mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/09/12 00:16:57
This commit is contained in:
parent
1d49aa3cdf
commit
aea54cda65
34 changed files with 145 additions and 546 deletions
|
@ -13,7 +13,7 @@
|
|||
"description": "A proof of concept of an SEH overflow with arbitrary dll injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-01T22:12:07Z",
|
||||
"updated_at": "2022-06-04T08:11:20Z",
|
||||
"updated_at": "2022-09-11T20:05:25Z",
|
||||
"pushed_at": "2022-08-09T10:30:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
@ -23,7 +23,8 @@
|
|||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"exploit-development"
|
||||
"exploit-development",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.",
|
||||
"fork": false,
|
||||
"created_at": "2014-06-12T04:44:13Z",
|
||||
"updated_at": "2022-06-27T07:10:57Z",
|
||||
"updated_at": "2022-09-11T20:00:37Z",
|
||||
"pushed_at": "2014-07-24T20:47:27Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 36,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-11T04:57:31Z",
|
||||
"updated_at": "2022-09-11T23:00:06Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1501,
|
||||
"watchers_count": 1501,
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 1501,
|
||||
"watchers": 1502,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-11T04:57:31Z",
|
||||
"updated_at": "2022-09-11T23:00:06Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1501,
|
||||
"watchers_count": 1501,
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 1501,
|
||||
"watchers": 1502,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -73,13 +73,13 @@
|
|||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 906,
|
||||
"watchers_count": 906,
|
||||
"forks_count": 411,
|
||||
"forks_count": 410,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 411,
|
||||
"forks": 410,
|
||||
"watchers": 906,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-11T04:57:31Z",
|
||||
"updated_at": "2022-09-11T23:00:06Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1501,
|
||||
"watchers_count": 1501,
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 1501,
|
||||
"watchers": 1502,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -242,10 +242,10 @@
|
|||
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T16:42:31Z",
|
||||
"updated_at": "2022-05-05T20:43:30Z",
|
||||
"updated_at": "2022-09-11T23:42:17Z",
|
||||
"pushed_at": "2021-04-21T16:46:37Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -253,7 +253,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -75,8 +75,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T21:27:25Z",
|
||||
"updated_at": "2022-08-15T20:40:10Z",
|
||||
"pushed_at": "2021-05-21T23:46:28Z",
|
||||
"updated_at": "2022-09-11T21:30:09Z",
|
||||
"pushed_at": "2022-09-11T21:40:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -549,10 +549,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-11T04:57:31Z",
|
||||
"updated_at": "2022-09-11T23:00:06Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1501,
|
||||
"watchers_count": 1501,
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -581,7 +581,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 1501,
|
||||
"watchers": 1502,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -181,10 +181,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-11T04:57:31Z",
|
||||
"updated_at": "2022-09-11T23:00:06Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1501,
|
||||
"watchers_count": 1501,
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -213,7 +213,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 1501,
|
||||
"watchers": 1502,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2019/CVE-2019-7213.json
Normal file
30
2019/CVE-2019-7213.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 535424964,
|
||||
"name": "CVE-2019-7213",
|
||||
"full_name": "secunnix\/CVE-2019-7213",
|
||||
"owner": {
|
||||
"login": "secunnix",
|
||||
"id": 104568161,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4",
|
||||
"html_url": "https:\/\/github.com\/secunnix"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/secunnix\/CVE-2019-7213",
|
||||
"description": " SmarterMail 16.x Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-11T21:01:53Z",
|
||||
"updated_at": "2022-09-11T21:02:30Z",
|
||||
"pushed_at": "2022-09-11T21:02:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-10-16T01:10:33Z",
|
||||
"updated_at": "2022-08-17T02:18:26Z",
|
||||
"pushed_at": "2021-10-19T10:50:09Z",
|
||||
"pushed_at": "2022-09-11T22:06:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-11T04:57:31Z",
|
||||
"updated_at": "2022-09-11T23:00:06Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1501,
|
||||
"watchers_count": 1501,
|
||||
"stargazers_count": 1502,
|
||||
"watchers_count": 1502,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 306,
|
||||
"watchers": 1501,
|
||||
"watchers": 1502,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2022-09-09T09:38:55Z",
|
||||
"updated_at": "2022-09-11T20:26:42Z",
|
||||
"pushed_at": "2021-08-25T01:00:49Z",
|
||||
"stargazers_count": 219,
|
||||
"watchers_count": 219,
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 219,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ASUS router exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-01T14:54:42Z",
|
||||
"updated_at": "2022-07-01T15:06:54Z",
|
||||
"updated_at": "2022-09-11T23:40:38Z",
|
||||
"pushed_at": "2022-07-01T14:56:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -222,10 +222,10 @@
|
|||
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2022-09-09T06:33:31Z",
|
||||
"updated_at": "2022-09-11T18:35:07Z",
|
||||
"pushed_at": "2022-08-02T13:18:24Z",
|
||||
"stargazers_count": 1006,
|
||||
"watchers_count": 1006,
|
||||
"stargazers_count": 1005,
|
||||
"watchers_count": 1005,
|
||||
"forks_count": 450,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -235,7 +235,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 450,
|
||||
"watchers": 1006,
|
||||
"watchers": 1005,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1452,10 +1452,10 @@
|
|||
"description": "A Docker based LDAP RCE exploit demo for CVE-2021-44228 Log4Shell",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T21:45:33Z",
|
||||
"updated_at": "2022-09-07T20:17:28Z",
|
||||
"updated_at": "2022-09-11T20:49:44Z",
|
||||
"pushed_at": "2022-05-05T08:50:49Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1469,7 +1469,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1598,10 +1598,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-09-10T01:21:28Z",
|
||||
"updated_at": "2022-09-11T23:37:15Z",
|
||||
"pushed_at": "2022-09-11T03:55:38Z",
|
||||
"stargazers_count": 3044,
|
||||
"watchers_count": 3044,
|
||||
"stargazers_count": 3045,
|
||||
"watchers_count": 3045,
|
||||
"forks_count": 726,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1609,7 +1609,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 726,
|
||||
"watchers": 3044,
|
||||
"watchers": 3045,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2080,5 +2080,33 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 535409119,
|
||||
"name": "Dirty-Pipe-Exploits",
|
||||
"full_name": "Gustavo-Nogueira\/Dirty-Pipe-Exploits",
|
||||
"owner": {
|
||||
"login": "Gustavo-Nogueira",
|
||||
"id": 36088551,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36088551?v=4",
|
||||
"html_url": "https:\/\/github.com\/Gustavo-Nogueira"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Gustavo-Nogueira\/Dirty-Pipe-Exploits",
|
||||
"description": "CVE-2022-0847(Dirty Pipe) vulnerability exploits.",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-11T19:50:53Z",
|
||||
"updated_at": "2022-09-11T19:50:53Z",
|
||||
"pushed_at": "2022-09-11T19:50:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 534168096,
|
||||
"name": "packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
|
||||
"full_name": "Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-08T10:51:13Z",
|
||||
"updated_at": "2022-09-08T14:17:30Z",
|
||||
"pushed_at": "2022-09-08T10:56:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,58 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 532948215,
|
||||
"name": "CVE-2022-20186_CTXZ",
|
||||
"full_name": "s1204-inspect\/CVE-2022-20186_CTXZ",
|
||||
"owner": {
|
||||
"login": "s1204-inspect",
|
||||
"id": 112163166,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112163166?v=4",
|
||||
"html_url": "https:\/\/github.com\/s1204-inspect"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s1204-inspect\/CVE-2022-20186_CTXZ",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T15:00:13Z",
|
||||
"updated_at": "2022-09-06T19:01:32Z",
|
||||
"pushed_at": "2022-09-07T07:29:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 532957729,
|
||||
"name": "CVE-2022-20186_CTXZ",
|
||||
"full_name": "SmileTabLabo\/CVE-2022-20186_CTXZ",
|
||||
"owner": {
|
||||
"login": "SmileTabLabo",
|
||||
"id": 112930114,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112930114?v=4",
|
||||
"html_url": "https:\/\/github.com\/SmileTabLabo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SmileTabLabo\/CVE-2022-20186_CTXZ",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T15:26:30Z",
|
||||
"updated_at": "2022-09-06T07:26:51Z",
|
||||
"pushed_at": "2022-09-09T00:08:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22629 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T17:21:27Z",
|
||||
"updated_at": "2022-09-11T15:41:19Z",
|
||||
"updated_at": "2022-09-12T00:12:20Z",
|
||||
"pushed_at": "2022-09-09T21:23:08Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -116,33 +116,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 533101052,
|
||||
"name": "CVE-2022-24706-CouchDB-Exploit",
|
||||
"full_name": "trhacknon\/CVE-2022-24706-CouchDB-Exploit",
|
||||
"owner": {
|
||||
"login": "trhacknon",
|
||||
"id": 98242014,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
|
||||
"html_url": "https:\/\/github.com\/trhacknon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-24706-CouchDB-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-06T00:17:19Z",
|
||||
"updated_at": "2022-09-11T11:26:15Z",
|
||||
"pushed_at": "2022-09-06T00:17:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 532959565,
|
||||
"name": "CVE-2022-2639-PipeVersion",
|
||||
"full_name": "avboy1337\/CVE-2022-2639-PipeVersion",
|
||||
"owner": {
|
||||
"login": "avboy1337",
|
||||
"id": 5463104,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
|
||||
"html_url": "https:\/\/github.com\/avboy1337"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/avboy1337\/CVE-2022-2639-PipeVersion",
|
||||
"description": "CVE-2022-2639 Linux kernel openvswitch local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T15:31:56Z",
|
||||
"updated_at": "2022-09-11T10:08:54Z",
|
||||
"pushed_at": "2022-09-05T14:25:17Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,11 +41,11 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-14T22:22:55Z",
|
||||
"updated_at": "2022-09-11T18:00:36Z",
|
||||
"updated_at": "2022-09-11T21:28:39Z",
|
||||
"pushed_at": "2022-09-05T22:05:53Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 3,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -56,8 +56,8 @@
|
|||
"zimbra-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 515929949,
|
||||
"name": "CVE-2022-29078",
|
||||
"full_name": "miko550\/CVE-2022-29078",
|
||||
"owner": {
|
||||
"login": "miko550",
|
||||
"id": 83682793,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83682793?v=4",
|
||||
"html_url": "https:\/\/github.com\/miko550"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/miko550\/CVE-2022-29078",
|
||||
"description": "vuln ejs 3.1.6 docker",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-20T10:10:01Z",
|
||||
"updated_at": "2022-09-09T10:06:06Z",
|
||||
"pushed_at": "2022-09-07T12:43:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,33 +26,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 532884056,
|
||||
"name": "CVE-2022-29455",
|
||||
"full_name": "akhilkoradiya\/CVE-2022-29455",
|
||||
"owner": {
|
||||
"login": "akhilkoradiya",
|
||||
"id": 102510716,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102510716?v=4",
|
||||
"html_url": "https:\/\/github.com\/akhilkoradiya"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/akhilkoradiya\/CVE-2022-29455",
|
||||
"description": "Wordpress Vulnerability - XSS ( Cross-Site Scripting )",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T12:08:50Z",
|
||||
"updated_at": "2022-09-07T10:04:46Z",
|
||||
"pushed_at": "2022-09-05T12:21:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -29,34 +29,6 @@
|
|||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 515706046,
|
||||
"name": "cve-2022-33891",
|
||||
"full_name": "HuskyHacks\/cve-2022-33891",
|
||||
"owner": {
|
||||
"login": "HuskyHacks",
|
||||
"id": 57866415,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
|
||||
"html_url": "https:\/\/github.com\/HuskyHacks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HuskyHacks\/cve-2022-33891",
|
||||
"description": "Apache Spark Shell Command Injection Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T18:52:12Z",
|
||||
"updated_at": "2022-09-08T11:06:23Z",
|
||||
"pushed_at": "2022-09-07T18:12:27Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 515768225,
|
||||
"name": "CVE-2022-33891",
|
||||
|
@ -71,10 +43,10 @@
|
|||
"description": "Apache Spark Command Injection PoC Exploit for CVE-2022-33891",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T23:16:27Z",
|
||||
"updated_at": "2022-08-26T03:22:10Z",
|
||||
"updated_at": "2022-09-11T19:04:30Z",
|
||||
"pushed_at": "2022-07-21T08:32:08Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -90,7 +62,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 24,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,33 +82,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 534397698,
|
||||
"name": "CTF_CVE-2022-34265",
|
||||
"full_name": "coco0x0a\/CTF_CVE-2022-34265",
|
||||
"owner": {
|
||||
"login": "coco0x0a",
|
||||
"id": 96345719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96345719?v=4",
|
||||
"html_url": "https:\/\/github.com\/coco0x0a"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/coco0x0a\/CTF_CVE-2022-34265",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-08T21:22:28Z",
|
||||
"updated_at": "2022-09-10T10:21:21Z",
|
||||
"pushed_at": "2022-09-08T22:10:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,32 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 515581938,
|
||||
"name": "CVE-2022-34918-LPE-PoC",
|
||||
"full_name": "randorisec\/CVE-2022-34918-LPE-PoC",
|
||||
"owner": {
|
||||
"login": "randorisec",
|
||||
"id": 23558951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23558951?v=4",
|
||||
"html_url": "https:\/\/github.com\/randorisec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/randorisec\/CVE-2022-34918-LPE-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T12:46:45Z",
|
||||
"updated_at": "2022-09-09T10:06:40Z",
|
||||
"pushed_at": "2022-09-06T14:05:22Z",
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 516534044,
|
||||
"name": "CVE-2022-34918-LPE-PoC",
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 515337808,
|
||||
"name": "CVE-2022-35405",
|
||||
"full_name": "viniciuspereiras\/CVE-2022-35405",
|
||||
"owner": {
|
||||
"login": "viniciuspereiras",
|
||||
"id": 69733777,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69733777?v=4",
|
||||
"html_url": "https:\/\/github.com\/viniciuspereiras"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/viniciuspereiras\/CVE-2022-35405",
|
||||
"description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T20:52:01Z",
|
||||
"updated_at": "2022-09-10T20:48:42Z",
|
||||
"pushed_at": "2022-09-06T18:26:36Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -34,33 +34,5 @@
|
|||
"forks": 29,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 534599250,
|
||||
"name": "CVE-2022-36446",
|
||||
"full_name": "emirpolatt\/CVE-2022-36446",
|
||||
"owner": {
|
||||
"login": "emirpolatt",
|
||||
"id": 41807762,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41807762?v=4",
|
||||
"html_url": "https:\/\/github.com\/emirpolatt"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/emirpolatt\/CVE-2022-36446",
|
||||
"description": "CVE-2022-36446 - Webmin 1.996 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T10:34:53Z",
|
||||
"updated_at": "2022-09-09T14:52:49Z",
|
||||
"pushed_at": "2022-09-09T10:35:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 533665078,
|
||||
"name": "CVE-2022-36539",
|
||||
"full_name": "Fopje\/CVE-2022-36539",
|
||||
"owner": {
|
||||
"login": "Fopje",
|
||||
"id": 4934752,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4934752?v=4",
|
||||
"html_url": "https:\/\/github.com\/Fopje"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Fopje\/CVE-2022-36539",
|
||||
"description": "Insecure Permissions WeDayCare",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-07T07:58:08Z",
|
||||
"updated_at": "2022-09-07T16:01:24Z",
|
||||
"pushed_at": "2022-09-07T08:11:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Remote Code Execution exploit for CVE-2022-36804 (BitBucket Server and DataCenter).",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-03T14:53:29Z",
|
||||
"updated_at": "2022-09-11T07:18:36Z",
|
||||
"updated_at": "2022-09-11T22:39:42Z",
|
||||
"pushed_at": "2022-09-05T11:58:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,30 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 532933208,
|
||||
"name": "CVE-2022-39838",
|
||||
"full_name": "jet-pentest\/CVE-2022-39838",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2022-39838",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T14:21:12Z",
|
||||
"updated_at": "2022-09-06T19:01:16Z",
|
||||
"pushed_at": "2022-09-05T14:29:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
72
README.md
72
README.md
|
@ -238,6 +238,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer
|
|||
- [yoeelingBin/CVE-2022-0847-Container-Escape](https://github.com/yoeelingBin/CVE-2022-0847-Container-Escape)
|
||||
- [irwx777/CVE-2022-0847](https://github.com/irwx777/CVE-2022-0847)
|
||||
- [notl0cal/dpipe](https://github.com/notl0cal/dpipe)
|
||||
- [Gustavo-Nogueira/Dirty-Pipe-Exploits](https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits)
|
||||
|
||||
### CVE-2022-0848 (2022-03-04)
|
||||
|
||||
|
@ -542,14 +543,6 @@ It was found that Quarkus 2.10.x does not terminate HTTP requests header context
|
|||
- [pirenga/2022-LPE-UAF](https://github.com/pirenga/2022-LPE-UAF)
|
||||
- [konoha279/2022-LPE-UAF](https://github.com/konoha279/2022-LPE-UAF)
|
||||
|
||||
### CVE-2022-2639 (2022-09-01)
|
||||
|
||||
<code>
|
||||
An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.
|
||||
</code>
|
||||
|
||||
- [avboy1337/CVE-2022-2639-PipeVersion](https://github.com/avboy1337/CVE-2022-2639-PipeVersion)
|
||||
|
||||
### CVE-2022-3168
|
||||
- [irsl/CVE-2022-3168-adb-unexpected-reverse-forwards](https://github.com/irsl/CVE-2022-3168-adb-unexpected-reverse-forwards)
|
||||
|
||||
|
@ -605,14 +598,6 @@ In deletePackageX of DeletePackageHelper.java, there is a possible way for a Gue
|
|||
|
||||
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
|
||||
|
||||
### CVE-2022-20126 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In setScanMode of AdapterService.java, there is a possible way to enable Bluetooth discovery mode without user interaction due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-203431023
|
||||
</code>
|
||||
|
||||
- [Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126](https://github.com/Trinadh465/packages_apps_Bluetooth_AOSP10_r33_CVE-2022-20126)
|
||||
|
||||
### CVE-2022-20128
|
||||
- [irsl/CVE-2022-20128](https://github.com/irsl/CVE-2022-20128)
|
||||
|
||||
|
@ -658,15 +643,6 @@ In createFromParcel of GeofenceHardwareRequestParcelable.java, there is a possib
|
|||
- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2022-20142)
|
||||
- [pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142](https://github.com/pazhanivel07/frameworks_base_AOSP10_r33_CVE-2022-20142)
|
||||
|
||||
### CVE-2022-20186 (2022-06-15)
|
||||
|
||||
<code>
|
||||
In kbase_mem_alias of mali_kbase_mem_linux.c, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-215001024References: N/A
|
||||
</code>
|
||||
|
||||
- [s1204-inspect/CVE-2022-20186_CTXZ](https://github.com/s1204-inspect/CVE-2022-20186_CTXZ)
|
||||
- [SmileTabLabo/CVE-2022-20186_CTXZ](https://github.com/SmileTabLabo/CVE-2022-20186_CTXZ)
|
||||
|
||||
### CVE-2022-20223 (2022-07-13)
|
||||
|
||||
<code>
|
||||
|
@ -1678,7 +1654,6 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d
|
|||
- [XmasSnowISBACK/CVE-2022-24706](https://github.com/XmasSnowISBACK/CVE-2022-24706)
|
||||
- [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-)
|
||||
- [superzerosec/CVE-2022-24706](https://github.com/superzerosec/CVE-2022-24706)
|
||||
- [trhacknon/CVE-2022-24706-CouchDB-Exploit](https://github.com/trhacknon/CVE-2022-24706-CouchDB-Exploit)
|
||||
|
||||
### CVE-2022-24707 (2022-02-23)
|
||||
|
||||
|
@ -2515,14 +2490,6 @@ Multiple SQL injection vulnerabilities via the username and password parameters
|
|||
- [tiktb8/CVE-2022-29072](https://github.com/tiktb8/CVE-2022-29072)
|
||||
- [sentinelblue/CVE-2022-29072](https://github.com/sentinelblue/CVE-2022-29072)
|
||||
|
||||
### CVE-2022-29078 (2022-04-25)
|
||||
|
||||
<code>
|
||||
The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).
|
||||
</code>
|
||||
|
||||
- [miko550/CVE-2022-29078](https://github.com/miko550/CVE-2022-29078)
|
||||
|
||||
### CVE-2022-29221 (2022-05-24)
|
||||
|
||||
<code>
|
||||
|
@ -2580,7 +2547,6 @@ DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elem
|
|||
</code>
|
||||
|
||||
- [GULL2100/Wordpress_xss-CVE-2022-29455](https://github.com/GULL2100/Wordpress_xss-CVE-2022-29455)
|
||||
- [akhilkoradiya/CVE-2022-29455](https://github.com/akhilkoradiya/CVE-2022-29455)
|
||||
|
||||
### CVE-2022-29464 (2022-04-18)
|
||||
|
||||
|
@ -3257,7 +3223,6 @@ The Apache Spark UI offers the possibility to enable ACLs via the configuration
|
|||
</code>
|
||||
|
||||
- [W01fh4cker/cve-2022-33891](https://github.com/W01fh4cker/cve-2022-33891)
|
||||
- [HuskyHacks/cve-2022-33891](https://github.com/HuskyHacks/cve-2022-33891)
|
||||
- [west-wind/CVE-2022-33891](https://github.com/west-wind/CVE-2022-33891)
|
||||
- [AkbarTrilaksana/cve-2022-33891](https://github.com/AkbarTrilaksana/cve-2022-33891)
|
||||
- [llraudseppll/cve-2022-33891](https://github.com/llraudseppll/cve-2022-33891)
|
||||
|
@ -3293,7 +3258,6 @@ An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Tr
|
|||
- [aeyesec/CVE-2022-34265](https://github.com/aeyesec/CVE-2022-34265)
|
||||
- [traumatising/CVE-2022-34265](https://github.com/traumatising/CVE-2022-34265)
|
||||
- [ZhaoQi99/CVE-2022-34265](https://github.com/ZhaoQi99/CVE-2022-34265)
|
||||
- [coco0x0a/CTF_CVE-2022-34265](https://github.com/coco0x0a/CTF_CVE-2022-34265)
|
||||
|
||||
### CVE-2022-34298 (2022-06-22)
|
||||
|
||||
|
@ -3317,7 +3281,6 @@ In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64
|
|||
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
|
||||
</code>
|
||||
|
||||
- [randorisec/CVE-2022-34918-LPE-PoC](https://github.com/randorisec/CVE-2022-34918-LPE-PoC)
|
||||
- [trhacknon/CVE-2022-34918-LPE-PoC](https://github.com/trhacknon/CVE-2022-34918-LPE-PoC)
|
||||
- [merlinepedra25/CVE-2022-34918-LPE-PoC](https://github.com/merlinepedra25/CVE-2022-34918-LPE-PoC)
|
||||
- [merlinepedra/CVE-2022-34918-LPE-PoC](https://github.com/merlinepedra/CVE-2022-34918-LPE-PoC)
|
||||
|
@ -3372,14 +3335,6 @@ Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted paylo
|
|||
|
||||
- [ly1g3/Joplin-CVE-2022-35131](https://github.com/ly1g3/Joplin-CVE-2022-35131)
|
||||
|
||||
### CVE-2022-35405 (2022-07-19)
|
||||
|
||||
<code>
|
||||
Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)
|
||||
</code>
|
||||
|
||||
- [viniciuspereiras/CVE-2022-35405](https://github.com/viniciuspereiras/CVE-2022-35405)
|
||||
|
||||
### CVE-2022-35416 (2022-07-10)
|
||||
|
||||
<code>
|
||||
|
@ -3433,15 +3388,6 @@ software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.
|
|||
</code>
|
||||
|
||||
- [p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE](https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE)
|
||||
- [emirpolatt/CVE-2022-36446](https://github.com/emirpolatt/CVE-2022-36446)
|
||||
|
||||
### CVE-2022-36539 (2022-09-07)
|
||||
|
||||
<code>
|
||||
WeDayCare B.V Ouderapp before v1.1.22 allows attackers to alter the ID value within intercepted calls to gain access to data of other parents and children.
|
||||
</code>
|
||||
|
||||
- [Fopje/CVE-2022-36539](https://github.com/Fopje/CVE-2022-36539)
|
||||
|
||||
### CVE-2022-36804 (2022-08-25)
|
||||
|
||||
|
@ -3498,14 +3444,6 @@ Blackboard Learn 1.10.1 allows remote authenticated users to read unintended fil
|
|||
|
||||
- [DayiliWaseem/CVE-2022-39196-](https://github.com/DayiliWaseem/CVE-2022-39196-)
|
||||
|
||||
### CVE-2022-39838 (2022-09-05)
|
||||
|
||||
<code>
|
||||
Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion via a UNC share pathname, and also allows absolute path traversal to local pathnames.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2022-39838](https://github.com/jet-pentest/CVE-2022-39838)
|
||||
|
||||
### CVE-2022-40297 (2022-09-08)
|
||||
|
||||
<code>
|
||||
|
@ -14824,6 +14762,14 @@ This improper access control vulnerability allows remote attackers to gain unaut
|
|||
- [cycraft-corp/cve-2019-7192-check](https://github.com/cycraft-corp/cve-2019-7192-check)
|
||||
- [th3gundy/CVE-2019-7192_QNAP_Exploit](https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit)
|
||||
|
||||
### CVE-2019-7213 (2019-04-24)
|
||||
|
||||
<code>
|
||||
SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories.
|
||||
</code>
|
||||
|
||||
- [secunnix/CVE-2019-7213](https://github.com/secunnix/CVE-2019-7213)
|
||||
|
||||
### CVE-2019-7214 (2019-04-24)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue