Auto Update 2023/11/05 12:25:09

This commit is contained in:
motikan2010-bot 2023-11-05 21:25:09 +09:00
parent 20965ca70a
commit a6220eb6a0
35 changed files with 188 additions and 118 deletions

View file

@ -13,10 +13,10 @@
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2023-09-30T21:48:56Z",
"updated_at": "2023-11-05T11:37:35Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 64,
"watchers": 63,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "An implementation of CVE-2016-0974 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-04-01T00:39:28Z",
"updated_at": "2023-10-08T12:54:01Z",
"updated_at": "2023-11-05T11:37:34Z",
"pushed_at": "2019-09-30T23:40:01Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 31,
"watchers": 30,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false,
"created_at": "2017-10-09T15:13:25Z",
"updated_at": "2023-10-28T23:07:32Z",
"updated_at": "2023-11-05T09:53:27Z",
"pushed_at": "2021-07-29T12:00:48Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 55,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2023-11-03T23:05:57Z",
"updated_at": "2023-11-05T09:54:10Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 454,
"watchers_count": 454,
"stargazers_count": 455,
"watchers_count": 455,
"has_discussions": false,
"forks_count": 200,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 200,
"watchers": 454,
"watchers": 455,
"score": 0,
"subscribers_count": 46
},

View file

@ -103,10 +103,10 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2023-09-28T11:07:25Z",
"updated_at": "2023-11-05T07:10:37Z",
"pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 4
},

View file

@ -1690,10 +1690,10 @@
"description": "This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework",
"fork": false,
"created_at": "2020-06-19T20:38:11Z",
"updated_at": "2022-07-25T13:36:10Z",
"updated_at": "2023-11-05T07:03:19Z",
"pushed_at": "2020-06-19T20:58:36Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -1702,7 +1702,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Exploit CVE-2020-13886 - LFI Intelbras TIP 200 \/ 200 LITE \/ ",
"fork": false,
"created_at": "2020-06-08T20:52:04Z",
"updated_at": "2023-09-28T11:16:28Z",
"updated_at": "2023-11-05T06:45:31Z",
"pushed_at": "2020-11-12T15:34:26Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-11-04T08:49:14Z",
"updated_at": "2023-11-04T15:15:13Z",
"pushed_at": "2023-11-04T15:15:11Z",
"pushed_at": "2023-11-05T07:08:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -90,7 +90,7 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2023-10-28T13:19:36Z",
"updated_at": "2023-11-05T07:58:33Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 458,
"watchers_count": 458,

View file

@ -13,10 +13,10 @@
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481",
"fork": false,
"created_at": "2021-04-17T01:29:31Z",
"updated_at": "2023-09-24T13:30:32Z",
"updated_at": "2023-11-05T06:52:51Z",
"pushed_at": "2021-04-20T16:00:46Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 54,
"watchers": 53,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.",
"fork": false,
"created_at": "2023-11-04T11:45:55Z",
"updated_at": "2023-11-04T11:46:56Z",
"updated_at": "2023-11-05T10:15:50Z",
"pushed_at": "2023-11-04T19:17:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2023-10-25T04:23:36Z",
"updated_at": "2023-11-05T06:50:48Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 160,
"watchers": 159,
"score": 0,
"subscribers_count": 7
}

View file

@ -45,10 +45,10 @@
"description": "windows 10 14393 LPE",
"fork": false,
"created_at": "2021-10-20T09:24:36Z",
"updated_at": "2023-10-04T15:20:03Z",
"updated_at": "2023-11-05T06:52:26Z",
"pushed_at": "2021-10-28T03:51:09Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 90,
"watchers": 89,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2023-10-12T11:48:45Z",
"updated_at": "2023-11-05T06:50:18Z",
"pushed_at": "2023-02-20T23:29:21Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 147,
"watchers_count": 147,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 148,
"watchers": 147,
"score": 0,
"subscribers_count": 11
}

View file

@ -195,13 +195,13 @@
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 12,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 11,
"watchers": 20,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2023-11-02T08:28:06Z",
"updated_at": "2023-11-05T06:51:34Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 733,
"watchers_count": 733,
"stargazers_count": 732,
"watchers_count": 732,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 155,
"watchers": 733,
"watchers": 732,
"score": 0,
"subscribers_count": 16
}

View file

@ -227,10 +227,10 @@
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
"updated_at": "2023-09-28T11:39:41Z",
"updated_at": "2023-11-05T06:49:45Z",
"pushed_at": "2022-06-18T13:53:53Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 110,
"watchers": 109,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-27666",
"fork": false,
"created_at": "2022-03-23T22:54:28Z",
"updated_at": "2023-09-28T11:37:18Z",
"updated_at": "2023-11-05T06:51:20Z",
"pushed_at": "2022-03-28T18:21:00Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 202,
"watchers_count": 202,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 203,
"watchers": 202,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-28282",
"fork": false,
"created_at": "2022-09-25T07:46:23Z",
"updated_at": "2023-09-28T11:42:59Z",
"updated_at": "2023-11-05T06:50:03Z",
"pushed_at": "2022-09-25T09:30:39Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 31,
"watchers": 30,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Foxit PDF Reader Remote Code Execution Exploit",
"fork": false,
"created_at": "2022-12-02T18:52:20Z",
"updated_at": "2023-10-11T16:07:50Z",
"updated_at": "2023-11-05T06:49:36Z",
"pushed_at": "2023-02-27T04:53:11Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 115,
"watchers": 114,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
"fork": false,
"created_at": "2023-01-09T04:27:15Z",
"updated_at": "2023-09-28T11:44:41Z",
"updated_at": "2023-11-05T06:49:33Z",
"pushed_at": "2023-01-09T08:19:27Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 114,
"watchers": 113,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "cve-2022-33891-poc",
"fork": false,
"created_at": "2022-07-18T16:16:51Z",
"updated_at": "2023-09-28T11:40:52Z",
"updated_at": "2023-11-05T07:13:43Z",
"pushed_at": "2022-07-20T08:00:18Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 20,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-34715-POC pcap",
"fork": false,
"created_at": "2022-09-13T08:33:03Z",
"updated_at": "2023-01-03T18:07:23Z",
"updated_at": "2023-11-05T06:49:45Z",
"pushed_at": "2022-09-13T08:39:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
"updated_at": "2023-10-26T14:05:38Z",
"updated_at": "2023-11-05T06:50:07Z",
"pushed_at": "2022-09-19T19:41:34Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 221,
"watchers_count": 221,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 222,
"watchers": 221,
"score": 0,
"subscribers_count": 5
},

View file

@ -254,7 +254,7 @@
"fork": false,
"created_at": "2023-11-04T08:49:14Z",
"updated_at": "2023-11-04T15:15:13Z",
"pushed_at": "2023-11-04T15:15:11Z",
"pushed_at": "2023-11-05T12:23:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 714542407,
"name": "CVE-2023-22518",
"full_name": "sanjai-AK47\/CVE-2023-22518",
"owner": {
"login": "sanjai-AK47",
"id": 119435129,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119435129?v=4",
"html_url": "https:\/\/github.com\/sanjai-AK47"
},
"html_url": "https:\/\/github.com\/sanjai-AK47\/CVE-2023-22518",
"description": "An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization",
"fork": false,
"created_at": "2023-11-05T06:45:33Z",
"updated_at": "2023-11-05T07:24:31Z",
"pushed_at": "2023-11-05T07:08:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2023-09-26T16:18:41Z",
"updated_at": "2023-10-26T04:31:57Z",
"updated_at": "2023-11-05T07:05:52Z",
"pushed_at": "2023-09-26T19:04:21Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 172,
"watchers": 173,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
"fork": false,
"created_at": "2023-06-28T13:22:26Z",
"updated_at": "2023-11-04T02:41:41Z",
"updated_at": "2023-11-05T07:49:57Z",
"pushed_at": "2023-07-28T13:20:45Z",
"stargazers_count": 427,
"watchers_count": 427,
"stargazers_count": 428,
"watchers_count": 428,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 427,
"watchers": 428,
"score": 0,
"subscribers_count": 14
}

View file

@ -13,12 +13,12 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-11-03T15:23:13Z",
"updated_at": "2023-11-05T09:23:47Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 585,
"watchers_count": 585,
"stargazers_count": 586,
"watchers_count": 586,
"has_discussions": false,
"forks_count": 47,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"keepass"
],
"visibility": "public",
"forks": 47,
"watchers": 585,
"forks": 48,
"watchers": 586,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-23T19:06:36Z",
"updated_at": "2023-11-04T20:12:28Z",
"updated_at": "2023-11-05T11:37:04Z",
"pushed_at": "2023-10-29T11:12:26Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 94,
"watchers_count": 94,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 92,
"watchers": 94,
"score": 0,
"subscribers_count": 4
}

32
2023/CVE-2023-37903.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 714606214,
"name": "CVE-2023-37903",
"full_name": "7h3h4ckv157\/CVE-2023-37903",
"owner": {
"login": "7h3h4ckv157",
"id": 58929890,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58929890?v=4",
"html_url": "https:\/\/github.com\/7h3h4ckv157"
},
"html_url": "https:\/\/github.com\/7h3h4ckv157\/CVE-2023-37903",
"description": "Exploit for CVE-2023-37903 ",
"fork": false,
"created_at": "2023-11-05T11:23:15Z",
"updated_at": "2023-11-05T11:28:37Z",
"pushed_at": "2023-11-05T12:19:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-04T21:14:09Z",
"updated_at": "2023-11-04T21:15:19Z",
"updated_at": "2023-11-05T09:02:18Z",
"pushed_at": "2023-11-04T21:22:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "exploit for cve-2023-46747",
"fork": false,
"created_at": "2023-11-01T09:31:05Z",
"updated_at": "2023-11-05T01:27:29Z",
"updated_at": "2023-11-05T09:10:03Z",
"pushed_at": "2023-11-03T11:47:26Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 2
},
@ -174,13 +174,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-10-31T04:03:02Z",
"updated_at": "2023-11-03T21:12:31Z",
"pushed_at": "2023-11-03T21:12:01Z",
"pushed_at": "2023-11-05T11:10:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1310,6 +1310,7 @@
- [ForceFledgling/CVE-2023-22518](https://github.com/ForceFledgling/CVE-2023-22518)
- [davidfortytwo/CVE-2023-22518](https://github.com/davidfortytwo/CVE-2023-22518)
- [sanjai-AK47/CVE-2023-22518](https://github.com/sanjai-AK47/CVE-2023-22518)
### CVE-2023-22551 (2023-01-01)
@ -3751,6 +3752,13 @@
### CVE-2023-37800
- [TraiLeR2/CVE-2023-37800](https://github.com/TraiLeR2/CVE-2023-37800)
### CVE-2023-37903 (2023-07-21)
<code>vm2 is an open source vm/sandbox for Node.js. In vm2 for versions up to and including 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. This may result in Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. There are no patches and no known workarounds. Users are advised to find an alternative software.
</code>
- [7h3h4ckv157/CVE-2023-37903](https://github.com/7h3h4ckv157/CVE-2023-37903)
### CVE-2023-37941 (2023-09-06)
<code>If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset's web backend.\n\nThe Superset metadata db is an 'internal' component that is typically \nonly accessible directly by the system administrator and the superset \nprocess itself. Gaining access to that database should\n be difficult and require significant privileges.\n\nThis vulnerability impacts Apache Superset versions 1.5.0 up to and including 2.1.0. Users are recommended to upgrade to version 2.1.1 or later.\n\n