Auto Update 2022/09/09 18:20:00

This commit is contained in:
motikan2010-bot 2022-09-10 03:20:00 +09:00
parent a6acc4beb8
commit a0ebf463ed
27 changed files with 251 additions and 92 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-08T18:27:21Z",
"updated_at": "2022-09-09T13:25:22Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1499,
"watchers_count": 1499,
"stargazers_count": 1500,
"watchers_count": 1500,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 1499,
"watchers": 1500,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-08T18:27:21Z",
"updated_at": "2022-09-09T13:25:22Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1499,
"watchers_count": 1499,
"stargazers_count": 1500,
"watchers_count": 1500,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 1499,
"watchers": 1500,
"score": 0
},
{

View file

@ -42,7 +42,7 @@
"fork": false,
"created_at": "2018-10-17T22:47:30Z",
"updated_at": "2022-06-22T16:31:40Z",
"pushed_at": "2022-06-13T09:39:57Z",
"pushed_at": "2022-09-09T13:50:49Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-08T18:27:21Z",
"updated_at": "2022-09-09T13:25:22Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1499,
"watchers_count": 1499,
"stargazers_count": 1500,
"watchers_count": 1500,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 1499,
"watchers": 1500,
"score": 0
},
{

View file

@ -163,13 +163,13 @@
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 84,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 84,
"forks": 85,
"watchers": 250,
"score": 0
},
@ -331,13 +331,13 @@
"pushed_at": "2021-08-27T10:16:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
},

View file

@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-08T18:27:21Z",
"updated_at": "2022-09-09T13:25:22Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1499,
"watchers_count": 1499,
"stargazers_count": 1500,
"watchers_count": 1500,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 1499,
"watchers": 1500,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Reproduction of iOS 11 bug CVE-2018-4110",
"fork": false,
"created_at": "2017-10-03T18:09:30Z",
"updated_at": "2021-03-23T12:27:43Z",
"updated_at": "2022-09-09T16:50:43Z",
"pushed_at": "2017-10-16T15:07:13Z",
"stargazers_count": 4,
"watchers_count": 4,

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-08T18:27:21Z",
"updated_at": "2022-09-09T13:25:22Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1499,
"watchers_count": 1499,
"stargazers_count": 1500,
"watchers_count": 1500,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 1499,
"watchers": 1500,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-09-07T02:07:53Z",
"updated_at": "2022-09-09T15:15:34Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 137,
"watchers": 138,
"score": 0
},
{

View file

@ -98,7 +98,7 @@
"fork": false,
"created_at": "2020-07-14T02:42:41Z",
"updated_at": "2022-04-14T08:25:21Z",
"pushed_at": "2022-07-15T21:03:09Z",
"pushed_at": "2022-09-09T18:13:30Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-09-08T18:27:21Z",
"updated_at": "2022-09-09T13:25:22Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1499,
"watchers_count": 1499,
"stargazers_count": 1500,
"watchers_count": 1500,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 1499,
"watchers": 1500,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-09-07T02:07:53Z",
"updated_at": "2022-09-09T15:15:34Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 137,
"watchers": 138,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2022-07-26T19:23:27Z",
"updated_at": "2022-09-09T13:35:27Z",
"pushed_at": "2022-01-16T04:17:08Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 202,
"watchers": 203,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-4154 exploit",
"fork": false,
"created_at": "2022-08-11T05:46:27Z",
"updated_at": "2022-09-05T14:24:19Z",
"updated_at": "2022-09-09T14:17:54Z",
"pushed_at": "2022-08-11T06:00:10Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 35,
"watchers": 36,
"score": 0
}
]

View file

@ -42,7 +42,7 @@
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2022-08-03T18:35:01Z",
"pushed_at": "2021-12-22T23:54:18Z",
"pushed_at": "2022-09-09T16:09:11Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,

View file

@ -101,7 +101,7 @@
"pushed_at": "2021-12-16T01:33:48Z",
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 34,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -115,7 +115,7 @@
"minecraft"
],
"visibility": "public",
"forks": 34,
"forks": 33,
"watchers": 180,
"score": 0
},
@ -523,10 +523,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-09-09T02:53:07Z",
"updated_at": "2022-09-09T13:42:04Z",
"pushed_at": "2022-08-31T05:56:13Z",
"stargazers_count": 503,
"watchers_count": 503,
"stargazers_count": 504,
"watchers_count": 504,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
@ -539,7 +539,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 503,
"watchers": 504,
"score": 0
},
{
@ -6146,10 +6146,10 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2022-08-29T04:01:32Z",
"updated_at": "2022-09-09T16:21:22Z",
"pushed_at": "2022-08-12T20:12:50Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -6157,7 +6157,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 83,
"watchers": 84,
"score": 0
},
{
@ -6202,18 +6202,18 @@
"description": "PoC for CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-24T19:26:36Z",
"updated_at": "2022-09-01T09:25:32Z",
"updated_at": "2022-09-09T14:29:56Z",
"pushed_at": "2021-12-25T11:26:49Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"forks": 5,
"watchers": 4,
"score": 0
},
{

30
2022/CVE-2022-20128.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 534637282,
"name": "CVE-2022-20128",
"full_name": "irsl\/CVE-2022-20128",
"owner": {
"login": "irsl",
"id": 6357121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6357121?v=4",
"html_url": "https:\/\/github.com\/irsl"
},
"html_url": "https:\/\/github.com\/irsl\/CVE-2022-20128",
"description": "Android Debug Bridge (adb) was vulnerable to directory traversal attacks that could have been mounted by rogue\/compromised adb daemons during an adb pull operation.",
"fork": false,
"created_at": "2022-09-09T12:40:21Z",
"updated_at": "2022-09-09T12:40:55Z",
"pushed_at": "2022-09-09T12:42:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -69,18 +69,18 @@
"description": "CVE-2022-2588,CVE-2022-2586,CVE-2022-2585 ",
"fork": false,
"created_at": "2022-08-23T13:23:29Z",
"updated_at": "2022-08-23T10:42:46Z",
"updated_at": "2022-09-09T13:56:58Z",
"pushed_at": "2022-08-23T10:47:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-09-09T07:44:10Z",
"updated_at": "2022-09-09T16:15:03Z",
"pushed_at": "2022-08-29T12:54:56Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 746,
"watchers_count": 746,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 138,
"watchers": 745,
"watchers": 746,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-09-06T16:15:58Z",
"updated_at": "2022-09-09T14:28:57Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 306,
"watchers_count": 306,
"stargazers_count": 307,
"watchers_count": 307,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 306,
"watchers": 307,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-06-16T12:42:43Z",
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 167,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "CVE-2022-31188 - OpenCV CVAT (Computer Vision Annotation Tool) SSRF",
"fork": false,
"created_at": "2022-09-09T10:36:59Z",
"updated_at": "2022-09-09T10:36:59Z",
"updated_at": "2022-09-09T14:51:45Z",
"pushed_at": "2022-09-09T11:26:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

30
2022/CVE-2022-3168.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 534634523,
"name": "CVE-2022-3168-adb-unexpected-reverse-forwards",
"full_name": "irsl\/CVE-2022-3168-adb-unexpected-reverse-forwards",
"owner": {
"login": "irsl",
"id": 6357121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6357121?v=4",
"html_url": "https:\/\/github.com\/irsl"
},
"html_url": "https:\/\/github.com\/irsl\/CVE-2022-3168-adb-unexpected-reverse-forwards",
"description": "Proof of concept code to exploit flaw in adb that allowed opening network connections on the host to arbitrary destinations",
"fork": false,
"created_at": "2022-09-09T12:31:56Z",
"updated_at": "2022-09-09T12:35:41Z",
"pushed_at": "2022-09-09T12:39:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -49,18 +49,18 @@
"description": "CVE-2022-36446 - Webmin 1.996 Remote Code Execution",
"fork": false,
"created_at": "2022-09-09T10:34:53Z",
"updated_at": "2022-09-09T10:34:53Z",
"updated_at": "2022-09-09T14:52:49Z",
"pushed_at": "2022-09-09T10:35:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

47
2022/CVE-2022-40297.json Normal file
View file

@ -0,0 +1,47 @@
[
{
"id": 532543106,
"name": "PoC-ubuntutouch-pin-privesc",
"full_name": "filipkarc\/PoC-ubuntutouch-pin-privesc",
"owner": {
"login": "filipkarc",
"id": 111286209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111286209?v=4",
"html_url": "https:\/\/github.com\/filipkarc"
},
"html_url": "https:\/\/github.com\/filipkarc\/PoC-ubuntutouch-pin-privesc",
"description": "CVE-2022-40297 - Proof of Concept: Privilage escalation in Ubuntu Touch 16.04 - by PIN Bruteforce",
"fork": false,
"created_at": "2022-09-04T13:05:58Z",
"updated_at": "2022-09-09T12:30:44Z",
"pushed_at": "2022-09-09T12:29:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"brute-force",
"bruteforce",
"bugbountytips",
"bugbountytricks",
"exploit",
"hacking",
"linux",
"linuxphone",
"malware",
"mobile",
"pentesting",
"privesc",
"ubuntu",
"ubuntutouch",
"vulnerability",
"vulnerability-assessment"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
}
]

30
2022/CVE-2022-40317.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 534698979,
"name": "CVE-2022-40317",
"full_name": "izdiwho\/CVE-2022-40317",
"owner": {
"login": "izdiwho",
"id": 5587598,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5587598?v=4",
"html_url": "https:\/\/github.com\/izdiwho"
},
"html_url": "https:\/\/github.com\/izdiwho\/CVE-2022-40317",
"description": null,
"fork": false,
"created_at": "2022-09-09T15:27:12Z",
"updated_at": "2022-09-09T17:19:26Z",
"pushed_at": "2022-09-09T17:14:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -550,6 +550,9 @@ An integer coercion error was found in the openvswitch kernel module. Given a su
- [avboy1337/CVE-2022-2639-PipeVersion](https://github.com/avboy1337/CVE-2022-2639-PipeVersion)
### CVE-2022-3168
- [irsl/CVE-2022-3168-adb-unexpected-reverse-forwards](https://github.com/irsl/CVE-2022-3168-adb-unexpected-reverse-forwards)
### CVE-2022-3452
- [kenyon-wong/cve-2022-3452](https://github.com/kenyon-wong/cve-2022-3452)
@ -610,6 +613,9 @@ In setScanMode of AdapterService.java, there is a possible way to enable Bluetoo
- [Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126](https://github.com/Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126)
### CVE-2022-20128
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
### CVE-2022-20130 (2022-06-15)
<code>
@ -3478,6 +3484,22 @@ Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion
- [jet-pentest/CVE-2022-39838](https://github.com/jet-pentest/CVE-2022-39838)
### CVE-2022-40297 (2022-09-08)
<code>
UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password.
</code>
- [filipkarc/PoC-ubuntutouch-pin-privesc](https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc)
### CVE-2022-40317 (2022-09-09)
<code>
OpenKM 6.3.11 allows stored XSS related to the javascript&amp;colon; substring in an A element.
</code>
- [izdiwho/CVE-2022-40317](https://github.com/izdiwho/CVE-2022-40317)
## 2021
### CVE-2021-0302 (2021-02-10)