mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/05/02 00:31:05
This commit is contained in:
parent
18a8441405
commit
b85287c286
20 changed files with 143 additions and 74 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2023-04-30T00:58:22Z",
|
||||
"updated_at": "2023-05-01T23:21:28Z",
|
||||
"pushed_at": "2021-08-07T16:48:55Z",
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"has_discussions": false,
|
||||
"forks_count": 69,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 69,
|
||||
"watchers": 388,
|
||||
"watchers": 389,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2023-04-29T23:04:37Z",
|
||||
"pushed_at": "2023-02-16T02:07:09Z",
|
||||
"pushed_at": "2023-05-01T21:48:01Z",
|
||||
"stargazers_count": 1573,
|
||||
"watchers_count": 1573,
|
||||
"has_discussions": false,
|
||||
|
@ -659,7 +659,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-09-17T16:53:17Z",
|
||||
"updated_at": "2022-11-09T18:09:28Z",
|
||||
"pushed_at": "2023-02-16T02:07:12Z",
|
||||
"pushed_at": "2023-05-01T21:48:28Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
|
@ -1604,7 +1604,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-03-03T02:00:21Z",
|
||||
"updated_at": "2022-03-03T02:01:04Z",
|
||||
"pushed_at": "2023-02-16T03:14:00Z",
|
||||
"pushed_at": "2023-05-01T22:24:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2020-17453 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-20T06:00:13Z",
|
||||
"updated_at": "2023-04-26T23:48:50Z",
|
||||
"updated_at": "2023-05-01T21:42:39Z",
|
||||
"pushed_at": "2023-04-22T14:18:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The HoYoVerse (formerly miHoYo) Genshin Impact mhyprot2.sys 1.0.0.0 anti-cheat driver does not adequately restrict unprivileged function calls, allowing local, unprivileged users to execute arbitrary code with SYSTEM privileges on Microsoft Windows systems. The mhyprot2.sys driver must first be installed by a user with CVE project by @Sn0wAlice",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-12T10:17:58Z",
|
||||
"updated_at": "2023-02-20T14:53:38Z",
|
||||
"updated_at": "2023-05-01T18:59:22Z",
|
||||
"pushed_at": "2022-12-29T16:45:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,13 +47,13 @@
|
|||
"stargazers_count": 1681,
|
||||
"watchers_count": 1681,
|
||||
"has_discussions": false,
|
||||
"forks_count": 586,
|
||||
"forks_count": 587,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 586,
|
||||
"forks": 587,
|
||||
"watchers": 1681,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Simple CVE-2021-20294 poc",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-21T16:15:21Z",
|
||||
"updated_at": "2023-02-13T01:17:41Z",
|
||||
"updated_at": "2023-05-01T20:34:37Z",
|
||||
"pushed_at": "2023-01-21T22:37:16Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -455,10 +455,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-04-27T08:54:19Z",
|
||||
"updated_at": "2023-05-01T20:16:50Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 868,
|
||||
"watchers_count": 868,
|
||||
"stargazers_count": 869,
|
||||
"watchers_count": 869,
|
||||
"has_discussions": false,
|
||||
"forks_count": 240,
|
||||
"allow_forking": true,
|
||||
|
@ -467,7 +467,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 240,
|
||||
"watchers": 868,
|
||||
"watchers": 869,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -179,10 +179,10 @@
|
|||
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-23T20:20:45Z",
|
||||
"updated_at": "2023-03-14T17:04:29Z",
|
||||
"updated_at": "2023-05-01T19:07:48Z",
|
||||
"pushed_at": "2022-12-17T16:10:46Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -191,7 +191,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -6136,10 +6136,10 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2023-04-30T21:24:48Z",
|
||||
"updated_at": "2023-05-01T19:02:47Z",
|
||||
"pushed_at": "2022-03-23T18:12:51Z",
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"stargazers_count": 344,
|
||||
"watchers_count": 344,
|
||||
"has_discussions": false,
|
||||
"forks_count": 91,
|
||||
"allow_forking": true,
|
||||
|
@ -6148,7 +6148,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"watchers": 343,
|
||||
"watchers": 344,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6999,7 +6999,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-15T21:09:00Z",
|
||||
"updated_at": "2022-08-07T20:26:05Z",
|
||||
"pushed_at": "2023-01-06T04:57:11Z",
|
||||
"pushed_at": "2023-05-01T23:14:38Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2023-05-01T17:13:46Z",
|
||||
"updated_at": "2023-05-01T20:34:25Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 189,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T20:37:14Z",
|
||||
"updated_at": "2023-04-14T16:51:32Z",
|
||||
"updated_at": "2023-05-01T21:00:17Z",
|
||||
"pushed_at": "2022-08-30T02:11:05Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 134,
|
||||
"watchers": 135,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -286,10 +286,10 @@
|
|||
"description": "This is poc of CVE-2022-46169 authentication bypass and remote code execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-11T19:39:44Z",
|
||||
"updated_at": "2023-05-01T16:16:47Z",
|
||||
"updated_at": "2023-05-01T19:56:23Z",
|
||||
"pushed_at": "2023-04-30T19:58:48Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -298,7 +298,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -511,20 +511,20 @@
|
|||
},
|
||||
{
|
||||
"id": 634912432,
|
||||
"name": "cacti-CVE-2022-46169",
|
||||
"full_name": "Ruycraft1514\/cacti-CVE-2022-46169",
|
||||
"name": "CVE-2022-46169",
|
||||
"full_name": "Ruycraft1514\/CVE-2022-46169",
|
||||
"owner": {
|
||||
"login": "Ruycraft1514",
|
||||
"id": 103446004,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ruycraft1514"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ruycraft1514\/cacti-CVE-2022-46169",
|
||||
"html_url": "https:\/\/github.com\/Ruycraft1514\/CVE-2022-46169",
|
||||
"description": "Exploit for cacti version 1.2.22",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T14:29:28Z",
|
||||
"updated_at": "2023-05-01T14:30:51Z",
|
||||
"pushed_at": "2023-05-01T14:35:48Z",
|
||||
"updated_at": "2023-05-01T19:12:58Z",
|
||||
"pushed_at": "2023-05-01T19:13:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -537,5 +537,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 635027757,
|
||||
"name": "CVE-2022-46169-CACTI-1.2.22",
|
||||
"full_name": "FredBrave\/CVE-2022-46169-CACTI-1.2.22",
|
||||
"owner": {
|
||||
"login": "FredBrave",
|
||||
"id": 114189847,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
|
||||
"html_url": "https:\/\/github.com\/FredBrave"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2022-46169-CACTI-1.2.22",
|
||||
"description": "This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T20:00:23Z",
|
||||
"updated_at": "2023-05-01T22:54:36Z",
|
||||
"pushed_at": "2023-05-01T20:11:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-05-01T18:04:32Z",
|
||||
"updated_at": "2023-05-01T20:06:38Z",
|
||||
"pushed_at": "2023-02-21T04:16:19Z",
|
||||
"stargazers_count": 805,
|
||||
"watchers_count": 805,
|
||||
"stargazers_count": 806,
|
||||
"watchers_count": 806,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 805,
|
||||
"watchers": 806,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
31
2022/CVE-2022-46718.json
Normal file
31
2022/CVE-2022-46718.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 635000348,
|
||||
"name": "cve-2022-46718-leaky-location",
|
||||
"full_name": "biscuitehh\/cve-2022-46718-leaky-location",
|
||||
"owner": {
|
||||
"login": "biscuitehh",
|
||||
"id": 507442,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/507442?v=4",
|
||||
"html_url": "https:\/\/github.com\/biscuitehh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/biscuitehh\/cve-2022-46718-leaky-location",
|
||||
"description": "CVE-2022-46718: an app may be able to read sensitive location information.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T18:34:52Z",
|
||||
"updated_at": "2023-05-01T19:11:36Z",
|
||||
"pushed_at": "2023-05-01T18:48:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,8 +42,8 @@
|
|||
"description": "A collection of resources and information about CVE-2023-2033",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-26T15:24:02Z",
|
||||
"updated_at": "2023-05-01T17:44:40Z",
|
||||
"pushed_at": "2023-05-01T17:44:36Z",
|
||||
"updated_at": "2023-05-01T19:26:47Z",
|
||||
"pushed_at": "2023-05-01T19:52:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-04-28T22:47:07Z",
|
||||
"updated_at": "2023-05-01T18:48:32Z",
|
||||
"pushed_at": "2023-03-10T08:58:44Z",
|
||||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 390,
|
||||
"watchers": 389,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -72,17 +72,17 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-04-22T21:34:06Z",
|
||||
"updated_at": "2023-05-01T15:37:05Z",
|
||||
"pushed_at": "2023-04-30T18:04:09Z",
|
||||
"pushed_at": "2023-05-01T19:31:20Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 12,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-25T04:59:05Z",
|
||||
"updated_at": "2023-05-01T13:38:02Z",
|
||||
"updated_at": "2023-05-01T19:40:45Z",
|
||||
"pushed_at": "2023-04-30T17:45:27Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -187,10 +187,10 @@
|
|||
"description": "To filter the actual vulnerable URLs from the screenshots, you can use the ee.sh script. Simply run .\/ee.sh -f \"path\/to\/index_screenshot.txt\" -k \"hacked\" and the script will filter the URLs that contain the reflective XSS payload (For Example: cPanel CVE-2023-29489 ) in their screenshots.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T03:29:11Z",
|
||||
"updated_at": "2023-05-01T17:21:37Z",
|
||||
"updated_at": "2023-05-01T23:59:19Z",
|
||||
"pushed_at": "2023-05-01T03:44:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -199,7 +199,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
13
README.md
13
README.md
|
@ -766,7 +766,12 @@ An issue in the password reset function of Peppermint v0.2.4 allows attackers to
|
|||
|
||||
- [bypazs/CVE-2023-26984](https://github.com/bypazs/CVE-2023-26984)
|
||||
|
||||
### CVE-2023-27035
|
||||
### CVE-2023-27035 (2023-05-01)
|
||||
|
||||
<code>
|
||||
An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page.
|
||||
</code>
|
||||
|
||||
- [fivex3/CVE-2023-27035](https://github.com/fivex3/CVE-2023-27035)
|
||||
|
||||
### CVE-2023-27053
|
||||
|
@ -7147,7 +7152,8 @@ Cacti is an open source platform which provides a robust and extensible operatio
|
|||
- [icebreack/CVE-2022-46169](https://github.com/icebreack/CVE-2022-46169)
|
||||
- [devilgothies/CVE-2022-46169](https://github.com/devilgothies/CVE-2022-46169)
|
||||
- [yassinebk/CVE-2022-46169](https://github.com/yassinebk/CVE-2022-46169)
|
||||
- [Ruycraft1514/cacti-CVE-2022-46169](https://github.com/Ruycraft1514/cacti-CVE-2022-46169)
|
||||
- [Ruycraft1514/CVE-2022-46169](https://github.com/Ruycraft1514/CVE-2022-46169)
|
||||
- [FredBrave/CVE-2022-46169-CACTI-1.2.22](https://github.com/FredBrave/CVE-2022-46169-CACTI-1.2.22)
|
||||
|
||||
### CVE-2022-46175 (2022-12-23)
|
||||
|
||||
|
@ -7242,6 +7248,9 @@ A race condition was addressed with additional validation. This issue is fixed i
|
|||
- [enty8080/MacDirtyCow](https://github.com/enty8080/MacDirtyCow)
|
||||
- [tdquang266/MDC](https://github.com/tdquang266/MDC)
|
||||
|
||||
### CVE-2022-46718
|
||||
- [biscuitehh/cve-2022-46718-leaky-location](https://github.com/biscuitehh/cve-2022-46718-leaky-location)
|
||||
|
||||
### CVE-2022-46836 (2023-02-20)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue