mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/02/25 12:26:13
This commit is contained in:
parent
0fef6100e7
commit
bf2a63d901
54 changed files with 952 additions and 108 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2024-02-22T21:46:05Z",
|
||||
"updated_at": "2024-02-25T07:49:30Z",
|
||||
"pushed_at": "2023-12-27T23:45:17Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 166,
|
||||
"watchers": 167,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit code for CVE-2018-9411 for MediaCasService",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-30T18:48:20Z",
|
||||
"updated_at": "2024-02-18T08:14:49Z",
|
||||
"updated_at": "2024-02-25T10:49:47Z",
|
||||
"pushed_at": "2018-10-30T21:51:16Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2024-01-04T15:51:55Z",
|
||||
"updated_at": "2024-02-25T10:45:24Z",
|
||||
"pushed_at": "2021-03-19T17:23:25Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"has_discussions": false,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 82,
|
||||
"watchers": 263,
|
||||
"watchers": 264,
|
||||
"score": 0,
|
||||
"subscribers_count": 16
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"stargazers_count": 3988,
|
||||
"watchers_count": 3988,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1094,
|
||||
"forks_count": 1079,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -74,7 +74,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1094,
|
||||
"forks": 1079,
|
||||
"watchers": 3988,
|
||||
"score": 0,
|
||||
"subscribers_count": 153
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2024-01-06T11:36:40Z",
|
||||
"updated_at": "2024-02-25T10:38:44Z",
|
||||
"pushed_at": "2023-02-06T19:18:56Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 130,
|
||||
"watchers": 131,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
@ -108,10 +108,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-24T13:10:39Z",
|
||||
"updated_at": "2023-10-18T16:06:48Z",
|
||||
"updated_at": "2024-02-25T10:42:32Z",
|
||||
"pushed_at": "2020-03-24T13:19:34Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -124,7 +124,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T15:25:59Z",
|
||||
"updated_at": "2023-11-18T09:59:33Z",
|
||||
"updated_at": "2024-02-25T10:41:01Z",
|
||||
"pushed_at": "2020-05-10T15:32:54Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 89,
|
||||
"watchers": 90,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A proof-of-concept for CVE-2020-12753",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T21:58:42Z",
|
||||
"updated_at": "2024-01-12T13:09:32Z",
|
||||
"updated_at": "2024-02-25T10:41:32Z",
|
||||
"pushed_at": "2020-06-01T22:55:46Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
}
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 3988,
|
||||
"watchers_count": 3988,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1094,
|
||||
"forks_count": 1079,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1094,
|
||||
"forks": 1079,
|
||||
"watchers": 3988,
|
||||
"score": 0,
|
||||
"subscribers_count": 153
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 7,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
@ -1966,10 +1966,10 @@
|
|||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2024-02-23T16:30:48Z",
|
||||
"updated_at": "2024-02-25T09:46:45Z",
|
||||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 632,
|
||||
"watchers_count": 632,
|
||||
"stargazers_count": 631,
|
||||
"watchers_count": 631,
|
||||
"has_discussions": false,
|
||||
"forks_count": 99,
|
||||
"allow_forking": true,
|
||||
|
@ -1990,7 +1990,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 632,
|
||||
"watchers": 631,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2024-02-24T11:42:46Z",
|
||||
"updated_at": "2024-02-25T10:29:35Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 250,
|
||||
"watchers": 251,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
32
2022/CVE-2022-46088.json
Normal file
32
2022/CVE-2022-46088.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762995938,
|
||||
"name": "CVE-2022-46088",
|
||||
"full_name": "ASR511-OO7\/CVE-2022-46088",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46088",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:24:51Z",
|
||||
"updated_at": "2024-02-25T09:24:51Z",
|
||||
"pushed_at": "2024-02-25T09:25:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-46089.json
Normal file
32
2022/CVE-2022-46089.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762995677,
|
||||
"name": "CVE-2022-46089",
|
||||
"full_name": "ASR511-OO7\/CVE-2022-46089",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46089",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:23:52Z",
|
||||
"updated_at": "2024-02-25T09:23:52Z",
|
||||
"pushed_at": "2024-02-25T09:24:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-46091.json
Normal file
32
2022/CVE-2022-46091.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762995473,
|
||||
"name": "CVE-2022-46091",
|
||||
"full_name": "ASR511-OO7\/CVE-2022-46091",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46091",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:23:01Z",
|
||||
"updated_at": "2024-02-25T09:23:02Z",
|
||||
"pushed_at": "2024-02-25T09:23:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-46497.json
Normal file
32
2022/CVE-2022-46497.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762995029,
|
||||
"name": "CVE-2022-46497",
|
||||
"full_name": "ASR511-OO7\/CVE-2022-46497",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46497",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:21:29Z",
|
||||
"updated_at": "2024-02-25T09:21:30Z",
|
||||
"pushed_at": "2024-02-25T09:22:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-46498.json
Normal file
32
2022/CVE-2022-46498.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762994715,
|
||||
"name": "CVE-2022-46498",
|
||||
"full_name": "ASR511-OO7\/CVE-2022-46498",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46498",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:20:32Z",
|
||||
"updated_at": "2024-02-25T09:20:32Z",
|
||||
"pushed_at": "2024-02-25T09:21:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2022/CVE-2022-46499.json
Normal file
32
2022/CVE-2022-46499.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762994439,
|
||||
"name": "CVE-2022-46499",
|
||||
"full_name": "ASR511-OO7\/CVE-2022-46499",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46499",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:19:32Z",
|
||||
"updated_at": "2024-02-25T09:19:33Z",
|
||||
"pushed_at": "2024-02-25T09:20:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -227,10 +227,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-02-23T09:29:28Z",
|
||||
"updated_at": "2024-02-25T10:03:34Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -239,7 +239,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -619,10 +619,10 @@
|
|||
"description": "Passive version detection method for CVE-2023-22515 using Nuclei scanner",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-24T16:04:35Z",
|
||||
"updated_at": "2024-02-24T16:04:35Z",
|
||||
"updated_at": "2024-02-25T08:06:42Z",
|
||||
"pushed_at": "2024-02-24T16:12:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -631,7 +631,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T15:42:00Z",
|
||||
"updated_at": "2024-02-24T22:05:12Z",
|
||||
"updated_at": "2024-02-25T09:19:42Z",
|
||||
"pushed_at": "2023-10-18T00:49:30Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -148,7 +148,7 @@
|
|||
"rocketmq"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 20,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
32
2023/CVE-2023-33676.json
Normal file
32
2023/CVE-2023-33676.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762994217,
|
||||
"name": "CVE-2023-33676",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-33676",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33676",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:18:38Z",
|
||||
"updated_at": "2024-02-25T09:18:38Z",
|
||||
"pushed_at": "2024-02-25T09:19:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-33677.json
Normal file
32
2023/CVE-2023-33677.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762994002,
|
||||
"name": "CVE-2023-33677",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-33677",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33677",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:17:48Z",
|
||||
"updated_at": "2024-02-25T09:17:48Z",
|
||||
"pushed_at": "2024-02-25T09:18:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 49,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"forks": 48,
|
||||
"watchers": 149,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -1,19 +1,19 @@
|
|||
[
|
||||
{
|
||||
"id": 661203032,
|
||||
"name": "CVE-2023-37250",
|
||||
"full_name": "ewilded\/CVE-2023-37250",
|
||||
"name": "CVE-2023-37250-POC",
|
||||
"full_name": "ewilded\/CVE-2023-37250-POC",
|
||||
"owner": {
|
||||
"login": "ewilded",
|
||||
"id": 1158719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
|
||||
"html_url": "https:\/\/github.com\/ewilded"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250",
|
||||
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250-POC",
|
||||
"description": "PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-02T05:37:51Z",
|
||||
"updated_at": "2023-07-07T03:46:15Z",
|
||||
"updated_at": "2024-02-25T08:17:38Z",
|
||||
"pushed_at": "2023-07-03T10:34:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
32
2023/CVE-2023-38041.json
Normal file
32
2023/CVE-2023-38041.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762975952,
|
||||
"name": "CVE-2023-38041-POC",
|
||||
"full_name": "ewilded\/CVE-2023-38041-POC",
|
||||
"owner": {
|
||||
"login": "ewilded",
|
||||
"id": 1158719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
|
||||
"html_url": "https:\/\/github.com\/ewilded"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-38041-POC",
|
||||
"description": "Ivanti Pulse Secure Client Connect Local Privilege Escalation CVE-2023-38041 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T08:09:17Z",
|
||||
"updated_at": "2024-02-25T08:17:58Z",
|
||||
"pushed_at": "2024-02-25T08:12:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -558,10 +558,10 @@
|
|||
"description": "CVE-2023-38646 Metabase RCE",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-11T03:18:09Z",
|
||||
"updated_at": "2024-02-18T04:50:09Z",
|
||||
"updated_at": "2024-02-25T11:32:52Z",
|
||||
"pushed_at": "2023-10-11T04:06:43Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -575,7 +575,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2023/CVE-2023-41014.json
Normal file
32
2023/CVE-2023-41014.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762993729,
|
||||
"name": "CVE-2023-41014",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-41014",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41014",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:16:50Z",
|
||||
"updated_at": "2024-02-25T09:16:50Z",
|
||||
"pushed_at": "2024-02-25T09:17:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-41015.json
Normal file
32
2023/CVE-2023-41015.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762993478,
|
||||
"name": "CVE-2023-41015",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-41015",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41015",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:15:54Z",
|
||||
"updated_at": "2024-02-25T09:15:55Z",
|
||||
"pushed_at": "2024-02-25T09:16:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-41503.json
Normal file
32
2023/CVE-2023-41503.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762993198,
|
||||
"name": "CVE-2023-41503",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-41503",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41503",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:14:58Z",
|
||||
"updated_at": "2024-02-25T09:14:58Z",
|
||||
"pushed_at": "2024-02-25T09:15:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-41504.json
Normal file
32
2023/CVE-2023-41504.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762992922,
|
||||
"name": "CVE-2023-41504",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-41504",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41504",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:13:57Z",
|
||||
"updated_at": "2024-02-25T09:13:58Z",
|
||||
"pushed_at": "2024-02-25T09:14:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-41505.json
Normal file
32
2023/CVE-2023-41505.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762992550,
|
||||
"name": "CVE-2023-41505",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-41505",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41505",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:12:31Z",
|
||||
"updated_at": "2024-02-25T09:12:31Z",
|
||||
"pushed_at": "2024-02-25T09:13:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-41506.json
Normal file
32
2023/CVE-2023-41506.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762992312,
|
||||
"name": "CVE-2023-41506",
|
||||
"full_name": "ASR511-OO7\/CVE-2023-41506",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41506",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:11:36Z",
|
||||
"updated_at": "2024-02-25T09:11:36Z",
|
||||
"pushed_at": "2024-02-25T09:12:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-10-15T12:14:18Z",
|
||||
"updated_at": "2024-01-30T11:43:23Z",
|
||||
"updated_at": "2024-02-25T10:27:51Z",
|
||||
"pushed_at": "2023-10-20T23:04:03Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 179,
|
||||
"watchers": 180,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -93,5 +93,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 743548847,
|
||||
"name": "GhostTown",
|
||||
"full_name": "StanleyJobsonAU\/GhostTown",
|
||||
"owner": {
|
||||
"login": "StanleyJobsonAU",
|
||||
"id": 123927299,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123927299?v=4",
|
||||
"html_url": "https:\/\/github.com\/StanleyJobsonAU"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/StanleyJobsonAU\/GhostTown",
|
||||
"description": "Proof of Concept script to exploit CVE-2023-42793 (TeamCity)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-15T13:25:49Z",
|
||||
"updated_at": "2024-02-25T06:43:21Z",
|
||||
"pushed_at": "2024-01-15T13:26:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-20T07:14:06Z",
|
||||
"updated_at": "2024-02-25T03:10:17Z",
|
||||
"updated_at": "2024-02-25T08:08:34Z",
|
||||
"pushed_at": "2024-01-21T05:04:01Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-02-20T06:40:18Z",
|
||||
"updated_at": "2024-02-25T07:40:53Z",
|
||||
"pushed_at": "2024-02-06T21:45:34Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
32
2024/CVE-2024-1346.json
Normal file
32
2024/CVE-2024-1346.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 763037615,
|
||||
"name": "CVE-2024-1346",
|
||||
"full_name": "PeterGabaldon\/CVE-2024-1346",
|
||||
"owner": {
|
||||
"login": "PeterGabaldon",
|
||||
"id": 34518201,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34518201?v=4",
|
||||
"html_url": "https:\/\/github.com\/PeterGabaldon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PeterGabaldon\/CVE-2024-1346",
|
||||
"description": "Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T11:51:03Z",
|
||||
"updated_at": "2024-02-25T11:55:24Z",
|
||||
"pushed_at": "2024-02-25T11:55:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-23T11:04:24Z",
|
||||
"updated_at": "2024-02-24T15:16:43Z",
|
||||
"updated_at": "2024-02-25T07:28:34Z",
|
||||
"pushed_at": "2024-02-23T18:07:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-21T09:42:04Z",
|
||||
"updated_at": "2024-02-24T07:13:16Z",
|
||||
"updated_at": "2024-02-25T09:06:26Z",
|
||||
"pushed_at": "2024-02-22T05:22:35Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 61,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-06T15:09:33Z",
|
||||
"updated_at": "2024-02-23T09:29:28Z",
|
||||
"updated_at": "2024-02-25T10:03:34Z",
|
||||
"pushed_at": "2024-02-06T15:56:12Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-02-24T22:33:24Z",
|
||||
"updated_at": "2024-02-25T07:55:26Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 478,
|
||||
"watchers_count": 478,
|
||||
"stargazers_count": 480,
|
||||
"watchers_count": 480,
|
||||
"has_discussions": false,
|
||||
"forks_count": 103,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 103,
|
||||
"watchers": 478,
|
||||
"forks": 102,
|
||||
"watchers": 480,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 7,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
32
2024/CVE-2024-22917.json
Normal file
32
2024/CVE-2024-22917.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762992059,
|
||||
"name": "CVE-2024-22917",
|
||||
"full_name": "ASR511-OO7\/CVE-2024-22917",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-22917",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:10:40Z",
|
||||
"updated_at": "2024-02-25T09:10:40Z",
|
||||
"pushed_at": "2024-02-25T09:11:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T09:44:32Z",
|
||||
"updated_at": "2024-02-15T17:39:36Z",
|
||||
"updated_at": "2024-02-25T08:13:30Z",
|
||||
"pushed_at": "2024-01-28T06:47:28Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 149,
|
||||
"watchers": 150,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
32
2024/CVE-2024-24095.json
Normal file
32
2024/CVE-2024-24095.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762991500,
|
||||
"name": "CVE-2024-24095",
|
||||
"full_name": "ASR511-OO7\/CVE-2024-24095",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24095",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:08:37Z",
|
||||
"updated_at": "2024-02-25T09:08:37Z",
|
||||
"pushed_at": "2024-02-25T09:09:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-24096.json
Normal file
32
2024/CVE-2024-24096.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762991166,
|
||||
"name": "CVE-2024-24096",
|
||||
"full_name": "ASR511-OO7\/CVE-2024-24096",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24096",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:07:19Z",
|
||||
"updated_at": "2024-02-25T09:07:19Z",
|
||||
"pushed_at": "2024-02-25T09:08:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-24099.json
Normal file
32
2024/CVE-2024-24099.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762990093,
|
||||
"name": "CVE-2024-24099",
|
||||
"full_name": "ASR511-OO7\/CVE-2024-24099",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24099",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:03:38Z",
|
||||
"updated_at": "2024-02-25T09:03:39Z",
|
||||
"pushed_at": "2024-02-25T09:04:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-24100.json
Normal file
32
2024/CVE-2024-24100.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 762989705,
|
||||
"name": "CVE-2024-24100",
|
||||
"full_name": "ASR511-OO7\/CVE-2024-24100",
|
||||
"owner": {
|
||||
"login": "ASR511-OO7",
|
||||
"id": 74178946,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24100",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T09:02:08Z",
|
||||
"updated_at": "2024-02-25T09:02:08Z",
|
||||
"pushed_at": "2024-02-25T09:03:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-25169.json
Normal file
32
2024/CVE-2024-25169.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 763046588,
|
||||
"name": "CVE-2024-25169-Mezzanine-v6.0.0",
|
||||
"full_name": "shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
|
||||
"owner": {
|
||||
"login": "shenhav12",
|
||||
"id": 93703363,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
|
||||
"html_url": "https:\/\/github.com\/shenhav12"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T12:21:40Z",
|
||||
"updated_at": "2024-02-25T12:27:53Z",
|
||||
"pushed_at": "2024-02-25T12:27:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2024/CVE-2024-25170.json
Normal file
32
2024/CVE-2024-25170.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 763048747,
|
||||
"name": "CVE-2024-25170-Mezzanine-v6.0.0",
|
||||
"full_name": "shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
|
||||
"owner": {
|
||||
"login": "shenhav12",
|
||||
"id": 93703363,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
|
||||
"html_url": "https:\/\/github.com\/shenhav12"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-25T12:28:49Z",
|
||||
"updated_at": "2024-02-25T12:28:50Z",
|
||||
"pushed_at": "2024-02-25T12:28:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-24T09:30:45Z",
|
||||
"updated_at": "2024-02-24T09:31:39Z",
|
||||
"updated_at": "2024-02-25T07:05:18Z",
|
||||
"pushed_at": "2024-02-24T09:33:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-20T20:16:09Z",
|
||||
"updated_at": "2024-02-24T19:28:38Z",
|
||||
"updated_at": "2024-02-25T10:04:28Z",
|
||||
"pushed_at": "2024-02-24T23:46:37Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 70,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
80
README.md
80
README.md
|
@ -67,6 +67,13 @@
|
|||
|
||||
- [sajaljat/CVE-2024-1269](https://github.com/sajaljat/CVE-2024-1269)
|
||||
|
||||
### CVE-2024-1346 (-)
|
||||
|
||||
<code>Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.
|
||||
</code>
|
||||
|
||||
- [PeterGabaldon/CVE-2024-1346](https://github.com/PeterGabaldon/CVE-2024-1346)
|
||||
|
||||
### CVE-2024-1651 (-)
|
||||
|
||||
<code>Torrentpier version 2.4.1 allows executing arbitrary commands on the server.\n\nThis is possible because the application is vulnerable to insecure deserialization.\n\n\n\n\n
|
||||
|
@ -271,6 +278,9 @@
|
|||
### CVE-2024-22909
|
||||
- [BurakSevben/CVE-2024-22909](https://github.com/BurakSevben/CVE-2024-22909)
|
||||
|
||||
### CVE-2024-22917
|
||||
- [ASR511-OO7/CVE-2024-22917](https://github.com/ASR511-OO7/CVE-2024-22917)
|
||||
|
||||
### CVE-2024-22922 (2024-01-25)
|
||||
|
||||
<code>An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php
|
||||
|
@ -417,12 +427,24 @@
|
|||
### CVE-2024-24094
|
||||
- [ASR511-OO7/CVE-2024-24094](https://github.com/ASR511-OO7/CVE-2024-24094)
|
||||
|
||||
### CVE-2024-24095
|
||||
- [ASR511-OO7/CVE-2024-24095](https://github.com/ASR511-OO7/CVE-2024-24095)
|
||||
|
||||
### CVE-2024-24096
|
||||
- [ASR511-OO7/CVE-2024-24096](https://github.com/ASR511-OO7/CVE-2024-24096)
|
||||
|
||||
### CVE-2024-24097
|
||||
- [ASR511-OO7/CVE-2024-24097](https://github.com/ASR511-OO7/CVE-2024-24097)
|
||||
|
||||
### CVE-2024-24098
|
||||
- [ASR511-OO7/CVE-2024-24098](https://github.com/ASR511-OO7/CVE-2024-24098)
|
||||
|
||||
### CVE-2024-24099
|
||||
- [ASR511-OO7/CVE-2024-24099](https://github.com/ASR511-OO7/CVE-2024-24099)
|
||||
|
||||
### CVE-2024-24100
|
||||
- [ASR511-OO7/CVE-2024-24100](https://github.com/ASR511-OO7/CVE-2024-24100)
|
||||
|
||||
### CVE-2024-24101
|
||||
- [ASR511-OO7/CVE-2024-24101](https://github.com/ASR511-OO7/CVE-2024-24101)
|
||||
|
||||
|
@ -545,6 +567,12 @@
|
|||
### CVE-2024-25092
|
||||
- [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092)
|
||||
|
||||
### CVE-2024-25169
|
||||
- [shenhav12/CVE-2024-25169-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0)
|
||||
|
||||
### CVE-2024-25170
|
||||
- [shenhav12/CVE-2024-25170-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0)
|
||||
|
||||
### CVE-2024-25202
|
||||
- [Agampreet-Singh/CVE-2024-25202](https://github.com/Agampreet-Singh/CVE-2024-25202)
|
||||
|
||||
|
@ -4257,6 +4285,12 @@
|
|||
|
||||
- [lodi-g/CVE-2023-33668](https://github.com/lodi-g/CVE-2023-33668)
|
||||
|
||||
### CVE-2023-33676
|
||||
- [ASR511-OO7/CVE-2023-33676](https://github.com/ASR511-OO7/CVE-2023-33676)
|
||||
|
||||
### CVE-2023-33677
|
||||
- [ASR511-OO7/CVE-2023-33677](https://github.com/ASR511-OO7/CVE-2023-33677)
|
||||
|
||||
### CVE-2023-33730 (2023-05-31)
|
||||
|
||||
<code>Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
|
||||
|
@ -5031,7 +5065,7 @@
|
|||
<code>Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
|
||||
</code>
|
||||
|
||||
- [ewilded/CVE-2023-37250](https://github.com/ewilded/CVE-2023-37250)
|
||||
- [ewilded/CVE-2023-37250-POC](https://github.com/ewilded/CVE-2023-37250-POC)
|
||||
|
||||
### CVE-2023-37474 (2023-07-14)
|
||||
|
||||
|
@ -5186,6 +5220,13 @@
|
|||
- [LeakIX/sentryexploit](https://github.com/LeakIX/sentryexploit)
|
||||
- [mind2hex/MICS_Hunter](https://github.com/mind2hex/MICS_Hunter)
|
||||
|
||||
### CVE-2023-38041 (2023-10-24)
|
||||
|
||||
<code>A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
|
||||
</code>
|
||||
|
||||
- [ewilded/CVE-2023-38041-POC](https://github.com/ewilded/CVE-2023-38041-POC)
|
||||
|
||||
### CVE-2023-38120
|
||||
- [warber0x/CVE-2023-38120](https://github.com/warber0x/CVE-2023-38120)
|
||||
|
||||
|
@ -5650,6 +5691,12 @@
|
|||
|
||||
- [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989)
|
||||
|
||||
### CVE-2023-41014
|
||||
- [ASR511-OO7/CVE-2023-41014](https://github.com/ASR511-OO7/CVE-2023-41014)
|
||||
|
||||
### CVE-2023-41015
|
||||
- [ASR511-OO7/CVE-2023-41015](https://github.com/ASR511-OO7/CVE-2023-41015)
|
||||
|
||||
### CVE-2023-41064 (2023-09-07)
|
||||
|
||||
<code>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
|
||||
|
@ -5722,6 +5769,18 @@
|
|||
### CVE-2023-41501
|
||||
- [ASR511-OO7/CVE-2023-41501](https://github.com/ASR511-OO7/CVE-2023-41501)
|
||||
|
||||
### CVE-2023-41503
|
||||
- [ASR511-OO7/CVE-2023-41503](https://github.com/ASR511-OO7/CVE-2023-41503)
|
||||
|
||||
### CVE-2023-41504
|
||||
- [ASR511-OO7/CVE-2023-41504](https://github.com/ASR511-OO7/CVE-2023-41504)
|
||||
|
||||
### CVE-2023-41505
|
||||
- [ASR511-OO7/CVE-2023-41505](https://github.com/ASR511-OO7/CVE-2023-41505)
|
||||
|
||||
### CVE-2023-41506
|
||||
- [ASR511-OO7/CVE-2023-41506](https://github.com/ASR511-OO7/CVE-2023-41506)
|
||||
|
||||
### CVE-2023-41507 (2023-09-05)
|
||||
|
||||
<code>Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
|
||||
|
@ -5911,6 +5970,7 @@
|
|||
- [H454NSec/CVE-2023-42793](https://github.com/H454NSec/CVE-2023-42793)
|
||||
- [Zenmovie/CVE-2023-42793](https://github.com/Zenmovie/CVE-2023-42793)
|
||||
- [johnossawy/CVE-2023-42793_POC](https://github.com/johnossawy/CVE-2023-42793_POC)
|
||||
- [StanleyJobsonAU/GhostTown](https://github.com/StanleyJobsonAU/GhostTown)
|
||||
|
||||
### CVE-2023-42819 (2023-09-26)
|
||||
|
||||
|
@ -13611,6 +13671,15 @@
|
|||
|
||||
- [G37SYS73M/CVE-2022-46087](https://github.com/G37SYS73M/CVE-2022-46087)
|
||||
|
||||
### CVE-2022-46088
|
||||
- [ASR511-OO7/CVE-2022-46088](https://github.com/ASR511-OO7/CVE-2022-46088)
|
||||
|
||||
### CVE-2022-46089
|
||||
- [ASR511-OO7/CVE-2022-46089](https://github.com/ASR511-OO7/CVE-2022-46089)
|
||||
|
||||
### CVE-2022-46091
|
||||
- [ASR511-OO7/CVE-2022-46091](https://github.com/ASR511-OO7/CVE-2022-46091)
|
||||
|
||||
### CVE-2022-46104
|
||||
- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
|
||||
|
||||
|
@ -13703,6 +13772,15 @@
|
|||
|
||||
- [WodenSec/CVE-2022-46485](https://github.com/WodenSec/CVE-2022-46485)
|
||||
|
||||
### CVE-2022-46497
|
||||
- [ASR511-OO7/CVE-2022-46497](https://github.com/ASR511-OO7/CVE-2022-46497)
|
||||
|
||||
### CVE-2022-46498
|
||||
- [ASR511-OO7/CVE-2022-46498](https://github.com/ASR511-OO7/CVE-2022-46498)
|
||||
|
||||
### CVE-2022-46499
|
||||
- [ASR511-OO7/CVE-2022-46499](https://github.com/ASR511-OO7/CVE-2022-46499)
|
||||
|
||||
### CVE-2022-46505 (2023-01-18)
|
||||
|
||||
<code>An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.
|
||||
|
|
Loading…
Reference in a new issue