://github.com/Live-Hack-CVE/CVE-2022-47938) + +### CVE-2022-47939 (2022-12-23) + + +An issue was discovered in ksmbd in the Linux kernel before 5.19.2. fs/ksmbd/smb2pdu.c has a use-after-free and OOPS for SMB2_TREE_DISCONNECT. + + +- [Live-Hack-CVE/CVE-2022-47939](https://github.com/Live-Hack-CVE/CVE-2022-47939) + +### CVE-2022-47940 (2022-12-23) + + +An issue was discovered in ksmbd in the Linux kernel before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write. + + +- [Live-Hack-CVE/CVE-2022-47940](https://github.com/Live-Hack-CVE/CVE-2022-47940) + +### CVE-2022-47941 (2022-12-23) + + +An issue was discovered in ksmbd in the Linux kernel before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak. + + +- [Live-Hack-CVE/CVE-2022-47941](https://github.com/Live-Hack-CVE/CVE-2022-47941) + +### CVE-2022-47942 (2022-12-23) + + +An issue was discovered in ksmbd in the Linux kernel before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl, related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command. + + +- [Live-Hack-CVE/CVE-2022-47942](https://github.com/Live-Hack-CVE/CVE-2022-47942) + +### CVE-2022-47943 (2022-12-23) + + +An issue was discovered in ksmbd in the Linux kernel before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case. + + +- [Live-Hack-CVE/CVE-2022-47943](https://github.com/Live-Hack-CVE/CVE-2022-47943) + +### CVE-2022-47945 (2022-12-23) + + +ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php. + + +- [Live-Hack-CVE/CVE-2022-47945](https://github.com/Live-Hack-CVE/CVE-2022-47945) + +### CVE-2022-47946 (2022-12-23) + + +An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq. + + +- [Live-Hack-CVE/CVE-2022-47946](https://github.com/Live-Hack-CVE/CVE-2022-47946) + +### CVE-2022-47949 (2022-12-24) + + +The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons before 2.0.6 and other products, allows remote attackers to execute arbitrary code via a large UDP packet that causes a buffer overflow, aka ENLBufferPwn. The victim must join a game session with the attacker. Other affected products include Mario Kart 7 before 1.2, Mario Kart 8, Mario Kart 8 Deluxe before 2.1.0, ARMS before 5.4.1, Splatoon, Splatoon 2 before 5.5.1, Splatoon 3 before late 2022, Super Mario Maker 2 before 3.0.2, and Nintendo Switch Sports before late 2022. + + +- [Live-Hack-CVE/CVE-2022-47949](https://github.com/Live-Hack-CVE/CVE-2022-47949) ## 2021 @@ -11953,6 +11967,14 @@ A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. E - [Live-Hack-CVE/CVE-2021-3750](https://github.com/Live-Hack-CVE/CVE-2021-3750) +### CVE-2021-3759 (2022-08-23) + + +A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability. + + +- [Live-Hack-CVE/CVE-2021-3759](https://github.com/Live-Hack-CVE/CVE-2021-3759) + ### CVE-2021-3774 (2021-11-05) @@ -12079,6 +12101,7 @@ A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may l A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine. +- [hifumi1337/CVE-2021-4034](https://github.com/hifumi1337/CVE-2021-4034) - [Live-Hack-CVE/CVE-2021-4034](https://github.com/Live-Hack-CVE/CVE-2021-4034) ### CVE-2021-4053 (2021-12-22) @@ -12225,6 +12248,46 @@ JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when - [Live-Hack-CVE/CVE-2021-4104](https://github.com/Live-Hack-CVE/CVE-2021-4104) +### CVE-2021-4126 (2022-12-22) + + +When receiving an OpenPGP/MIME signed email message that contains an additional outer MIME message layer, for example a message footer added by a mailing list gateway, Thunderbird only considered the inner signed message for the signature validity. This gave the false impression that the additional contents were also covered by the digital signature. Starting with Thunderbird version 91.4.1, only the signature that belongs to the top level MIME part will be considered for the displayed status. This vulnerability affects Thunderbird < 91.4.1. + + +- [Live-Hack-CVE/CVE-2021-4126](https://github.com/Live-Hack-CVE/CVE-2021-4126) + +### CVE-2021-4127 (2022-12-22) + + +An out of date graphics library (Angle) likely contained vulnerabilities that could potentially be exploited. This vulnerability affects Thunderbird < 78.9 and Firefox ESR < 78.9. + + +- [Live-Hack-CVE/CVE-2021-4127](https://github.com/Live-Hack-CVE/CVE-2021-4127) + +### CVE-2021-4128 (2022-12-22) + + +When transitioning in and out of fullscreen mode, a graphics object was not correctly protected; resulting in memory corruption and a potentially exploitable crash.<br>*This bug only affects Firefox on MacOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95. + + +- [Live-Hack-CVE/CVE-2021-4128](https://github.com/Live-Hack-CVE/CVE-2021-4128) + +### CVE-2021-4129 (2022-12-22) + + +Mozilla developers and community members Julian Hector, Randell Jesup, Gabriele Svelto, Tyson Smith, Christian Holler, and Masayuki Nakano reported memory safety bugs present in Firefox 94. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 95, Firefox ESR < 91.4.0, and Thunderbird < 91.4.0. + + +- [Live-Hack-CVE/CVE-2021-4129](https://github.com/Live-Hack-CVE/CVE-2021-4129) + +### CVE-2021-4140 (2022-12-22) + + +It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. + + +- [Live-Hack-CVE/CVE-2021-4140](https://github.com/Live-Hack-CVE/CVE-2021-4140) + ### CVE-2021-4145 (2022-01-25) @@ -12289,6 +12352,38 @@ A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update fun - [Live-Hack-CVE/CVE-2021-4209](https://github.com/Live-Hack-CVE/CVE-2021-4209) +### CVE-2021-4221 (2022-12-22) + + +If a domain name contained a RTL character, it would cause the domain to be rendered to the right of the path. This could lead to user confusion and spoofing attacks. <br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*<br>*Note*: Due to a clerical error this advisory was not included in the original announcement, and was added in Feburary 2022. This vulnerability affects Firefox < 92. + + +- [Live-Hack-CVE/CVE-2021-4221](https://github.com/Live-Hack-CVE/CVE-2021-4221) + +### CVE-2021-4246 (2022-12-17) + + +A vulnerability was found in roxlukas LMeve and classified as critical. Affected by this issue is some unknown functionality of the component Login Page. The manipulation of the argument X-Forwarded-For leads to sql injection. The attack may be launched remotely. The name of the patch is 29e1ead3bb1c1fad53b77dfc14534496421c5b5d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216176. + + +- [Live-Hack-CVE/CVE-2021-4246](https://github.com/Live-Hack-CVE/CVE-2021-4246) + +### CVE-2021-4247 (2022-12-18) + + +A vulnerability has been found in OWASP NodeGoat and classified as problematic. This vulnerability affects unknown code of the file app/routes/research.js of the component Query Parameter Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The name of the patch is 4a4d1db74c63fb4ff8d366551c3af006c25ead12. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216184. + + +- [Live-Hack-CVE/CVE-2021-4247](https://github.com/Live-Hack-CVE/CVE-2021-4247) + +### CVE-2021-4248 (2022-12-18) + + +A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 is able to address this issue. The name of the patch is cf7105aa2aae90d6656088fe5a8ee1d5730773b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188. + + +- [Live-Hack-CVE/CVE-2021-4248](https://github.com/Live-Hack-CVE/CVE-2021-4248) + ### CVE-2021-6857 - [zi0n8/CVE-2021-6857](https://github.com/zi0n8/CVE-2021-6857) @@ -15020,118 +15115,6 @@ SAP NetWeaver AS ABAP, versions - 700, 701, 702, 730, 731, allow a high privileg - [Live-Hack-CVE/CVE-2021-27611](https://github.com/Live-Hack-CVE/CVE-2021-27611) -### CVE-2021-27620 (2021-06-09) - - -SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method Ups::AddPart() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27620](https://github.com/Live-Hack-CVE/CVE-2021-27620) - -### CVE-2021-27622 (2021-06-09) - - -SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CDrawRaster::LoadImageFromMemory() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27622](https://github.com/Live-Hack-CVE/CVE-2021-27622) - -### CVE-2021-27623 (2021-06-09) - - -SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CXmlUtility::CheckLength() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27623](https://github.com/Live-Hack-CVE/CVE-2021-27623) - -### CVE-2021-27624 (2021-06-09) - - -SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CiXMLIStreamRawBuffer::readRaw () which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27624](https://github.com/Live-Hack-CVE/CVE-2021-27624) - -### CVE-2021-27625 (2021-06-09) - - -SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method IgsData::freeMemory() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27625](https://github.com/Live-Hack-CVE/CVE-2021-27625) - -### CVE-2021-27626 (2021-06-09) - - -SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CMiniXMLParser::Parse() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27626](https://github.com/Live-Hack-CVE/CVE-2021-27626) - -### CVE-2021-27627 (2021-06-09) - - -SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method ChartInterpreter::DoIt() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27627](https://github.com/Live-Hack-CVE/CVE-2021-27627) - -### CVE-2021-27628 (2021-06-09) - - -SAP NetWeaver ABAP Server and ABAP Platform (Dispatcher), versions - KRNL32NUC - 7.22,7.22EXT, KRNL32UC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method DpRTmPrepareReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27628](https://github.com/Live-Hack-CVE/CVE-2021-27628) - -### CVE-2021-27629 (2021-06-09) - - -SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EncPSetUnsupported() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27629](https://github.com/Live-Hack-CVE/CVE-2021-27629) - -### CVE-2021-27630 (2021-06-09) - - -SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EnqConvUniToSrvReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27630](https://github.com/Live-Hack-CVE/CVE-2021-27630) - -### CVE-2021-27631 (2021-06-09) - - -SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EnqConvUniToSrvReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27631](https://github.com/Live-Hack-CVE/CVE-2021-27631) - -### CVE-2021-27632 (2021-06-09) - - -SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EnqConvUniToSrvReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27632](https://github.com/Live-Hack-CVE/CVE-2021-27632) - -### CVE-2021-27633 (2021-06-09) - - -SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method ThCPIC() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27633](https://github.com/Live-Hack-CVE/CVE-2021-27633) - -### CVE-2021-27634 (2021-06-09) - - -SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method ThCpicDtCreate () causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. - - -- [Live-Hack-CVE/CVE-2021-27634](https://github.com/Live-Hack-CVE/CVE-2021-27634) - ### CVE-2021-27651 (2021-04-29) @@ -15166,14 +15149,6 @@ Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed usi - [Live-Hack-CVE/CVE-2021-27854](https://github.com/Live-Hack-CVE/CVE-2021-27854) -### CVE-2021-27855 (2021-12-15) - - -FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, authenticated attacker with read-only privileges to grant themselves administrative privileges. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA001. - - -- [Live-Hack-CVE/CVE-2021-27855](https://github.com/Live-Hack-CVE/CVE-2021-27855) - ### CVE-2021-27861 (2022-09-27) @@ -15551,6 +15526,7 @@ Wordpress is an open source CMS. A user with the ability to upload files (like a - [Vulnmachines/wordpress_cve-2021-29447](https://github.com/Vulnmachines/wordpress_cve-2021-29447) - [dnr6419/CVE-2021-29447](https://github.com/dnr6419/CVE-2021-29447) - [Live-Hack-CVE/CVE-2021-29447](https://github.com/Live-Hack-CVE/CVE-2021-29447) +- [Ki11i0n4ir3/CVE-2021-29447](https://github.com/Ki11i0n4ir3/CVE-2021-29447) ### CVE-2021-29465 (2021-04-21) @@ -16444,6 +16420,14 @@ Helm is a tool for managing Charts (packages of pre-configured Kubernetes resour - [Live-Hack-CVE/CVE-2021-32690](https://github.com/Live-Hack-CVE/CVE-2021-32690) +### CVE-2021-32692 (2022-12-22) + + +Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file. + + +- [Live-Hack-CVE/CVE-2021-32692](https://github.com/Live-Hack-CVE/CVE-2021-32692) + ### CVE-2021-32695 (2021-06-17) @@ -16909,6 +16893,14 @@ Missing check in DataCommunicator class in com.vaadin:vaadin-server versions 8.0 - [Live-Hack-CVE/CVE-2021-33609](https://github.com/Live-Hack-CVE/CVE-2021-33609) +### CVE-2021-33623 (2021-05-28) + + +The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method. + + +- [Live-Hack-CVE/CVE-2021-33623](https://github.com/Live-Hack-CVE/CVE-2021-33623) + ### CVE-2021-33624 (2021-06-23) @@ -16917,6 +16909,14 @@ In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mis - [benschlueter/CVE-2021-33624](https://github.com/benschlueter/CVE-2021-33624) +### CVE-2021-33640 (2022-12-19) + + +After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free). + + +- [Live-Hack-CVE/CVE-2021-33640](https://github.com/Live-Hack-CVE/CVE-2021-33640) + ### CVE-2021-33655 (2022-07-18) @@ -17904,14 +17904,6 @@ Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerab - [Live-Hack-CVE/CVE-2021-36614](https://github.com/Live-Hack-CVE/CVE-2021-36614) -### CVE-2021-36690 (2021-08-24) - - -** DISPUTED ** A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library. - - -- [Live-Hack-CVE/CVE-2021-36690](https://github.com/Live-Hack-CVE/CVE-2021-36690) - ### CVE-2021-36723 (2021-12-29) @@ -20392,6 +20384,14 @@ An attacker with access to a malicious hypervisor may be able to infer data valu - [Live-Hack-CVE/CVE-2021-46744](https://github.com/Live-Hack-CVE/CVE-2021-46744) +### CVE-2021-46784 (2022-07-17) + + +In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses. + + +- [Live-Hack-CVE/CVE-2021-46784](https://github.com/Live-Hack-CVE/CVE-2021-46784) + ### CVE-2021-46829 (2022-07-24) @@ -20929,14 +20929,6 @@ A remote code execution vulnerability exists in Windows Domain Name System serve - [psc4re/NSE-scripts](https://github.com/psc4re/NSE-scripts) -### CVE-2020-1472 (2020-08-17) - - -An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. - - -- [sv3nbeast/CVE-2020-1472](https://github.com/sv3nbeast/CVE-2020-1472) - ### CVE-2020-1493 (2020-08-17) @@ -21691,6 +21683,14 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [Live-Hack-CVE/CVE-2020-2963](https://github.com/Live-Hack-CVE/CVE-2020-2963) +### CVE-2020-3118 (2020-02-05) + + +A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device. The vulnerability is due to improper validation of string input from certain fields in Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges on an affected device. Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). + + +- [Live-Hack-CVE/CVE-2020-3118](https://github.com/Live-Hack-CVE/CVE-2020-3118) + ### CVE-2020-3153 (2020-02-19) @@ -21701,6 +21701,14 @@ A vulnerability in the installer component of Cisco AnyConnect Secure Mobility C - [raspberry-pie/CVE-2020-3153](https://github.com/raspberry-pie/CVE-2020-3153) - [goichot/CVE-2020-3153](https://github.com/goichot/CVE-2020-3153) +### CVE-2020-3227 (2020-06-03) + + +A vulnerability in the authorization controls for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute Cisco IOx API commands without proper authorization. The vulnerability is due to incorrect handling of requests for authorization tokens. An attacker could exploit this vulnerability by using a crafted API call to request such a token. An exploit could allow the attacker to obtain an authorization token and execute any of the IOx API commands on an affected device. + + +- [Live-Hack-CVE/CVE-2020-3227](https://github.com/Live-Hack-CVE/CVE-2020-3227) + ### CVE-2020-3315 (2020-05-06) @@ -21931,14 +21939,6 @@ The Dell Isilon OneFS versions 8.2.2 and earlier SSHD process improperly allows - [Live-Hack-CVE/CVE-2020-5355](https://github.com/Live-Hack-CVE/CVE-2020-5355) -### CVE-2020-5377 (2020-07-28) - - -Dell EMC OpenManage Server Administrator (OMSA) versions 9.4 and prior contain multiple path traversal vulnerabilities. An unauthenticated remote attacker could potentially exploit these vulnerabilities by sending a crafted Web API request containing directory traversal character sequences to gain file system access on the compromised management station. - - -- [und3sc0n0c1d0/AFR-in-OMSA](https://github.com/und3sc0n0c1d0/AFR-in-OMSA) - ### CVE-2020-5398 (2020-01-16) @@ -21986,7 +21986,6 @@ Open redirect vulnerability in CyberMail Ver.6.x and Ver.7.x allows remote attac Relative path traversal in Druva inSync Windows Client 6.6.3 allows a local, unauthenticated attacker to execute arbitrary operating system commands with SYSTEM privileges. -- [yevh/CVE-2020-5752-Druva-inSync-Windows-Client-6.6.3---Local-Privilege-Escalation-PowerShell-](https://github.com/yevh/CVE-2020-5752-Druva-inSync-Windows-Client-6.6.3---Local-Privilege-Escalation-PowerShell-) - [Live-Hack-CVE/CVE-2020-5752](https://github.com/Live-Hack-CVE/CVE-2020-5752) ### CVE-2020-5837 (2020-05-11) @@ -22614,14 +22613,6 @@ Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) for Wind - [Live-Hack-CVE/CVE-2020-7346](https://github.com/Live-Hack-CVE/CVE-2020-7346) -### CVE-2020-7461 (2021-03-26) - - -In FreeBSD 12.1-STABLE before r365010, 11.4-STABLE before r365011, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, dhclient(8) fails to handle certain malformed input related to handling of DHCP option 119 resulting a heap overflow. The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit. - - -- [0xkol/freebsd-dhclient-poc](https://github.com/0xkol/freebsd-dhclient-poc) - ### CVE-2020-7471 (2020-02-03) @@ -26567,6 +26558,22 @@ When recursing through graphical layers while scrolling, an iterator may have be - [Live-Hack-CVE/CVE-2020-15678](https://github.com/Live-Hack-CVE/CVE-2020-15678) +### CVE-2020-15679 (2022-12-22) + + +An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions. This vulnerability affects Mozilla VPN iOS 1.0.7 < (929), Mozilla VPN Windows < 1.2.2, and Mozilla VPN Android 1.1.0 < (1360). + + +- [Live-Hack-CVE/CVE-2020-15679](https://github.com/Live-Hack-CVE/CVE-2020-15679) + +### CVE-2020-15685 (2022-12-22) + + +During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7. + + +- [Live-Hack-CVE/CVE-2020-15685](https://github.com/Live-Hack-CVE/CVE-2020-15685) + ### CVE-2020-15706 (2020-07-29) @@ -28525,7 +28532,6 @@ Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local pri ** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2. -- [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790) - [Live-Hack-CVE/CVE-2020-25790](https://github.com/Live-Hack-CVE/CVE-2020-25790) ### CVE-2020-25834 (2020-11-16) @@ -28640,6 +28646,14 @@ Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version - [Live-Hack-CVE/CVE-2020-26298](https://github.com/Live-Hack-CVE/CVE-2020-26298) +### CVE-2020-26302 (2022-12-22) + + +is.js is a general-purpose check library. Versions 0.9.0 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). is.js uses a regex copy-pasted from a gist to validate URLs. Trying to validate a malicious string can cause the regex to loop “forever." This vulnerability was found using a CodeQL query which identifies inefficient regular expressions. is.js has no patch for this issue. + + +- [Live-Hack-CVE/CVE-2020-26302](https://github.com/Live-Hack-CVE/CVE-2020-26302) + ### CVE-2020-26555 (2021-05-24) @@ -28888,14 +28902,6 @@ A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not - [Live-Hack-CVE/CVE-2020-27779](https://github.com/Live-Hack-CVE/CVE-2020-27779) -### CVE-2020-27786 (2020-12-10) - - -A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. - - -- [kiks7/CVE-2020-27786-Kernel-Exploit](https://github.com/kiks7/CVE-2020-27786-Kernel-Exploit) - ### CVE-2020-27796 (2022-08-25) @@ -29617,6 +29623,14 @@ An information leakage vulnerability in the Bluetooth Low Energy advertisement s - [Live-Hack-CVE/CVE-2020-35473](https://github.com/Live-Hack-CVE/CVE-2020-35473) +### CVE-2020-35476 (2020-12-16) + + +A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.) + + +- [Live-Hack-CVE/CVE-2020-35476](https://github.com/Live-Hack-CVE/CVE-2020-35476) + ### CVE-2020-35478 (2020-12-18) @@ -45621,6 +45635,7 @@ Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validati - [c0d3z3r0/sudo-CVE-2017-1000367](https://github.com/c0d3z3r0/sudo-CVE-2017-1000367) - [homjxi0e/CVE-2017-1000367](https://github.com/homjxi0e/CVE-2017-1000367) - [pucerpocok/sudo_exploit](https://github.com/pucerpocok/sudo_exploit) +- [Live-Hack-CVE/CVE-2017-1000367](https://github.com/Live-Hack-CVE/CVE-2017-1000367) ### CVE-2017-1000405 (2017-11-30) @@ -50522,6 +50537,14 @@ host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable fi - [mbadanoiu/CVE-2014-5284](https://github.com/mbadanoiu/CVE-2014-5284) +### CVE-2014-6230 (2014-10-24) + + +WP-Ban plugin before 1.6.4 for WordPress, when running in certain configurations, allows remote attackers to bypass the IP blacklist via a crafted X-Forwarded-For header. + + +- [Live-Hack-CVE/CVE-2014-6230](https://github.com/Live-Hack-CVE/CVE-2014-6230) + ### CVE-2014-6271 (2014-09-24)