mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/02/25 12:26:13
This commit is contained in:
parent
0fef6100e7
commit
bf2a63d901
54 changed files with 952 additions and 108 deletions
|
@ -13,10 +13,10 @@
|
||||||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-08-31T09:51:12Z",
|
"created_at": "2021-08-31T09:51:12Z",
|
||||||
"updated_at": "2024-02-22T21:46:05Z",
|
"updated_at": "2024-02-25T07:49:30Z",
|
||||||
"pushed_at": "2023-12-27T23:45:17Z",
|
"pushed_at": "2023-12-27T23:45:17Z",
|
||||||
"stargazers_count": 166,
|
"stargazers_count": 167,
|
||||||
"watchers_count": 166,
|
"watchers_count": 167,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 22,
|
"forks_count": 22,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -46,7 +46,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 22,
|
"forks": 22,
|
||||||
"watchers": 166,
|
"watchers": 167,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploit code for CVE-2018-9411 for MediaCasService",
|
"description": "Exploit code for CVE-2018-9411 for MediaCasService",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2018-10-30T18:48:20Z",
|
"created_at": "2018-10-30T18:48:20Z",
|
||||||
"updated_at": "2024-02-18T08:14:49Z",
|
"updated_at": "2024-02-25T10:49:47Z",
|
||||||
"pushed_at": "2018-10-30T21:51:16Z",
|
"pushed_at": "2018-10-30T21:51:16Z",
|
||||||
"stargazers_count": 51,
|
"stargazers_count": 52,
|
||||||
"watchers_count": 51,
|
"watchers_count": 52,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 14,
|
"forks_count": 14,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 14,
|
"forks": 14,
|
||||||
"watchers": 51,
|
"watchers": 52,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": " double-free bug in WhatsApp exploit poc",
|
"description": " double-free bug in WhatsApp exploit poc",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-10-03T09:26:24Z",
|
"created_at": "2019-10-03T09:26:24Z",
|
||||||
"updated_at": "2024-01-04T15:51:55Z",
|
"updated_at": "2024-02-25T10:45:24Z",
|
||||||
"pushed_at": "2021-03-19T17:23:25Z",
|
"pushed_at": "2021-03-19T17:23:25Z",
|
||||||
"stargazers_count": 263,
|
"stargazers_count": 264,
|
||||||
"watchers_count": 263,
|
"watchers_count": 264,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 82,
|
"forks_count": 82,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 82,
|
"forks": 82,
|
||||||
"watchers": 263,
|
"watchers": 264,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 16
|
"subscribers_count": 16
|
||||||
},
|
},
|
||||||
|
|
|
@ -48,7 +48,7 @@
|
||||||
"stargazers_count": 3988,
|
"stargazers_count": 3988,
|
||||||
"watchers_count": 3988,
|
"watchers_count": 3988,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1094,
|
"forks_count": 1079,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -74,7 +74,7 @@
|
||||||
"webshell"
|
"webshell"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1094,
|
"forks": 1079,
|
||||||
"watchers": 3988,
|
"watchers": 3988,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 153
|
"subscribers_count": 153
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Root your MediaTek device with CVE-2020-0069",
|
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-09-06T12:12:48Z",
|
"created_at": "2019-09-06T12:12:48Z",
|
||||||
"updated_at": "2024-01-06T11:36:40Z",
|
"updated_at": "2024-02-25T10:38:44Z",
|
||||||
"pushed_at": "2023-02-06T19:18:56Z",
|
"pushed_at": "2023-02-06T19:18:56Z",
|
||||||
"stargazers_count": 130,
|
"stargazers_count": 131,
|
||||||
"watchers_count": 130,
|
"watchers_count": 131,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -30,7 +30,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 130,
|
"watchers": 131,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
},
|
},
|
||||||
|
@ -108,10 +108,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-03-24T13:10:39Z",
|
"created_at": "2020-03-24T13:10:39Z",
|
||||||
"updated_at": "2023-10-18T16:06:48Z",
|
"updated_at": "2024-02-25T10:42:32Z",
|
||||||
"pushed_at": "2020-03-24T13:19:34Z",
|
"pushed_at": "2020-03-24T13:19:34Z",
|
||||||
"stargazers_count": 98,
|
"stargazers_count": 99,
|
||||||
"watchers_count": 98,
|
"watchers_count": 99,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 28,
|
"forks_count": 28,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -124,7 +124,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 28,
|
"forks": 28,
|
||||||
"watchers": 98,
|
"watchers": 99,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-05-10T15:25:59Z",
|
"created_at": "2020-05-10T15:25:59Z",
|
||||||
"updated_at": "2023-11-18T09:59:33Z",
|
"updated_at": "2024-02-25T10:41:01Z",
|
||||||
"pushed_at": "2020-05-10T15:32:54Z",
|
"pushed_at": "2020-05-10T15:32:54Z",
|
||||||
"stargazers_count": 89,
|
"stargazers_count": 90,
|
||||||
"watchers_count": 89,
|
"watchers_count": 90,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 38,
|
"forks_count": 38,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -28,7 +28,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 38,
|
"forks": 38,
|
||||||
"watchers": 89,
|
"watchers": 90,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "A proof-of-concept for CVE-2020-12753",
|
"description": "A proof-of-concept for CVE-2020-12753",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-06-01T21:58:42Z",
|
"created_at": "2020-06-01T21:58:42Z",
|
||||||
"updated_at": "2024-01-12T13:09:32Z",
|
"updated_at": "2024-02-25T10:41:32Z",
|
||||||
"pushed_at": "2020-06-01T22:55:46Z",
|
"pushed_at": "2020-06-01T22:55:46Z",
|
||||||
"stargazers_count": 38,
|
"stargazers_count": 39,
|
||||||
"watchers_count": 38,
|
"watchers_count": 39,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 38,
|
"watchers": 39,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
}
|
}
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
"stargazers_count": 3988,
|
"stargazers_count": 3988,
|
||||||
"watchers_count": 3988,
|
"watchers_count": 3988,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1094,
|
"forks_count": 1079,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
"webshell"
|
"webshell"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1094,
|
"forks": 1079,
|
||||||
"watchers": 3988,
|
"watchers": 3988,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 153
|
"subscribers_count": 153
|
||||||
|
|
|
@ -78,13 +78,13 @@
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 7,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
|
|
|
@ -1966,10 +1966,10 @@
|
||||||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-12T00:29:03Z",
|
"created_at": "2021-12-12T00:29:03Z",
|
||||||
"updated_at": "2024-02-23T16:30:48Z",
|
"updated_at": "2024-02-25T09:46:45Z",
|
||||||
"pushed_at": "2022-03-10T18:44:50Z",
|
"pushed_at": "2022-03-10T18:44:50Z",
|
||||||
"stargazers_count": 632,
|
"stargazers_count": 631,
|
||||||
"watchers_count": 632,
|
"watchers_count": 631,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 99,
|
"forks_count": 99,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1990,7 +1990,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 99,
|
"forks": 99,
|
||||||
"watchers": 632,
|
"watchers": 631,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 28
|
"subscribers_count": 28
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-01-10T16:24:51Z",
|
"created_at": "2023-01-10T16:24:51Z",
|
||||||
"updated_at": "2024-02-24T11:42:46Z",
|
"updated_at": "2024-02-25T10:29:35Z",
|
||||||
"pushed_at": "2023-04-12T17:28:49Z",
|
"pushed_at": "2023-04-12T17:28:49Z",
|
||||||
"stargazers_count": 250,
|
"stargazers_count": 251,
|
||||||
"watchers_count": 250,
|
"watchers_count": 251,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 48,
|
"forks_count": 48,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 48,
|
"forks": 48,
|
||||||
"watchers": 250,
|
"watchers": 251,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 8
|
"subscribers_count": 8
|
||||||
}
|
}
|
||||||
|
|
32
2022/CVE-2022-46088.json
Normal file
32
2022/CVE-2022-46088.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762995938,
|
||||||
|
"name": "CVE-2022-46088",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2022-46088",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46088",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:24:51Z",
|
||||||
|
"updated_at": "2024-02-25T09:24:51Z",
|
||||||
|
"pushed_at": "2024-02-25T09:25:24Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2022/CVE-2022-46089.json
Normal file
32
2022/CVE-2022-46089.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762995677,
|
||||||
|
"name": "CVE-2022-46089",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2022-46089",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46089",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:23:52Z",
|
||||||
|
"updated_at": "2024-02-25T09:23:52Z",
|
||||||
|
"pushed_at": "2024-02-25T09:24:31Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2022/CVE-2022-46091.json
Normal file
32
2022/CVE-2022-46091.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762995473,
|
||||||
|
"name": "CVE-2022-46091",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2022-46091",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46091",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:23:01Z",
|
||||||
|
"updated_at": "2024-02-25T09:23:02Z",
|
||||||
|
"pushed_at": "2024-02-25T09:23:36Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2022/CVE-2022-46497.json
Normal file
32
2022/CVE-2022-46497.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762995029,
|
||||||
|
"name": "CVE-2022-46497",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2022-46497",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46497",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:21:29Z",
|
||||||
|
"updated_at": "2024-02-25T09:21:30Z",
|
||||||
|
"pushed_at": "2024-02-25T09:22:36Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2022/CVE-2022-46498.json
Normal file
32
2022/CVE-2022-46498.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762994715,
|
||||||
|
"name": "CVE-2022-46498",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2022-46498",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46498",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:20:32Z",
|
||||||
|
"updated_at": "2024-02-25T09:20:32Z",
|
||||||
|
"pushed_at": "2024-02-25T09:21:09Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2022/CVE-2022-46499.json
Normal file
32
2022/CVE-2022-46499.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762994439,
|
||||||
|
"name": "CVE-2022-46499",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2022-46499",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46499",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:19:32Z",
|
||||||
|
"updated_at": "2024-02-25T09:19:33Z",
|
||||||
|
"pushed_at": "2024-02-25T09:20:09Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -227,10 +227,10 @@
|
||||||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-06T15:09:33Z",
|
"created_at": "2024-02-06T15:09:33Z",
|
||||||
"updated_at": "2024-02-23T09:29:28Z",
|
"updated_at": "2024-02-25T10:03:34Z",
|
||||||
"pushed_at": "2024-02-06T15:56:12Z",
|
"pushed_at": "2024-02-06T15:56:12Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 32,
|
||||||
"watchers_count": 31,
|
"watchers_count": 32,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -239,7 +239,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 31,
|
"watchers": 32,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -619,10 +619,10 @@
|
||||||
"description": "Passive version detection method for CVE-2023-22515 using Nuclei scanner",
|
"description": "Passive version detection method for CVE-2023-22515 using Nuclei scanner",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-24T16:04:35Z",
|
"created_at": "2024-02-24T16:04:35Z",
|
||||||
"updated_at": "2024-02-24T16:04:35Z",
|
"updated_at": "2024-02-25T08:06:42Z",
|
||||||
"pushed_at": "2024-02-24T16:12:56Z",
|
"pushed_at": "2024-02-24T16:12:56Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -631,7 +631,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -103,10 +103,10 @@
|
||||||
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
|
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-06-18T15:42:00Z",
|
"created_at": "2023-06-18T15:42:00Z",
|
||||||
"updated_at": "2024-02-24T22:05:12Z",
|
"updated_at": "2024-02-25T09:19:42Z",
|
||||||
"pushed_at": "2023-10-18T00:49:30Z",
|
"pushed_at": "2023-10-18T00:49:30Z",
|
||||||
"stargazers_count": 16,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 16,
|
"watchers_count": 17,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -115,7 +115,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 16,
|
"watchers": 17,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -138,7 +138,7 @@
|
||||||
"stargazers_count": 95,
|
"stargazers_count": 95,
|
||||||
"watchers_count": 95,
|
"watchers_count": 95,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 21,
|
"forks_count": 20,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -148,7 +148,7 @@
|
||||||
"rocketmq"
|
"rocketmq"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 21,
|
"forks": 20,
|
||||||
"watchers": 95,
|
"watchers": 95,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
|
|
32
2023/CVE-2023-33676.json
Normal file
32
2023/CVE-2023-33676.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762994217,
|
||||||
|
"name": "CVE-2023-33676",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-33676",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33676",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:18:38Z",
|
||||||
|
"updated_at": "2024-02-25T09:18:38Z",
|
||||||
|
"pushed_at": "2024-02-25T09:19:13Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2023/CVE-2023-33677.json
Normal file
32
2023/CVE-2023-33677.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762994002,
|
||||||
|
"name": "CVE-2023-33677",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-33677",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33677",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:17:48Z",
|
||||||
|
"updated_at": "2024-02-25T09:17:48Z",
|
||||||
|
"pushed_at": "2024-02-25T09:18:21Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -18,13 +18,13 @@
|
||||||
"stargazers_count": 149,
|
"stargazers_count": 149,
|
||||||
"watchers_count": 149,
|
"watchers_count": 149,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 49,
|
"forks_count": 48,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 49,
|
"forks": 48,
|
||||||
"watchers": 149,
|
"watchers": 149,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
|
|
|
@ -1,19 +1,19 @@
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"id": 661203032,
|
"id": 661203032,
|
||||||
"name": "CVE-2023-37250",
|
"name": "CVE-2023-37250-POC",
|
||||||
"full_name": "ewilded\/CVE-2023-37250",
|
"full_name": "ewilded\/CVE-2023-37250-POC",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "ewilded",
|
"login": "ewilded",
|
||||||
"id": 1158719,
|
"id": 1158719,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
|
||||||
"html_url": "https:\/\/github.com\/ewilded"
|
"html_url": "https:\/\/github.com\/ewilded"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250",
|
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250-POC",
|
||||||
"description": "PoC",
|
"description": "PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-07-02T05:37:51Z",
|
"created_at": "2023-07-02T05:37:51Z",
|
||||||
"updated_at": "2023-07-07T03:46:15Z",
|
"updated_at": "2024-02-25T08:17:38Z",
|
||||||
"pushed_at": "2023-07-03T10:34:45Z",
|
"pushed_at": "2023-07-03T10:34:45Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
|
|
32
2023/CVE-2023-38041.json
Normal file
32
2023/CVE-2023-38041.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762975952,
|
||||||
|
"name": "CVE-2023-38041-POC",
|
||||||
|
"full_name": "ewilded\/CVE-2023-38041-POC",
|
||||||
|
"owner": {
|
||||||
|
"login": "ewilded",
|
||||||
|
"id": 1158719,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ewilded"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-38041-POC",
|
||||||
|
"description": "Ivanti Pulse Secure Client Connect Local Privilege Escalation CVE-2023-38041 Proof of Concept",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T08:09:17Z",
|
||||||
|
"updated_at": "2024-02-25T08:17:58Z",
|
||||||
|
"pushed_at": "2024-02-25T08:12:52Z",
|
||||||
|
"stargazers_count": 1,
|
||||||
|
"watchers_count": 1,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 1,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -558,10 +558,10 @@
|
||||||
"description": "CVE-2023-38646 Metabase RCE",
|
"description": "CVE-2023-38646 Metabase RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-11T03:18:09Z",
|
"created_at": "2023-10-11T03:18:09Z",
|
||||||
"updated_at": "2024-02-18T04:50:09Z",
|
"updated_at": "2024-02-25T11:32:52Z",
|
||||||
"pushed_at": "2023-10-11T04:06:43Z",
|
"pushed_at": "2023-10-11T04:06:43Z",
|
||||||
"stargazers_count": 43,
|
"stargazers_count": 44,
|
||||||
"watchers_count": 43,
|
"watchers_count": 44,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -575,7 +575,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 43,
|
"watchers": 44,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
32
2023/CVE-2023-41014.json
Normal file
32
2023/CVE-2023-41014.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762993729,
|
||||||
|
"name": "CVE-2023-41014",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-41014",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41014",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:16:50Z",
|
||||||
|
"updated_at": "2024-02-25T09:16:50Z",
|
||||||
|
"pushed_at": "2024-02-25T09:17:30Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2023/CVE-2023-41015.json
Normal file
32
2023/CVE-2023-41015.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762993478,
|
||||||
|
"name": "CVE-2023-41015",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-41015",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41015",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:15:54Z",
|
||||||
|
"updated_at": "2024-02-25T09:15:55Z",
|
||||||
|
"pushed_at": "2024-02-25T09:16:31Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2023/CVE-2023-41503.json
Normal file
32
2023/CVE-2023-41503.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762993198,
|
||||||
|
"name": "CVE-2023-41503",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-41503",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41503",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:14:58Z",
|
||||||
|
"updated_at": "2024-02-25T09:14:58Z",
|
||||||
|
"pushed_at": "2024-02-25T09:15:32Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2023/CVE-2023-41504.json
Normal file
32
2023/CVE-2023-41504.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762992922,
|
||||||
|
"name": "CVE-2023-41504",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-41504",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41504",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:13:57Z",
|
||||||
|
"updated_at": "2024-02-25T09:13:58Z",
|
||||||
|
"pushed_at": "2024-02-25T09:14:32Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2023/CVE-2023-41505.json
Normal file
32
2023/CVE-2023-41505.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762992550,
|
||||||
|
"name": "CVE-2023-41505",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-41505",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41505",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:12:31Z",
|
||||||
|
"updated_at": "2024-02-25T09:12:31Z",
|
||||||
|
"pushed_at": "2024-02-25T09:13:12Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2023/CVE-2023-41506.json
Normal file
32
2023/CVE-2023-41506.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762992312,
|
||||||
|
"name": "CVE-2023-41506",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2023-41506",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41506",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:11:36Z",
|
||||||
|
"updated_at": "2024-02-25T09:11:36Z",
|
||||||
|
"pushed_at": "2024-02-25T09:12:10Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-15T12:14:18Z",
|
"created_at": "2023-10-15T12:14:18Z",
|
||||||
"updated_at": "2024-01-30T11:43:23Z",
|
"updated_at": "2024-02-25T10:27:51Z",
|
||||||
"pushed_at": "2023-10-20T23:04:03Z",
|
"pushed_at": "2023-10-20T23:04:03Z",
|
||||||
"stargazers_count": 179,
|
"stargazers_count": 180,
|
||||||
"watchers_count": 179,
|
"watchers_count": 180,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 30,
|
"forks_count": 30,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 30,
|
"forks": 30,
|
||||||
"watchers": 179,
|
"watchers": 180,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 9
|
"subscribers_count": 9
|
||||||
},
|
},
|
||||||
|
|
|
@ -93,5 +93,35 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 743548847,
|
||||||
|
"name": "GhostTown",
|
||||||
|
"full_name": "StanleyJobsonAU\/GhostTown",
|
||||||
|
"owner": {
|
||||||
|
"login": "StanleyJobsonAU",
|
||||||
|
"id": 123927299,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123927299?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/StanleyJobsonAU"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/StanleyJobsonAU\/GhostTown",
|
||||||
|
"description": "Proof of Concept script to exploit CVE-2023-42793 (TeamCity)",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-01-15T13:25:49Z",
|
||||||
|
"updated_at": "2024-02-25T06:43:21Z",
|
||||||
|
"pushed_at": "2024-01-15T13:26:35Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-20T07:14:06Z",
|
"created_at": "2024-01-20T07:14:06Z",
|
||||||
"updated_at": "2024-02-25T03:10:17Z",
|
"updated_at": "2024-02-25T08:08:34Z",
|
||||||
"pushed_at": "2024-01-21T05:04:01Z",
|
"pushed_at": "2024-01-21T05:04:01Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 55,
|
||||||
"watchers_count": 54,
|
"watchers_count": 55,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 54,
|
"watchers": 55,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2024-02-20T06:40:18Z",
|
"updated_at": "2024-02-25T07:40:53Z",
|
||||||
"pushed_at": "2024-02-06T21:45:34Z",
|
"pushed_at": "2024-02-06T21:45:34Z",
|
||||||
"stargazers_count": 27,
|
"stargazers_count": 28,
|
||||||
"watchers_count": 27,
|
"watchers_count": 28,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 10,
|
"forks": 10,
|
||||||
"watchers": 27,
|
"watchers": 28,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
32
2024/CVE-2024-1346.json
Normal file
32
2024/CVE-2024-1346.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 763037615,
|
||||||
|
"name": "CVE-2024-1346",
|
||||||
|
"full_name": "PeterGabaldon\/CVE-2024-1346",
|
||||||
|
"owner": {
|
||||||
|
"login": "PeterGabaldon",
|
||||||
|
"id": 34518201,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34518201?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/PeterGabaldon"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/PeterGabaldon\/CVE-2024-1346",
|
||||||
|
"description": "Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T11:51:03Z",
|
||||||
|
"updated_at": "2024-02-25T11:55:24Z",
|
||||||
|
"pushed_at": "2024-02-25T11:55:20Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -13,7 +13,7 @@
|
||||||
"description": "Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE).",
|
"description": "Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE).",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-23T11:04:24Z",
|
"created_at": "2024-02-23T11:04:24Z",
|
||||||
"updated_at": "2024-02-24T15:16:43Z",
|
"updated_at": "2024-02-25T07:28:34Z",
|
||||||
"pushed_at": "2024-02-23T18:07:52Z",
|
"pushed_at": "2024-02-23T18:07:52Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 3,
|
"watchers_count": 3,
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
|
"description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-21T09:42:04Z",
|
"created_at": "2024-02-21T09:42:04Z",
|
||||||
"updated_at": "2024-02-24T07:13:16Z",
|
"updated_at": "2024-02-25T09:06:26Z",
|
||||||
"pushed_at": "2024-02-22T05:22:35Z",
|
"pushed_at": "2024-02-22T05:22:35Z",
|
||||||
"stargazers_count": 61,
|
"stargazers_count": 64,
|
||||||
"watchers_count": 61,
|
"watchers_count": 64,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -34,7 +34,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 61,
|
"watchers": 64,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -103,10 +103,10 @@
|
||||||
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-06T15:09:33Z",
|
"created_at": "2024-02-06T15:09:33Z",
|
||||||
"updated_at": "2024-02-23T09:29:28Z",
|
"updated_at": "2024-02-25T10:03:34Z",
|
||||||
"pushed_at": "2024-02-06T15:56:12Z",
|
"pushed_at": "2024-02-06T15:56:12Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 32,
|
||||||
"watchers_count": 31,
|
"watchers_count": 32,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -115,7 +115,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 31,
|
"watchers": 32,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -43,19 +43,19 @@
|
||||||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-16T15:17:59Z",
|
"created_at": "2024-02-16T15:17:59Z",
|
||||||
"updated_at": "2024-02-24T22:33:24Z",
|
"updated_at": "2024-02-25T07:55:26Z",
|
||||||
"pushed_at": "2024-02-19T20:00:35Z",
|
"pushed_at": "2024-02-19T20:00:35Z",
|
||||||
"stargazers_count": 478,
|
"stargazers_count": 480,
|
||||||
"watchers_count": 478,
|
"watchers_count": 480,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 103,
|
"forks_count": 102,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 103,
|
"forks": 102,
|
||||||
"watchers": 478,
|
"watchers": 480,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 6
|
"subscribers_count": 6
|
||||||
},
|
},
|
||||||
|
|
|
@ -18,13 +18,13 @@
|
||||||
"stargazers_count": 21,
|
"stargazers_count": 21,
|
||||||
"watchers_count": 21,
|
"watchers_count": 21,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 7,
|
||||||
"watchers": 21,
|
"watchers": 21,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
|
|
32
2024/CVE-2024-22917.json
Normal file
32
2024/CVE-2024-22917.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762992059,
|
||||||
|
"name": "CVE-2024-22917",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2024-22917",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-22917",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:10:40Z",
|
||||||
|
"updated_at": "2024-02-25T09:10:40Z",
|
||||||
|
"pushed_at": "2024-02-25T09:11:16Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -73,10 +73,10 @@
|
||||||
"description": "CVE-2024-23897",
|
"description": "CVE-2024-23897",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-26T09:44:32Z",
|
"created_at": "2024-01-26T09:44:32Z",
|
||||||
"updated_at": "2024-02-15T17:39:36Z",
|
"updated_at": "2024-02-25T08:13:30Z",
|
||||||
"pushed_at": "2024-01-28T06:47:28Z",
|
"pushed_at": "2024-01-28T06:47:28Z",
|
||||||
"stargazers_count": 149,
|
"stargazers_count": 150,
|
||||||
"watchers_count": 149,
|
"watchers_count": 150,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 27,
|
"forks_count": 27,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -85,7 +85,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 27,
|
"forks": 27,
|
||||||
"watchers": 149,
|
"watchers": 150,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
32
2024/CVE-2024-24095.json
Normal file
32
2024/CVE-2024-24095.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762991500,
|
||||||
|
"name": "CVE-2024-24095",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2024-24095",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24095",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:08:37Z",
|
||||||
|
"updated_at": "2024-02-25T09:08:37Z",
|
||||||
|
"pushed_at": "2024-02-25T09:09:12Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2024/CVE-2024-24096.json
Normal file
32
2024/CVE-2024-24096.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762991166,
|
||||||
|
"name": "CVE-2024-24096",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2024-24096",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24096",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:07:19Z",
|
||||||
|
"updated_at": "2024-02-25T09:07:19Z",
|
||||||
|
"pushed_at": "2024-02-25T09:08:01Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2024/CVE-2024-24099.json
Normal file
32
2024/CVE-2024-24099.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762990093,
|
||||||
|
"name": "CVE-2024-24099",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2024-24099",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24099",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:03:38Z",
|
||||||
|
"updated_at": "2024-02-25T09:03:39Z",
|
||||||
|
"pushed_at": "2024-02-25T09:04:23Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2024/CVE-2024-24100.json
Normal file
32
2024/CVE-2024-24100.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 762989705,
|
||||||
|
"name": "CVE-2024-24100",
|
||||||
|
"full_name": "ASR511-OO7\/CVE-2024-24100",
|
||||||
|
"owner": {
|
||||||
|
"login": "ASR511-OO7",
|
||||||
|
"id": 74178946,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24100",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T09:02:08Z",
|
||||||
|
"updated_at": "2024-02-25T09:02:08Z",
|
||||||
|
"pushed_at": "2024-02-25T09:03:17Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2024/CVE-2024-25169.json
Normal file
32
2024/CVE-2024-25169.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 763046588,
|
||||||
|
"name": "CVE-2024-25169-Mezzanine-v6.0.0",
|
||||||
|
"full_name": "shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
|
||||||
|
"owner": {
|
||||||
|
"login": "shenhav12",
|
||||||
|
"id": 93703363,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/shenhav12"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T12:21:40Z",
|
||||||
|
"updated_at": "2024-02-25T12:27:53Z",
|
||||||
|
"pushed_at": "2024-02-25T12:27:23Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
32
2024/CVE-2024-25170.json
Normal file
32
2024/CVE-2024-25170.json
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 763048747,
|
||||||
|
"name": "CVE-2024-25170-Mezzanine-v6.0.0",
|
||||||
|
"full_name": "shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
|
||||||
|
"owner": {
|
||||||
|
"login": "shenhav12",
|
||||||
|
"id": 93703363,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/shenhav12"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2024-02-25T12:28:49Z",
|
||||||
|
"updated_at": "2024-02-25T12:28:50Z",
|
||||||
|
"pushed_at": "2024-02-25T12:28:50Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -13,10 +13,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-24T09:30:45Z",
|
"created_at": "2024-02-24T09:30:45Z",
|
||||||
"updated_at": "2024-02-24T09:31:39Z",
|
"updated_at": "2024-02-25T07:05:18Z",
|
||||||
"pushed_at": "2024-02-24T09:33:42Z",
|
"pushed_at": "2024-02-24T09:33:42Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
|
"description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-02-20T20:16:09Z",
|
"created_at": "2024-02-20T20:16:09Z",
|
||||||
"updated_at": "2024-02-24T19:28:38Z",
|
"updated_at": "2024-02-25T10:04:28Z",
|
||||||
"pushed_at": "2024-02-24T23:46:37Z",
|
"pushed_at": "2024-02-24T23:46:37Z",
|
||||||
"stargazers_count": 70,
|
"stargazers_count": 72,
|
||||||
"watchers_count": 70,
|
"watchers_count": 72,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 13,
|
"forks_count": 13,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -25,7 +25,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 13,
|
"forks": 13,
|
||||||
"watchers": 70,
|
"watchers": 72,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
80
README.md
80
README.md
|
@ -67,6 +67,13 @@
|
||||||
|
|
||||||
- [sajaljat/CVE-2024-1269](https://github.com/sajaljat/CVE-2024-1269)
|
- [sajaljat/CVE-2024-1269](https://github.com/sajaljat/CVE-2024-1269)
|
||||||
|
|
||||||
|
### CVE-2024-1346 (-)
|
||||||
|
|
||||||
|
<code>Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [PeterGabaldon/CVE-2024-1346](https://github.com/PeterGabaldon/CVE-2024-1346)
|
||||||
|
|
||||||
### CVE-2024-1651 (-)
|
### CVE-2024-1651 (-)
|
||||||
|
|
||||||
<code>Torrentpier version 2.4.1 allows executing arbitrary commands on the server.\n\nThis is possible because the application is vulnerable to insecure deserialization.\n\n\n\n\n
|
<code>Torrentpier version 2.4.1 allows executing arbitrary commands on the server.\n\nThis is possible because the application is vulnerable to insecure deserialization.\n\n\n\n\n
|
||||||
|
@ -271,6 +278,9 @@
|
||||||
### CVE-2024-22909
|
### CVE-2024-22909
|
||||||
- [BurakSevben/CVE-2024-22909](https://github.com/BurakSevben/CVE-2024-22909)
|
- [BurakSevben/CVE-2024-22909](https://github.com/BurakSevben/CVE-2024-22909)
|
||||||
|
|
||||||
|
### CVE-2024-22917
|
||||||
|
- [ASR511-OO7/CVE-2024-22917](https://github.com/ASR511-OO7/CVE-2024-22917)
|
||||||
|
|
||||||
### CVE-2024-22922 (2024-01-25)
|
### CVE-2024-22922 (2024-01-25)
|
||||||
|
|
||||||
<code>An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php
|
<code>An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php
|
||||||
|
@ -417,12 +427,24 @@
|
||||||
### CVE-2024-24094
|
### CVE-2024-24094
|
||||||
- [ASR511-OO7/CVE-2024-24094](https://github.com/ASR511-OO7/CVE-2024-24094)
|
- [ASR511-OO7/CVE-2024-24094](https://github.com/ASR511-OO7/CVE-2024-24094)
|
||||||
|
|
||||||
|
### CVE-2024-24095
|
||||||
|
- [ASR511-OO7/CVE-2024-24095](https://github.com/ASR511-OO7/CVE-2024-24095)
|
||||||
|
|
||||||
|
### CVE-2024-24096
|
||||||
|
- [ASR511-OO7/CVE-2024-24096](https://github.com/ASR511-OO7/CVE-2024-24096)
|
||||||
|
|
||||||
### CVE-2024-24097
|
### CVE-2024-24097
|
||||||
- [ASR511-OO7/CVE-2024-24097](https://github.com/ASR511-OO7/CVE-2024-24097)
|
- [ASR511-OO7/CVE-2024-24097](https://github.com/ASR511-OO7/CVE-2024-24097)
|
||||||
|
|
||||||
### CVE-2024-24098
|
### CVE-2024-24098
|
||||||
- [ASR511-OO7/CVE-2024-24098](https://github.com/ASR511-OO7/CVE-2024-24098)
|
- [ASR511-OO7/CVE-2024-24098](https://github.com/ASR511-OO7/CVE-2024-24098)
|
||||||
|
|
||||||
|
### CVE-2024-24099
|
||||||
|
- [ASR511-OO7/CVE-2024-24099](https://github.com/ASR511-OO7/CVE-2024-24099)
|
||||||
|
|
||||||
|
### CVE-2024-24100
|
||||||
|
- [ASR511-OO7/CVE-2024-24100](https://github.com/ASR511-OO7/CVE-2024-24100)
|
||||||
|
|
||||||
### CVE-2024-24101
|
### CVE-2024-24101
|
||||||
- [ASR511-OO7/CVE-2024-24101](https://github.com/ASR511-OO7/CVE-2024-24101)
|
- [ASR511-OO7/CVE-2024-24101](https://github.com/ASR511-OO7/CVE-2024-24101)
|
||||||
|
|
||||||
|
@ -545,6 +567,12 @@
|
||||||
### CVE-2024-25092
|
### CVE-2024-25092
|
||||||
- [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092)
|
- [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092)
|
||||||
|
|
||||||
|
### CVE-2024-25169
|
||||||
|
- [shenhav12/CVE-2024-25169-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0)
|
||||||
|
|
||||||
|
### CVE-2024-25170
|
||||||
|
- [shenhav12/CVE-2024-25170-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0)
|
||||||
|
|
||||||
### CVE-2024-25202
|
### CVE-2024-25202
|
||||||
- [Agampreet-Singh/CVE-2024-25202](https://github.com/Agampreet-Singh/CVE-2024-25202)
|
- [Agampreet-Singh/CVE-2024-25202](https://github.com/Agampreet-Singh/CVE-2024-25202)
|
||||||
|
|
||||||
|
@ -4257,6 +4285,12 @@
|
||||||
|
|
||||||
- [lodi-g/CVE-2023-33668](https://github.com/lodi-g/CVE-2023-33668)
|
- [lodi-g/CVE-2023-33668](https://github.com/lodi-g/CVE-2023-33668)
|
||||||
|
|
||||||
|
### CVE-2023-33676
|
||||||
|
- [ASR511-OO7/CVE-2023-33676](https://github.com/ASR511-OO7/CVE-2023-33676)
|
||||||
|
|
||||||
|
### CVE-2023-33677
|
||||||
|
- [ASR511-OO7/CVE-2023-33677](https://github.com/ASR511-OO7/CVE-2023-33677)
|
||||||
|
|
||||||
### CVE-2023-33730 (2023-05-31)
|
### CVE-2023-33730 (2023-05-31)
|
||||||
|
|
||||||
<code>Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
|
<code>Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
|
||||||
|
@ -5031,7 +5065,7 @@
|
||||||
<code>Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
|
<code>Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in "Per User" mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [ewilded/CVE-2023-37250](https://github.com/ewilded/CVE-2023-37250)
|
- [ewilded/CVE-2023-37250-POC](https://github.com/ewilded/CVE-2023-37250-POC)
|
||||||
|
|
||||||
### CVE-2023-37474 (2023-07-14)
|
### CVE-2023-37474 (2023-07-14)
|
||||||
|
|
||||||
|
@ -5186,6 +5220,13 @@
|
||||||
- [LeakIX/sentryexploit](https://github.com/LeakIX/sentryexploit)
|
- [LeakIX/sentryexploit](https://github.com/LeakIX/sentryexploit)
|
||||||
- [mind2hex/MICS_Hunter](https://github.com/mind2hex/MICS_Hunter)
|
- [mind2hex/MICS_Hunter](https://github.com/mind2hex/MICS_Hunter)
|
||||||
|
|
||||||
|
### CVE-2023-38041 (2023-10-24)
|
||||||
|
|
||||||
|
<code>A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [ewilded/CVE-2023-38041-POC](https://github.com/ewilded/CVE-2023-38041-POC)
|
||||||
|
|
||||||
### CVE-2023-38120
|
### CVE-2023-38120
|
||||||
- [warber0x/CVE-2023-38120](https://github.com/warber0x/CVE-2023-38120)
|
- [warber0x/CVE-2023-38120](https://github.com/warber0x/CVE-2023-38120)
|
||||||
|
|
||||||
|
@ -5650,6 +5691,12 @@
|
||||||
|
|
||||||
- [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989)
|
- [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989)
|
||||||
|
|
||||||
|
### CVE-2023-41014
|
||||||
|
- [ASR511-OO7/CVE-2023-41014](https://github.com/ASR511-OO7/CVE-2023-41014)
|
||||||
|
|
||||||
|
### CVE-2023-41015
|
||||||
|
- [ASR511-OO7/CVE-2023-41015](https://github.com/ASR511-OO7/CVE-2023-41015)
|
||||||
|
|
||||||
### CVE-2023-41064 (2023-09-07)
|
### CVE-2023-41064 (2023-09-07)
|
||||||
|
|
||||||
<code>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
|
<code>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
|
||||||
|
@ -5722,6 +5769,18 @@
|
||||||
### CVE-2023-41501
|
### CVE-2023-41501
|
||||||
- [ASR511-OO7/CVE-2023-41501](https://github.com/ASR511-OO7/CVE-2023-41501)
|
- [ASR511-OO7/CVE-2023-41501](https://github.com/ASR511-OO7/CVE-2023-41501)
|
||||||
|
|
||||||
|
### CVE-2023-41503
|
||||||
|
- [ASR511-OO7/CVE-2023-41503](https://github.com/ASR511-OO7/CVE-2023-41503)
|
||||||
|
|
||||||
|
### CVE-2023-41504
|
||||||
|
- [ASR511-OO7/CVE-2023-41504](https://github.com/ASR511-OO7/CVE-2023-41504)
|
||||||
|
|
||||||
|
### CVE-2023-41505
|
||||||
|
- [ASR511-OO7/CVE-2023-41505](https://github.com/ASR511-OO7/CVE-2023-41505)
|
||||||
|
|
||||||
|
### CVE-2023-41506
|
||||||
|
- [ASR511-OO7/CVE-2023-41506](https://github.com/ASR511-OO7/CVE-2023-41506)
|
||||||
|
|
||||||
### CVE-2023-41507 (2023-09-05)
|
### CVE-2023-41507 (2023-09-05)
|
||||||
|
|
||||||
<code>Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
|
<code>Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
|
||||||
|
@ -5911,6 +5970,7 @@
|
||||||
- [H454NSec/CVE-2023-42793](https://github.com/H454NSec/CVE-2023-42793)
|
- [H454NSec/CVE-2023-42793](https://github.com/H454NSec/CVE-2023-42793)
|
||||||
- [Zenmovie/CVE-2023-42793](https://github.com/Zenmovie/CVE-2023-42793)
|
- [Zenmovie/CVE-2023-42793](https://github.com/Zenmovie/CVE-2023-42793)
|
||||||
- [johnossawy/CVE-2023-42793_POC](https://github.com/johnossawy/CVE-2023-42793_POC)
|
- [johnossawy/CVE-2023-42793_POC](https://github.com/johnossawy/CVE-2023-42793_POC)
|
||||||
|
- [StanleyJobsonAU/GhostTown](https://github.com/StanleyJobsonAU/GhostTown)
|
||||||
|
|
||||||
### CVE-2023-42819 (2023-09-26)
|
### CVE-2023-42819 (2023-09-26)
|
||||||
|
|
||||||
|
@ -13611,6 +13671,15 @@
|
||||||
|
|
||||||
- [G37SYS73M/CVE-2022-46087](https://github.com/G37SYS73M/CVE-2022-46087)
|
- [G37SYS73M/CVE-2022-46087](https://github.com/G37SYS73M/CVE-2022-46087)
|
||||||
|
|
||||||
|
### CVE-2022-46088
|
||||||
|
- [ASR511-OO7/CVE-2022-46088](https://github.com/ASR511-OO7/CVE-2022-46088)
|
||||||
|
|
||||||
|
### CVE-2022-46089
|
||||||
|
- [ASR511-OO7/CVE-2022-46089](https://github.com/ASR511-OO7/CVE-2022-46089)
|
||||||
|
|
||||||
|
### CVE-2022-46091
|
||||||
|
- [ASR511-OO7/CVE-2022-46091](https://github.com/ASR511-OO7/CVE-2022-46091)
|
||||||
|
|
||||||
### CVE-2022-46104
|
### CVE-2022-46104
|
||||||
- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
|
- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
|
||||||
|
|
||||||
|
@ -13703,6 +13772,15 @@
|
||||||
|
|
||||||
- [WodenSec/CVE-2022-46485](https://github.com/WodenSec/CVE-2022-46485)
|
- [WodenSec/CVE-2022-46485](https://github.com/WodenSec/CVE-2022-46485)
|
||||||
|
|
||||||
|
### CVE-2022-46497
|
||||||
|
- [ASR511-OO7/CVE-2022-46497](https://github.com/ASR511-OO7/CVE-2022-46497)
|
||||||
|
|
||||||
|
### CVE-2022-46498
|
||||||
|
- [ASR511-OO7/CVE-2022-46498](https://github.com/ASR511-OO7/CVE-2022-46498)
|
||||||
|
|
||||||
|
### CVE-2022-46499
|
||||||
|
- [ASR511-OO7/CVE-2022-46499](https://github.com/ASR511-OO7/CVE-2022-46499)
|
||||||
|
|
||||||
### CVE-2022-46505 (2023-01-18)
|
### CVE-2022-46505 (2023-01-18)
|
||||||
|
|
||||||
<code>An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.
|
<code>An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.
|
||||||
|
|
Loading…
Reference in a new issue