Auto Update 2022/12/19 06:19:54

This commit is contained in:
motikan2010-bot 2022-12-19 15:19:55 +09:00
parent 65209b5266
commit 8a2032ec0c
23 changed files with 106 additions and 76 deletions

View file

@ -13,10 +13,10 @@
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).", "description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
"fork": false, "fork": false,
"created_at": "2018-08-17T23:48:15Z", "created_at": "2018-08-17T23:48:15Z",
"updated_at": "2022-12-12T14:04:45Z", "updated_at": "2022-12-19T02:37:07Z",
"pushed_at": "2019-11-15T08:12:32Z", "pushed_at": "2019-11-15T08:12:32Z",
"stargazers_count": 138, "stargazers_count": 139,
"watchers_count": 138, "watchers_count": 139,
"has_discussions": false, "has_discussions": false,
"forks_count": 34, "forks_count": 34,
"allow_forking": true, "allow_forking": true,
@ -34,7 +34,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 34, "forks": 34,
"watchers": 138, "watchers": 139,
"score": 0 "score": 0
}, },
{ {

View file

@ -42,10 +42,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false, "fork": false,
"created_at": "2019-12-21T22:45:55Z", "created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-12-04T04:31:51Z", "updated_at": "2022-12-19T02:43:35Z",
"pushed_at": "2020-01-05T21:46:25Z", "pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 587, "stargazers_count": 588,
"watchers_count": 587, "watchers_count": 588,
"has_discussions": false, "has_discussions": false,
"forks_count": 128, "forks_count": 128,
"allow_forking": true, "allow_forking": true,
@ -67,7 +67,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 128, "forks": 128,
"watchers": 587, "watchers": 588,
"score": 0 "score": 0
} }
] ]

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-12-17T13:20:58Z", "updated_at": "2022-12-19T00:58:48Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3639, "stargazers_count": 3640,
"watchers_count": 3639, "watchers_count": 3640,
"has_discussions": false, "has_discussions": false,
"forks_count": 1049, "forks_count": 1049,
"allow_forking": true, "allow_forking": true,
@ -74,7 +74,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1049, "forks": 1049,
"watchers": 3639, "watchers": 3640,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege", "description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false, "fork": false,
"created_at": "2020-02-11T16:42:34Z", "created_at": "2020-02-11T16:42:34Z",
"updated_at": "2022-11-29T15:20:57Z", "updated_at": "2022-12-19T02:12:09Z",
"pushed_at": "2021-12-23T16:28:28Z", "pushed_at": "2021-12-23T16:28:28Z",
"stargazers_count": 313, "stargazers_count": 314,
"watchers_count": 313, "watchers_count": 314,
"has_discussions": false, "has_discussions": false,
"forks_count": 53, "forks_count": 53,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 53, "forks": 53,
"watchers": 313, "watchers": 314,
"score": 0 "score": 0
} }
] ]

View file

@ -432,10 +432,10 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796", "description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false, "fork": false,
"created_at": "2020-03-12T18:34:40Z", "created_at": "2020-03-12T18:34:40Z",
"updated_at": "2022-12-03T22:35:28Z", "updated_at": "2022-12-19T01:43:25Z",
"pushed_at": "2022-11-28T04:18:42Z", "pushed_at": "2022-11-28T04:18:42Z",
"stargazers_count": 292, "stargazers_count": 293,
"watchers_count": 292, "watchers_count": 293,
"has_discussions": false, "has_discussions": false,
"forks_count": 115, "forks_count": 115,
"allow_forking": true, "allow_forking": true,
@ -449,7 +449,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 115, "forks": 115,
"watchers": 292, "watchers": 293,
"score": 0 "score": 0
}, },
{ {

View file

@ -165,10 +165,10 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2022-12-15T22:15:52Z", "updated_at": "2022-12-19T06:18:23Z",
"pushed_at": "2020-10-15T18:31:15Z", "pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 496, "stargazers_count": 497,
"watchers_count": 496, "watchers_count": 497,
"has_discussions": false, "has_discussions": false,
"forks_count": 138, "forks_count": 138,
"allow_forking": true, "allow_forking": true,
@ -177,7 +177,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 138, "forks": 138,
"watchers": 496, "watchers": 497,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-12-17T13:20:58Z", "updated_at": "2022-12-19T00:58:48Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3639, "stargazers_count": 3640,
"watchers_count": 3639, "watchers_count": 3640,
"has_discussions": false, "has_discussions": false,
"forks_count": 1049, "forks_count": 1049,
"allow_forking": true, "allow_forking": true,
@ -45,7 +45,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1049, "forks": 1049,
"watchers": 3639, "watchers": 3640,
"score": 0 "score": 0
}, },
{ {

View file

@ -196,13 +196,13 @@
"stargazers_count": 102, "stargazers_count": 102,
"watchers_count": 102, "watchers_count": 102,
"has_discussions": false, "has_discussions": false,
"forks_count": 54, "forks_count": 55,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 54, "forks": 55,
"watchers": 102, "watchers": 102,
"score": 0 "score": 0
}, },

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2021-11-06T22:12:35Z", "created_at": "2021-11-06T22:12:35Z",
"updated_at": "2022-08-26T14:19:20Z", "updated_at": "2022-08-26T14:19:20Z",
"pushed_at": "2022-12-15T05:05:01Z", "pushed_at": "2022-12-19T05:08:23Z",
"stargazers_count": 5, "stargazers_count": 5,
"watchers_count": 5, "watchers_count": 5,
"has_discussions": false, "has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2021-43848", "description": "exploit for CVE-2021-43848",
"fork": false, "fork": false,
"created_at": "2022-02-03T16:31:13Z", "created_at": "2022-02-03T16:31:13Z",
"updated_at": "2022-11-02T05:43:04Z", "updated_at": "2022-12-19T02:59:41Z",
"pushed_at": "2022-02-03T16:36:55Z", "pushed_at": "2022-02-03T16:36:55Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 9, "watchers": 10,
"score": 0 "score": 0
} }
] ]

View file

@ -1020,10 +1020,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false, "fork": false,
"created_at": "2021-12-13T03:57:50Z", "created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-12-18T17:06:57Z", "updated_at": "2022-12-19T03:39:54Z",
"pushed_at": "2022-11-23T18:23:24Z", "pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3144, "stargazers_count": 3145,
"watchers_count": 3144, "watchers_count": 3145,
"has_discussions": true, "has_discussions": true,
"forks_count": 736, "forks_count": 736,
"allow_forking": true, "allow_forking": true,
@ -1032,7 +1032,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 736, "forks": 736,
"watchers": 3144, "watchers": 3145,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Adobe Reader DC Information Leak Exploit ", "description": "Adobe Reader DC Information Leak Exploit ",
"fork": false, "fork": false,
"created_at": "2022-10-13T16:42:10Z", "created_at": "2022-10-13T16:42:10Z",
"updated_at": "2022-12-16T07:31:31Z", "updated_at": "2022-12-19T02:05:20Z",
"pushed_at": "2022-10-13T17:00:50Z", "pushed_at": "2022-10-13T17:00:50Z",
"stargazers_count": 18, "stargazers_count": 19,
"watchers_count": 18, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
@ -31,7 +31,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 18, "watchers": 19,
"score": 0 "score": 0
} }
] ]

View file

@ -1535,11 +1535,11 @@
"html_url": "https:\/\/github.com\/tmoneypenny" "html_url": "https:\/\/github.com\/tmoneypenny"
}, },
"html_url": "https:\/\/github.com\/tmoneypenny\/CVE-2022-0847", "html_url": "https:\/\/github.com\/tmoneypenny\/CVE-2022-0847",
"description": "Poc", "description": "Dirty Pipe - CVE-2022-0847",
"fork": false, "fork": false,
"created_at": "2022-03-22T03:17:51Z", "created_at": "2022-03-22T03:17:51Z",
"updated_at": "2022-09-13T01:14:52Z", "updated_at": "2022-12-19T06:10:11Z",
"pushed_at": "2022-09-12T21:28:34Z", "pushed_at": "2022-12-19T06:10:52Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"has_discussions": false, "has_discussions": false,

View file

@ -1418,10 +1418,10 @@
"description": "Nacos下Spring-Cloud-Gateway CVE-2022-22947利用环境", "description": "Nacos下Spring-Cloud-Gateway CVE-2022-22947利用环境",
"fork": false, "fork": false,
"created_at": "2022-06-25T05:02:06Z", "created_at": "2022-06-25T05:02:06Z",
"updated_at": "2022-12-05T09:03:26Z", "updated_at": "2022-12-19T03:03:13Z",
"pushed_at": "2022-06-25T13:43:53Z", "pushed_at": "2022-06-25T13:43:53Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -1430,7 +1430,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 6, "watchers": 7,
"score": 0 "score": 0
}, },
{ {

View file

@ -47,13 +47,13 @@
"stargazers_count": 25, "stargazers_count": 25,
"watchers_count": 25, "watchers_count": 25,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 10,
"watchers": 25, "watchers": 25,
"score": 0 "score": 0
}, },

View file

@ -13,12 +13,12 @@
"description": "Foxit PDF Reader Remote Code Execution Exploit", "description": "Foxit PDF Reader Remote Code Execution Exploit",
"fork": false, "fork": false,
"created_at": "2022-12-02T18:52:20Z", "created_at": "2022-12-02T18:52:20Z",
"updated_at": "2022-12-19T00:21:13Z", "updated_at": "2022-12-19T04:11:45Z",
"pushed_at": "2022-12-16T05:29:11Z", "pushed_at": "2022-12-16T05:29:11Z",
"stargazers_count": 67, "stargazers_count": 71,
"watchers_count": 67, "watchers_count": 71,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -35,8 +35,8 @@
"use-after-free" "use-after-free"
], ],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 13,
"watchers": 67, "watchers": 71,
"score": 0 "score": 0
} }
] ]

View file

@ -18,13 +18,13 @@
"stargazers_count": 31, "stargazers_count": 31,
"watchers_count": 31, "watchers_count": 31,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 10,
"watchers": 31, "watchers": 31,
"score": 0 "score": 0
} }

View file

@ -220,10 +220,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ", "description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false, "fork": false,
"created_at": "2022-09-26T08:58:21Z", "created_at": "2022-09-26T08:58:21Z",
"updated_at": "2022-12-15T07:35:27Z", "updated_at": "2022-12-19T04:10:20Z",
"pushed_at": "2022-09-26T13:20:38Z", "pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 174, "stargazers_count": 176,
"watchers_count": 174, "watchers_count": 176,
"has_discussions": false, "has_discussions": false,
"forks_count": 32, "forks_count": 32,
"allow_forking": true, "allow_forking": true,
@ -236,7 +236,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 32,
"watchers": 174, "watchers": 176,
"score": 0 "score": 0
}, },
{ {

View file

@ -228,10 +228,10 @@
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.", "description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
"fork": false, "fork": false,
"created_at": "2022-10-20T03:11:03Z", "created_at": "2022-10-20T03:11:03Z",
"updated_at": "2022-11-16T07:01:01Z", "updated_at": "2022-12-19T04:32:38Z",
"pushed_at": "2022-10-20T06:36:42Z", "pushed_at": "2022-10-20T06:36:42Z",
"stargazers_count": 24, "stargazers_count": 23,
"watchers_count": 24, "watchers_count": 23,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -240,7 +240,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 24, "watchers": 23,
"score": 0 "score": 0
}, },
{ {

View file

@ -85,5 +85,34 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 579853949,
"name": "external_expat_2.1.0_CVE-2022-43680",
"full_name": "nidhihcl\/external_expat_2.1.0_CVE-2022-43680",
"owner": {
"login": "nidhihcl",
"id": 121002296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121002296?v=4",
"html_url": "https:\/\/github.com\/nidhihcl"
},
"html_url": "https:\/\/github.com\/nidhihcl\/external_expat_2.1.0_CVE-2022-43680",
"description": null,
"fork": false,
"created_at": "2022-12-19T05:09:12Z",
"updated_at": "2022-12-19T05:25:40Z",
"pushed_at": "2022-12-19T05:26:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -18,13 +18,13 @@
"stargazers_count": 7, "stargazers_count": 7,
"watchers_count": 7, "watchers_count": 7,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 4,
"watchers": 7, "watchers": 7,
"score": 0 "score": 0
} }

View file

@ -13,19 +13,19 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.", "description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false, "fork": false,
"created_at": "2022-12-17T16:45:24Z", "created_at": "2022-12-17T16:45:24Z",
"updated_at": "2022-12-18T23:48:41Z", "updated_at": "2022-12-19T06:12:10Z",
"pushed_at": "2022-12-17T16:45:42Z", "pushed_at": "2022-12-17T16:45:42Z",
"stargazers_count": 66, "stargazers_count": 75,
"watchers_count": 66, "watchers_count": 75,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 66, "watchers": 75,
"score": 0 "score": 0
} }
] ]

View file

@ -4715,6 +4715,7 @@ In libexpat through 2.4.9, there is a use-after free caused by overeager destruc
- [nidhi7598/G3_expat-2.2.6_CVE-2022-43680](https://github.com/nidhi7598/G3_expat-2.2.6_CVE-2022-43680) - [nidhi7598/G3_expat-2.2.6_CVE-2022-43680](https://github.com/nidhi7598/G3_expat-2.2.6_CVE-2022-43680)
- [nidhi7598/expat_2.1.0-_CVE-2022-43680](https://github.com/nidhi7598/expat_2.1.0-_CVE-2022-43680) - [nidhi7598/expat_2.1.0-_CVE-2022-43680](https://github.com/nidhi7598/expat_2.1.0-_CVE-2022-43680)
- [Trinadh465/external_expat-2.1.0_CVE-2022-43680](https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-43680) - [Trinadh465/external_expat-2.1.0_CVE-2022-43680](https://github.com/Trinadh465/external_expat-2.1.0_CVE-2022-43680)
- [nidhihcl/external_expat_2.1.0_CVE-2022-43680](https://github.com/nidhihcl/external_expat_2.1.0_CVE-2022-43680)
### CVE-2022-43959 ### CVE-2022-43959
- [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959) - [secware-ru/CVE-2022-43959](https://github.com/secware-ru/CVE-2022-43959)