Auto Update 2023/12/08 12:42:34

This commit is contained in:
motikan2010-bot 2023-12-08 21:42:34 +09:00
parent 12ba27b4fa
commit 99baba011a
53 changed files with 381 additions and 213 deletions

View file

@ -13,10 +13,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2023-11-09T00:24:42Z",
"updated_at": "2023-12-08T11:24:21Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2300,
"watchers_count": 2300,
"stargazers_count": 2298,
"watchers_count": 2298,
"has_discussions": false,
"forks_count": 485,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 485,
"watchers": 2300,
"watchers": 2298,
"score": 0,
"subscribers_count": 118
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-07T07:16:10Z",
"updated_at": "2023-12-08T11:24:14Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1848,
"watchers_count": 1848,
"stargazers_count": 1846,
"watchers_count": 1846,
"has_discussions": false,
"forks_count": 340,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1848,
"watchers": 1846,
"score": 0,
"subscribers_count": 34
},

View file

@ -209,6 +209,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 30004399,
"name": "cfengine-CVE_2015_0235",
"full_name": "nickanderson\/cfengine-CVE_2015_0235",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
"description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
"fork": false,
"created_at": "2015-01-29T04:58:54Z",
"updated_at": "2016-02-13T01:41:47Z",
"pushed_at": "2015-01-29T21:23:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 30008427,
"name": "cookbook-update-glibc",
@ -269,6 +299,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 30066365,
"name": "CVE-2015-0235",
"full_name": "tobyzxj\/CVE-2015-0235",
"owner": {
"login": "tobyzxj",
"id": 4661855,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4661855?v=4",
"html_url": "https:\/\/github.com\/tobyzxj"
},
"html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
"description": "glibc gethostbyname bug",
"fork": false,
"created_at": "2015-01-30T09:58:09Z",
"updated_at": "2023-09-28T10:27:22Z",
"pushed_at": "2015-01-30T10:02:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 30183649,
"name": "CVE-2015-0235-workaround",

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-07T07:16:10Z",
"updated_at": "2023-12-08T11:24:14Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1848,
"watchers_count": 1848,
"stargazers_count": 1846,
"watchers_count": 1846,
"has_discussions": false,
"forks_count": 340,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1848,
"watchers": 1846,
"score": 0,
"subscribers_count": 34
},

View file

@ -263,10 +263,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2023-12-04T09:26:56Z",
"updated_at": "2023-12-08T06:24:27Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 295,
"watchers_count": 295,
"stargazers_count": 296,
"watchers_count": 296,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -279,7 +279,7 @@
],
"visibility": "public",
"forks": 123,
"watchers": 295,
"watchers": 296,
"score": 0,
"subscribers_count": 16
},

View file

@ -444,10 +444,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2023-12-06T00:51:26Z",
"updated_at": "2023-12-08T08:26:59Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 409,
"watchers_count": 409,
"stargazers_count": 410,
"watchers_count": 410,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -456,7 +456,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 409,
"watchers": 410,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-07T07:16:10Z",
"updated_at": "2023-12-08T11:24:14Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1848,
"watchers_count": 1848,
"stargazers_count": 1846,
"watchers_count": 1846,
"has_discussions": false,
"forks_count": 340,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1848,
"watchers": 1846,
"score": 0,
"subscribers_count": 34
},

View file

@ -119,10 +119,10 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2023-12-05T16:47:37Z",
"updated_at": "2023-12-08T10:55:12Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -131,7 +131,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 86,
"watchers": 87,
"score": 0,
"subscribers_count": 1
},

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-07T07:16:10Z",
"updated_at": "2023-12-08T11:24:14Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1848,
"watchers_count": 1848,
"stargazers_count": 1846,
"watchers_count": 1846,
"has_discussions": false,
"forks_count": 340,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1848,
"watchers": 1846,
"score": 0,
"subscribers_count": 34
},

View file

@ -368,13 +368,13 @@
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 67,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 67,
"forks": 66,
"watchers": 118,
"score": 0,
"subscribers_count": 5

View file

@ -3107,10 +3107,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2023-12-06T14:41:21Z",
"updated_at": "2023-12-08T06:38:50Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -3119,7 +3119,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2023-09-28T11:12:19Z",
"updated_at": "2023-12-08T11:55:19Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 130,
"watchers": 129,
"score": 0,
"subscribers_count": 5
},

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-07T07:16:10Z",
"updated_at": "2023-12-08T11:24:14Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1848,
"watchers_count": 1848,
"stargazers_count": 1846,
"watchers_count": 1846,
"has_discussions": false,
"forks_count": 340,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1848,
"watchers": 1846,
"score": 0,
"subscribers_count": 34
}

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2023-12-06T00:51:26Z",
"updated_at": "2023-12-08T08:26:59Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 409,
"watchers_count": 409,
"stargazers_count": 410,
"watchers_count": 410,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 409,
"watchers": 410,
"score": 0,
"subscribers_count": 9
},

View file

@ -109,10 +109,10 @@
"description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)",
"fork": false,
"created_at": "2019-03-23T02:52:31Z",
"updated_at": "2023-12-08T05:51:12Z",
"updated_at": "2023-12-08T09:20:13Z",
"pushed_at": "2023-01-19T12:13:40Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -123,7 +123,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 129,
"watchers": 128,
"score": 0,
"subscribers_count": 7
},

View file

@ -58,5 +58,35 @@
"watchers": 8,
"score": 0,
"subscribers_count": 3
},
{
"id": 729076408,
"name": "cve-2019-6693",
"full_name": "saladandonionrings\/cve-2019-6693",
"owner": {
"login": "saladandonionrings",
"id": 61053314,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61053314?v=4",
"html_url": "https:\/\/github.com\/saladandonionrings"
},
"html_url": "https:\/\/github.com\/saladandonionrings\/cve-2019-6693",
"description": "An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files and all non-administator passwords, private keys and High Availability passwords.",
"fork": false,
"created_at": "2023-12-08T11:00:40Z",
"updated_at": "2023-12-08T11:00:41Z",
"pushed_at": "2023-12-08T11:00:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-12-02T08:28:23Z",
"updated_at": "2023-12-08T11:55:22Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079,
"watchers_count": 1079,
"stargazers_count": 1077,
"watchers_count": 1077,
"has_discussions": false,
"forks_count": 328,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 328,
"watchers": 1079,
"watchers": 1077,
"score": 0,
"subscribers_count": 37
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-12-07T07:16:10Z",
"updated_at": "2023-12-08T11:24:14Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1848,
"watchers_count": 1848,
"stargazers_count": 1846,
"watchers_count": 1846,
"has_discussions": false,
"forks_count": 340,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 1848,
"watchers": 1846,
"score": 0,
"subscribers_count": 34
},
@ -124,10 +124,10 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2023-11-03T10:00:42Z",
"updated_at": "2023-12-08T08:51:01Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 78,
"watchers": 330,
"watchers": 331,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2023-11-28T06:29:50Z",
"updated_at": "2023-12-08T11:56:13Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 66,
"watchers": 65,
"score": 0,
"subscribers_count": 1
},

View file

@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2023-12-02T08:28:23Z",
"updated_at": "2023-12-08T11:55:22Z",
"pushed_at": "2023-05-11T14:36:58Z",
"stargazers_count": 1079,
"watchers_count": 1079,
"stargazers_count": 1077,
"watchers_count": 1077,
"has_discussions": false,
"forks_count": 328,
"allow_forking": true,
@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 328,
"watchers": 1079,
"watchers": 1077,
"score": 0,
"subscribers_count": 37
},

View file

@ -666,13 +666,13 @@
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 17,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 16,
"watchers": 25,
"score": 0,
"subscribers_count": 4

View file

@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2023-12-07T09:42:59Z",
"updated_at": "2023-12-08T11:55:57Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 903,
"watchers_count": 903,
"stargazers_count": 902,
"watchers_count": 902,
"has_discussions": false,
"forks_count": 242,
"allow_forking": true,
@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 242,
"watchers": 903,
"watchers": 902,
"score": 0,
"subscribers_count": 27
},

View file

@ -13,10 +13,10 @@
"description": "nuclei scanner for proxyshell ( CVE-2021-34473 )",
"fork": false,
"created_at": "2021-08-10T15:01:02Z",
"updated_at": "2023-12-07T12:35:46Z",
"updated_at": "2023-12-08T09:13:45Z",
"pushed_at": "2022-10-09T20:34:21Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 2
},

View file

@ -523,10 +523,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2023-12-02T19:58:59Z",
"updated_at": "2023-12-08T11:24:27Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 767,
"watchers_count": 767,
"stargazers_count": 766,
"watchers_count": 766,
"has_discussions": false,
"forks_count": 172,
"allow_forking": true,
@ -542,7 +542,7 @@
],
"visibility": "public",
"forks": 172,
"watchers": 767,
"watchers": 766,
"score": 0,
"subscribers_count": 19
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-12-07T15:09:33Z",
"updated_at": "2023-12-08T09:04:13Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 665,
"watchers_count": 665,
"stargazers_count": 666,
"watchers_count": 666,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 665,
"watchers": 666,
"score": 0,
"subscribers_count": 12
},

View file

@ -912,7 +912,7 @@
"stargazers_count": 1670,
"watchers_count": 1670,
"has_discussions": false,
"forks_count": 493,
"forks_count": 492,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,7 +923,7 @@
"security"
],
"visibility": "public",
"forks": 493,
"forks": 492,
"watchers": 1670,
"score": 0,
"subscribers_count": 25

View file

@ -138,13 +138,13 @@
"stargazers_count": 1059,
"watchers_count": 1059,
"has_discussions": false,
"forks_count": 224,
"forks_count": 223,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 224,
"forks": 223,
"watchers": 1059,
"score": 0,
"subscribers_count": 17

View file

@ -13,10 +13,10 @@
"description": "Android kernel exploitation for CVE-2022-20409",
"fork": false,
"created_at": "2022-11-21T22:42:50Z",
"updated_at": "2023-12-02T11:41:39Z",
"updated_at": "2023-12-08T08:52:35Z",
"pushed_at": "2023-08-05T20:56:12Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 128,
"watchers": 129,
"score": 0,
"subscribers_count": 4
}

View file

@ -73,10 +73,10 @@
"description": "Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit",
"fork": false,
"created_at": "2022-05-28T10:46:48Z",
"updated_at": "2023-04-08T02:29:13Z",
"updated_at": "2023-12-08T11:56:12Z",
"pushed_at": "2022-05-28T10:50:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 14,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-12-03T14:31:03Z",
"updated_at": "2023-12-08T08:06:39Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1080,
"watchers_count": 1080,
"stargazers_count": 1081,
"watchers_count": 1081,
"has_discussions": true,
"forks_count": 185,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 185,
"watchers": 1080,
"watchers": 1081,
"score": 0,
"subscribers_count": 18
},

View file

@ -1,32 +0,0 @@
[
{
"id": 728981786,
"name": "HP-EliteDesk-800-G2-Mini-Drivers",
"full_name": "rhyslhardy\/HP-EliteDesk-800-G2-Mini-Drivers",
"owner": {
"login": "rhyslhardy",
"id": 59371515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59371515?v=4",
"html_url": "https:\/\/github.com\/rhyslhardy"
},
"html_url": "https:\/\/github.com\/rhyslhardy\/HP-EliteDesk-800-G2-Mini-Drivers",
"description": "Drivers for HP EliteDesk 800 G2 Mini - inc missing Intel Bluetooth driver & HP Drivers that address CVE's eg CVE-2022-27635",
"fork": false,
"created_at": "2023-12-08T06:06:22Z",
"updated_at": "2023-12-08T06:06:23Z",
"pushed_at": "2023-12-08T06:06:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Foxit PDF Reader Remote Code Execution Exploit",
"fork": false,
"created_at": "2022-12-02T18:52:20Z",
"updated_at": "2023-12-06T12:35:36Z",
"updated_at": "2023-12-08T11:56:37Z",
"pushed_at": "2023-12-05T12:22:45Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 115,
"watchers": 113,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2023-12-07T07:05:01Z",
"updated_at": "2023-12-08T11:55:29Z",
"pushed_at": "2022-12-13T15:26:57Z",
"stargazers_count": 386,
"watchers_count": 386,
"stargazers_count": 384,
"watchers_count": 384,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 386,
"watchers": 384,
"score": 0,
"subscribers_count": 8
},

View file

@ -232,7 +232,7 @@
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 49,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -242,7 +242,7 @@
"cve-2022-39197"
],
"visibility": "public",
"forks": 49,
"forks": 50,
"watchers": 289,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-40635: Groovy Sandbox Bypass in CrafterCMS",
"fork": false,
"created_at": "2023-12-01T10:28:27Z",
"updated_at": "2023-12-02T13:04:14Z",
"updated_at": "2023-12-08T07:22:30Z",
"pushed_at": "2023-12-01T10:33:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)",
"fork": false,
"created_at": "2022-10-13T18:13:59Z",
"updated_at": "2023-11-24T20:29:10Z",
"updated_at": "2023-12-08T11:56:18Z",
"pushed_at": "2022-10-13T20:13:44Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 86,
"watchers": 85,
"score": 0,
"subscribers_count": 3
},

37
2022/CVE-2022-41343.json Normal file
View file

@ -0,0 +1,37 @@
[
{
"id": 602302259,
"name": "CVE-2022-41343",
"full_name": "BKreisel\/CVE-2022-41343",
"owner": {
"login": "BKreisel",
"id": 1513073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1513073?v=4",
"html_url": "https:\/\/github.com\/BKreisel"
},
"html_url": "https:\/\/github.com\/BKreisel\/CVE-2022-41343",
"description": "🐍 Python Exploit for CVE-2022-23935",
"fork": false,
"created_at": "2023-02-15T23:17:55Z",
"updated_at": "2023-10-16T13:31:27Z",
"pushed_at": "2023-02-17T18:37:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-41343",
"exploit",
"python"
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -10,10 +10,10 @@
"html_url": "https:\/\/github.com\/mbadanoiu"
},
"html_url": "https:\/\/github.com\/mbadanoiu\/CVE-2022-41853",
"description": "Research into CVE-2022-41853. Using static functions to obtian RCE via Java Deserialization",
"description": "Research into CVE-2022-41853: Using static functions to obtian RCE via Java Deserialization & Remote Codebase Attack",
"fork": false,
"created_at": "2023-11-24T10:30:56Z",
"updated_at": "2023-12-03T18:38:12Z",
"updated_at": "2023-12-08T10:02:05Z",
"pushed_at": "2023-11-24T11:44:35Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.",
"fork": false,
"created_at": "2023-02-10T13:02:55Z",
"updated_at": "2023-10-27T14:55:21Z",
"updated_at": "2023-12-08T09:56:40Z",
"pushed_at": "2023-02-13T07:15:28Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 96,
"watchers": 97,
"score": 0,
"subscribers_count": 1
},

32
2023/CVE-2023-21118.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 729085770,
"name": "frameworks_native_AOSP-10_r33_CVE-2023-21118",
"full_name": "Trinadh465\/frameworks_native_AOSP-10_r33_CVE-2023-21118",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_native_AOSP-10_r33_CVE-2023-21118",
"description": null,
"fork": false,
"created_at": "2023-12-08T11:29:23Z",
"updated_at": "2023-12-08T11:31:11Z",
"pushed_at": "2023-12-08T11:31:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2023-12-01T21:48:21Z",
"updated_at": "2023-12-08T12:39:18Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 290,
"watchers_count": 290,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 292,
"watchers": 290,
"score": 0,
"subscribers_count": 5
},

View file

@ -112,10 +112,10 @@
"description": "Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具",
"fork": false,
"created_at": "2023-10-11T08:42:17Z",
"updated_at": "2023-12-08T02:42:50Z",
"updated_at": "2023-12-08T09:39:49Z",
"pushed_at": "2023-10-16T02:24:02Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-12-07T08:17:14Z",
"updated_at": "2023-12-08T12:41:05Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 597,
"watchers_count": 597,
"stargazers_count": 593,
"watchers_count": 593,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 51,
"watchers": 597,
"watchers": 593,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)",
"fork": false,
"created_at": "2023-11-05T16:33:32Z",
"updated_at": "2023-12-05T18:52:34Z",
"updated_at": "2023-12-08T11:40:57Z",
"pushed_at": "2023-11-24T12:55:00Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -108,13 +108,13 @@
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 161,
"score": 0,
"subscribers_count": 4

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2023-12-06T09:03:39Z",
"updated_at": "2023-12-08T11:55:20Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 709,
"watchers_count": 709,
"stargazers_count": 707,
"watchers_count": 707,
"has_discussions": false,
"forks_count": 129,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 129,
"watchers": 709,
"watchers": 707,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2023-12-03T11:02:52Z",
"updated_at": "2023-12-08T12:39:20Z",
"pushed_at": "2023-10-20T23:04:03Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 165,
"watchers": 163,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,19 +13,19 @@
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-12-07T07:07:54Z",
"updated_at": "2023-12-08T12:39:20Z",
"pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 197,
"forks": 44,
"watchers": 196,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Exploits for GL.iNet CVE-2023-46454, CVE-2023-46455 and CVE-2023-46456",
"fork": false,
"created_at": "2023-12-08T01:45:16Z",
"updated_at": "2023-12-08T01:45:48Z",
"updated_at": "2023-12-08T09:15:23Z",
"pushed_at": "2023-12-08T04:35:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -78,13 +78,13 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 40,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-4911 proof of concept",
"fork": false,
"created_at": "2023-10-04T14:32:49Z",
"updated_at": "2023-11-25T10:35:24Z",
"updated_at": "2023-12-08T12:39:20Z",
"pushed_at": "2023-10-08T23:24:24Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 157,
"watchers": 156,
"score": 0,
"subscribers_count": 3
},

View file

@ -348,5 +348,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 729065658,
"name": "cve-2023-4966-iocs",
"full_name": "jmussmann\/cve-2023-4966-iocs",
"owner": {
"login": "jmussmann",
"id": 24474138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24474138?v=4",
"html_url": "https:\/\/github.com\/jmussmann"
},
"html_url": "https:\/\/github.com\/jmussmann\/cve-2023-4966-iocs",
"description": "Python script to search Citrix NetScaler logs for possible CVE-2023-4966 exploitation.",
"fork": false,
"created_at": "2023-12-08T10:28:15Z",
"updated_at": "2023-12-08T10:34:06Z",
"pushed_at": "2023-12-08T10:35:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -844,6 +844,7 @@
- [fdevsectest/CVE-2023-4966](https://github.com/fdevsectest/CVE-2023-4966)
- [s-bt/CVE-2023-4966](https://github.com/s-bt/CVE-2023-4966)
- [byte4RR4Y/CVE-2023-4966](https://github.com/byte4RR4Y/CVE-2023-4966)
- [jmussmann/cve-2023-4966-iocs](https://github.com/jmussmann/cve-2023-4966-iocs)
### CVE-2023-5024 (2023-09-17)
@ -1180,6 +1181,13 @@
- [Trinadh465/frameworks_base_AOSP10_CVE-2023-21109r33_](https://github.com/Trinadh465/frameworks_base_AOSP10_CVE-2023-21109r33_)
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21109](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21109)
### CVE-2023-21118 (2023-05-15)
<code>In unflattenString8 of Sensor.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-269014004
</code>
- [Trinadh465/frameworks_native_AOSP-10_r33_CVE-2023-21118](https://github.com/Trinadh465/frameworks_native_AOSP-10_r33_CVE-2023-21118)
### CVE-2023-21238 (2023-07-12)
<code>In visitUris of RemoteViews.java, there is a possible leak of images between users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
@ -8607,13 +8615,6 @@
- [dolby360/CVE-2022-27518_POC](https://github.com/dolby360/CVE-2022-27518_POC)
### CVE-2022-27635 (2023-08-10)
<code>Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
</code>
- [rhyslhardy/HP-EliteDesk-800-G2-Mini-Drivers](https://github.com/rhyslhardy/HP-EliteDesk-800-G2-Mini-Drivers)
### CVE-2022-27665 (2023-04-03)
<code>Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.
@ -10879,6 +10880,13 @@
- [polar0x/CVE-2022-41333](https://github.com/polar0x/CVE-2022-41333)
### CVE-2022-41343 (2022-09-25)
<code>registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule.
</code>
- [BKreisel/CVE-2022-41343](https://github.com/BKreisel/CVE-2022-41343)
### CVE-2022-41352 (2022-09-25)
<code>An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
@ -24782,6 +24790,7 @@
- [gquere/CVE-2019-6693](https://github.com/gquere/CVE-2019-6693)
- [synacktiv/CVE-2020-9289](https://github.com/synacktiv/CVE-2020-9289)
- [saladandonionrings/cve-2019-6693](https://github.com/saladandonionrings/cve-2019-6693)
### CVE-2019-6715 (2019-04-01)
@ -34406,8 +34415,10 @@
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
- [alanmeyer/CVE-glibc](https://github.com/alanmeyer/CVE-glibc)